Privacy-preserving machine learning based data analytics on edge devices

J Zhao, R Mortier, J Crowcroft, L Wang - Proceedings of the 2018 AAAI …, 2018 - dl.acm.org
Emerging Machine Learning (ML) techniques, such as Deep Neural Network, are widely
used in today's applications and services. However, with social awareness of privacy and …

Network intrusion detection using word embeddings

X Zhuo, J Zhang, SW Son - … Conference on Big Data (Big Data), 2017 - ieeexplore.ieee.org
Word embeddings, learning syntactic and semantic relationships between words from the
raw text, are known to achieve superior performance in many prediction and classification …

A Time Series Clustering Method for Network Big Data

Y Zhu, G Min, Y Wu, H Wang - 2023 IEEE 29th International …, 2023 - ieeexplore.ieee.org
In the era of big data, network data increase rapidly in a distributed manner, giving birth to
the network big data. Network big data with the extra features such as distributed and …

[PDF][PDF] A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems.

X Wang, W Wang, B Xu, P Du, L Li, M Liu - J. Univers. Comput. Sci., 2018 - muyang.me
Embedded systems are subjected to various adversaries including software attacks,
physical attacks, and side channel attacks. Most of these malicious attacks can lead to the …

A survey of big data and computational intelligence in networking

Y Zhu, Y Wu, G Min, A Zomaya… - Big Data and …, 2017 - taylorfrancis.com
Networking has become an indispensable part of the modern world, providing convenient
access to the Internet, remote communication, and information exchange. Big data also has …

User-centric composable services: A new generation of personal data analytics

J Zhao, R Mortier, J Crowcroft, L Wang - arXiv preprint arXiv:1710.09027, 2017 - arxiv.org
Machine Learning (ML) techniques, such as Neural Network, are widely used in today's
applications. However, there is still a big gap between the current ML systems and users' …