Explainable intelligence-driven defense mechanism against advanced persistent threats: A joint edge game and AI approach

H Li, J Wu, H Xu, G Li, M Guizani - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Advanced persistent threats (APT) have novel features such as long-term latency, precision
strikes and uncertain strategies. APT poses severe threats to the resource-limited edge …

Research on resource allocation of vocal music teaching system based on mobile edge computing

J Sun - Computer Communications, 2020 - Elsevier
How to allocate vocal teaching system resources plays an important role in improving the
performance of vocal teaching systems. With the development of mobile edge computing …

Temporal representation learning for time series classification

Y Hu, P Zhan, Y Xu, J Zhao, Y Li, X Li - Neural Computing and Applications, 2021 - Springer
Recent years have witnessed the exponential growth of time series data as the popularity of
sensing devices and development of IoT techniques; time series classification has been …

Resource scheduling for piano teaching system of internet of things based on mobile edge computing

Y **a - Computer Communications, 2020 - Elsevier
The effective operation of the piano teaching system of the Internet of Things requires the
effective support of virtualization technology. In particular, on the basis that the edge …

Adaptive offloading and scheduling algorithm for big data based mobile edge computing

X Zhu, Y **ao - Neurocomputing, 2022 - Elsevier
Big data will cause the system for business public opinion to be overburdened, and dynamic
changes in computing resources will cause tasks to be delayed. To end the situation, this …

Unsupervised outlier detection mechanism for tea traceability data

H Yang, S Li, L Tu, R Ma, Y Chen - IEEE Access, 2022 - ieeexplore.ieee.org
The presence of outliers in tea traceability data can mislead customers and have a
significant impact on the reputation and profits of tea companies. To solve this problem, an …

Ddos attack simulation and machine learning-based detection approach in internet of things experimental environment

H Chen, C Meng, J Chen - … of Information Security and Privacy (IJISP), 2021 - igi-global.com
Aiming at the problem of DDoS attack detection in internet of things (IoT) environment,
statistical and machine-learning algorithms are proposed to model and analyze the network …

A mobile edge–cloud collaboration outlier detection framework in wireless sensor networks

C Gao, G Song, Z Wang, Y Chen - IET Communications, 2021 - Wiley Online Library
Wireless sensor networks (WSNs) are extensively deployed to collect various data. Due to
harsh environments and limitation of computing and communication capabilities of sensor …

Vehicle Intelligent Inspection Technology Based on Automatic Multi-functional Follow-up Probe

W Gai, B Peng, X Zhang, J Bi, X Li… - 2020 IEEE 3rd Student …, 2020 - ieeexplore.ieee.org
The distribution network inspection relies on the “Manual Inspection” mode, which has some
prominent problems, such as the long time and manpower consumption of the inspection …

Artificial intelligence algorithm for optimal time series data model

K Wang - IEEE Access, 2020 - ieeexplore.ieee.org
In order to solve the limitation of a large number of literatures on the study of modeling,
simulation and prediction of time series data, there is no model selection, and a certain …