Smart city as a distributed platform: Toward a system for citizen-oriented management
P Chamoso, A González-Briones, F De La Prieta… - Computer …, 2020 - Elsevier
Today's society must prioritize the design and development of platforms for Big Data
processing. Smart cities generate large volumes of valuable data which the government can …
processing. Smart cities generate large volumes of valuable data which the government can …
UAV-Aided trustworthy data collection in federated-WSN-enabled IoT applications
M Tao, X Li, H Yuan, W Wei - Information Sciences, 2020 - Elsevier
In emerging applications of the Internet of Things (IoT), wireless sensor networks (WSNs)
are usually federally deployed for these purposes of data gathering, tracking and monitoring …
are usually federally deployed for these purposes of data gathering, tracking and monitoring …
GAN-based sensor data augmentation: Application for counting moving people and detecting directions using PIR sensors
In indoor environments, such as smart homes, the number of occupants within the space
and their moving directions can provide a rich set of contextual information about the …
and their moving directions can provide a rich set of contextual information about the …
: Privacy‐preserving collaborative deep learning against leakage from gradient sharing
Large‐scale data training is vital to the generalization performance of deep learning (DL)
models. However, collecting data directly is associated with increased risk of privacy …
models. However, collecting data directly is associated with increased risk of privacy …
Performance analysis and prediction of asymmetric two-level priority polling system based on BP neural network
Z Yang, L Mao, B Yan, J Wang, W Gao - Applied Soft Computing, 2021 - Elsevier
Concerning the needs of multi-service and network performance prediction in the Internet of
Things (IoT), we propose an asymmetric two-priority polling control system model, and use …
Things (IoT), we propose an asymmetric two-priority polling control system model, and use …
Positive unlabeled learning‐based anomaly detection in videos
H Mu, R Sun, G Yuan, G Shi - International Journal of …, 2021 - Wiley Online Library
Anomaly detection plays a critical role in intelligent video surveillance. However, real‐world
video data obtained always contains large numbers of normal video data, along with large …
video data obtained always contains large numbers of normal video data, along with large …
Average utility driven data analytics on damped windows for intelligent systems with data streams
J Kim, U Yun, H Kim, T Ryu, JCW Lin… - … Journal of intelligent …, 2021 - Wiley Online Library
In industrial areas, most of databases are dynamic databases, and the volume of the
databases has grown with the passage of time. Especially, pattern mining for incremental …
databases has grown with the passage of time. Especially, pattern mining for incremental …
Efficiently mining erasable stream patterns for intelligent systems over uncertain data
Y Baek, U Yun, JCW Lin, E Yoon… - International Journal of …, 2020 - Wiley Online Library
Data mining is a method for extracting useful information that is necessary for a system from
a database. As the types of data processed by the system are diversified, the transformed …
a database. As the types of data processed by the system are diversified, the transformed …
Artificial neural network and dataset optimization for implementation of linear system models in resource‐constrained embedded systems
On‐board training of artificial neural network (ANN) is important in instances where real time
data are required for model training. Provision of on‐board intelligence enables the …
data are required for model training. Provision of on‐board intelligence enables the …
Network performance analysis from binding number prospect
W Gao, L Yan, Y Li, B Yang - Journal of Ambient Intelligence and …, 2022 - Springer
As a parameter from the perspective of neighborhood structure in network, binding number
is applied to measure the vulnerability of the network. The network is represented by a …
is applied to measure the vulnerability of the network. The network is represented by a …