Edge learning for 6G-enabled Internet of Things: A comprehensive survey of vulnerabilities, datasets, and defenses
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE)
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …
Deep-reinforcement-learning-based IoT sensor data cleaning framework for enhanced data analytics
AFY Mohammed, SM Sultan, J Lee, S Lim - Sensors, 2023 - mdpi.com
The Internet of things (IoT) combines different sources of collected data which are processed
and analyzed to support smart city applications. Machine learning and deep learning …
and analyzed to support smart city applications. Machine learning and deep learning …
State monitoring of gas regulator station based on feature selection of improved grey relational analysis
J Jia, B Wang, R Ma, Z Deng… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The in-depth application of the IoT technology in the gas industry has improved the
intelligence of the gas system. As an important part of the gas system, the optimization of …
intelligence of the gas system. As an important part of the gas system, the optimization of …
RLNN: A force perception algorithm using reinforcement learning
Y Zhao, Q Zheng - Multimedia Tools and Applications, 2024 - Springer
Force perception is one of the important research branches in human-computer interaction
and compliant control of contact-rich robots. Force perception without robot end-effector …
and compliant control of contact-rich robots. Force perception without robot end-effector …
AI‐Based Heterogenous Large‐Scale English Translation Strategy
C Wang - Mobile Information Systems, 2022 - Wiley Online Library
English has become one of the most widely used languages in the world. If there is no good
translation mechanism for such a widely used language, it will bring trouble to both study …
translation mechanism for such a widely used language, it will bring trouble to both study …
Intelligent feature selection for ECG-based personal authentication using deep reinforcement learning
In this study, the optimal features of electrocardiogram (ECG) signals were investigated for
the implementation of a personal authentication system using a reinforcement learning (RL) …
the implementation of a personal authentication system using a reinforcement learning (RL) …
Multimedia Analytics Based On Air-assisted Vehicle Network In Smart City
Y Song, Y Shen, P Ding - 2022 IEEE International Symposium …, 2022 - ieeexplore.ieee.org
In autonomous vehicles, multimedia analytics is a potential technology to improve the safety
and intelligence of the Internet of Vehicles (IoV), which use UAVs as air communication …
and intelligence of the Internet of Vehicles (IoV), which use UAVs as air communication …
EQFF: An Efficient Query Method Using Feature Fingerprints
X Zhou, Y Hua, S Huang, Q Fan, H Yan… - … Conference on Algorithms …, 2023 - Springer
The amount of data features is growing rapidly in the era of big data, posing challenges to
both the security and efficiency of feature query. Most existing encryption-based retrieval …
both the security and efficiency of feature query. Most existing encryption-based retrieval …
Data Detection Poisoning Attack Using Resource Scheme Multilinear Regression
A Kareem, V Kumara, D Raghunatha… - 2023 4th …, 2023 - ieeexplore.ieee.org
Machine learning systems have their training to satisfy their data demands in which the
industry is pushed to perform increasingly automation and take in more data. The objective …
industry is pushed to perform increasingly automation and take in more data. The objective …
[PDF][PDF] Machine learning data detection poisoning attacks using resource schemes multi-linear regression
K Ganesan - Neural, Parallel, & Scientific Computations, 2020 - dynamicpublishers.org
Machine learning methods become more and more popular. The purpose of using these
methods is to become more and more popular network security components such as …
methods is to become more and more popular network security components such as …