Generalized video anomaly event detection: Systematic taxonomy and comparison of deep models

Y Liu, D Yang, Y Wang, J Liu, J Liu… - ACM Computing …, 2024 - dl.acm.org
Video Anomaly Detection (VAD) serves as a pivotal technology in the intelligent surveillance
systems, enabling the temporal or spatial identification of anomalous events within videos …

A survey of next-generation computing technologies in space-air-ground integrated networks

Z Shen, J **, C Tan, A Tagami, S Wang, Q Li… - ACM Computing …, 2023 - dl.acm.org
Space-air-ground integrated networks (SAGINs) are key elements for facilitating high-speed
seamless connectivity to the devices/users in infrastructure-less environments, where the …

Machine learning empowered emerging wireless networks in 6G: Recent advancements, challenges and future trends

HMF Noman, E Hanafi, KA Noordin, K Dimyati… - IEEE …, 2023 - ieeexplore.ieee.org
The upcoming 6G networks are sixth-sense next-generation communication networks with
an ever-increasing demand for enhanced end-to-end (E2E) connectivity towards a …

Toward greener 5G and beyond radio access networks—A survey

LMP Larsen, HL Christiansen, S Ruepp… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
Mobile network traffic is increasing and so is the energy consumption. The Radio Access
Network (RAN) part is responsible for the largest share of the mobile network energy …

Stochastic video normality network for abnormal event detection in surveillance videos

Y Liu, D Yang, G Fang, Y Wang, D Wei, M Zhao… - Knowledge-Based …, 2023 - Elsevier
Abstract Video Anomaly Detection (VAD) aims to automatically identify unexpected spatial–
temporal patterns to detect abnormal events in surveillance videos. Existing unsupervised …

Learning causality-inspired representation consistency for video anomaly detection

Y Liu, Z **a, M Zhao, D Wei, Y Wang, S Liu… - Proceedings of the 31st …, 2023 - dl.acm.org
Video anomaly detection is an essential yet challenging task in the multimedia community,
with promising applications in smart cities and secure communities. Existing methods …

[PDF][PDF] Evaluating the impact of cloud computing on accounting firms: A review of efficiency, scalability, and data security

A Atadoga, UJ Umoga, OA Lottu… - Global Journal of …, 2024 - researchgate.net
Cloud computing has emerged as a transformative force, revolutionizing the landscape for
accounting firms. This comprehensive review delves into the profound impact of cloud …

Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions

M Mahbub, RM Shubair - Journal of Network and Computer Applications, 2023 - Elsevier
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …

Design methodology for 6G end-to-end system: Hexa-X-II perspective

S Kerboeuf, P Porambage, A Jain… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
As the fifth generation (5G) mobile communication systems are commercially deployed, they
bring new services, enhance user experiences, and offer various opportunities to different …

Distributional and spatial-temporal robust representation learning for transportation activity recognition

J Liu, Y Liu, W Zhu, X Zhu, L Song - Pattern Recognition, 2023 - Elsevier
Transportation activity recognition (TAR) provides valuable support for intelligent
transportation applications, such as urban transportation planning, driving behavior …