Remote health monitoring systems for elderly people: a survey

S Ahmed, S Irfan, N Kiran, N Masood, N Anjum… - Sensors, 2023 - mdpi.com
This paper addresses the growing demand for healthcare systems, particularly among the
elderly population. The need for these systems arises from the desire to enable patients and …

Detecting Outliers in Non-IID Data: A Systematic Literature Review

S Siddiqi, F Qureshi, S Lindstaedt, R Kern - IEEE Access, 2023 - ieeexplore.ieee.org
Outlier detection (outlier and anomaly are used interchangeably in this review) in non-
independent and identically distributed (non-IID) data refers to identifying unusual or …

Real-Time Adaptive Anomaly Detection in Industrial IoT Environments

M Raeiszadeh, A Ebrahimzadeh… - … on Network and …, 2024 - ieeexplore.ieee.org
To ensure reliability and service availability, next-generation networks are expected to rely
on automated anomaly detection systems powered by advanced machine learning methods …

A reliability anomaly detection method based on enhanced GRU-Autoencoder for Vehicular Fog Computing services

Y Wang, G Qin, Y Liang - Computers & Security, 2025 - Elsevier
With the rapid development of the Internet of Vehicles (IoV), Vehicular Fog Computing (VFC)
reduces communication latency by pushing computational resources from the cloud to the …

Concept drift-based checkpoint-restart for edge services rejuvenation

L Wang, J Liu, Q He - IEEE Transactions on Services …, 2022 - ieeexplore.ieee.org
As a nascent technique, mobile edge computing (MEC) is mushrooming with a broad
application prospect. By transferring abundant computing and storage resources from cloud …

B-Detection: Runtime Reliability Anomaly Detection for MEC Services With Boosting LSTM Autoencoder

L Wang, S Chen, F Chen, Q He… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
By pushing computing resources from the cloud to the network edge close to mobile users,
mobile edge computing (MEC) enables low latency for a wide variety of applications …

Runtime reliability fractional distribution change analytics against cloud-based systems DDoS attacks

L Wang, S Chen, X Zhang, J Liu - Journal of Systems and Software, 2025 - Elsevier
With the help of the Software as a Service (SaaS) delivery model, the rapid advancement of
cloud computing has become the most prevalent distributed computing paradigm. A large …

Diner: Interpretable Anomaly Detection for Seasonal Time Series in Web Services

Y **g, J Wang, J Qi, Q Qi, B He… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Monitoring and anomaly detection of key performance indicators (KPIs) are crucial for large
Internet companies to maintain the reliability of their Web services. Influenced by human …

Joint Mobile Edge Caching and Pricing: A Mean-Field Game Approach

Y Xu, X Zhang, M **ao, J Wu, A Liu… - 2024 IEEE 40th …, 2024 - ieeexplore.ieee.org
In this paper, we investigate the competitive content placement problem in Mobile Edge
Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents …

CDA-PDDWE: Concept Drift-Aware Performance-Based Diversified Dynamic Weighted Ensemble for Non-stationary Environments

S Suryawanshi, A Goswami, P Patil - Arabian Journal for Science and …, 2024 - Springer
Over the past decades, technological advancements have included the production of a huge
number of data streams. Data streams comprise large amounts of partially sequenced …