Conditional predictive behavior planning with inverse reinforcement learning for human-like autonomous driving

Z Huang, H Liu, J Wu, C Lv - IEEE Transactions on Intelligent …, 2023 - ieeexplore.ieee.org
Making safe and human-like decisions is an essential capability of autonomous driving
systems, and learning-based behavior planning presents a promising pathway toward …

An effective transformation-encoding-attention framework for multivariate time series anomaly detection in iot environment

R Zhang, J Chen, Y Song, W Shan, P Chen… - Mobile Networks and …, 2023 - Springer
The emergence of the Internet of Things (IoT) has realized the connection between objects
and the Internet, realized intelligent identification and management, and made the …

Virtual machine migration techniques for optimizing energy consumption in cloud data centers

Z Ma, D Ma, M Lv, Y Liu - IEEE Access, 2023 - ieeexplore.ieee.org
The energy used by cloud data centers (CDCs) to support large volumes of data storage and
computation is dramatically increasing as the scope of cloud services continues to expand …

[HTML][HTML] A novel blockchain-based digital forensics framework for preserving evidence and enabling investigation in industrial Internet of Things

N Xiao, Z Wang, X Sun, J Miao - Alexandria Engineering Journal, 2024 - Elsevier
To address challenges in digital evidence collection and responsibility determination for
industrial safety accidents involving industrial Internet of Things (IIoT) device nodes, this …

Risk and UCON-based access control model for healthcare big data

R Jiang, X Chen, Y Yu, Y Zhang, W Ding - Journal of Big Data, 2023 - Springer
The rapid development of healthcare big data has brought certain convenience to medical
research and health management, but privacy protection of healthcare big data is an issue …

Topic to image: A rumor detection method inspired by image forgery recognition technology

Y Pang, X Li, S Wei, Q Li, Y Xiao - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This article is inspired by image forgery recognition techniques. If we regard topic comments
as image pixels, the whole topic is a complete image. The image differences between rumor …

Combining knowledge extension with convolution neural network for diabetes prediction

H Cheng, J Zhu, P Li, H Xu - Engineering Applications of Artificial …, 2023 - Elsevier
Prediction and diagnosis of diabetes are critical issues in the field of smart healthcare.
However, the dependence of large-scale annotated diabetes data and the lack of diabetes …

A meta reinforcement learning-based virtual machine placement algorithm in mobile edge computing

H Xu, C Jian - Cluster Computing, 2024 - Springer
Mobile edge computing requires more and more high-performance servers, resulting in
increased energy consumption. As an effective means to reduce energy consumption, virtual …

A task offloading algorithm using multi-objective optimization under hybrid mode in mobile edge computing

H Hou, Z Chai, X Liu, Y Li, Y Zeng - Mobile Networks and Applications, 2023 - Springer
In mobile edge computing (MEC), edge clients have the capability to offload their computing
tasks to edge servers or other edge clients, aiming to reduce their energy consumption and …

Tinyledger: A lightweight blockchain ledger protocol for the mec network

T Yu, SUN Yi, LIN Zhaowen - Computers and Electrical Engineering, 2023 - Elsevier
With the development of the Internet of Things, multi-access edge computing (MEC) is
widely used in industrial IoT, intelligent transport systems, and IoT data management. As a …