On paradigm of industrial big data analytics: From evolution to revolution

Z Yang, Z Ge - IEEE Transactions on Industrial Informatics, 2022 - ieeexplore.ieee.org
The arrival of the intelligent manufacturing and industrial internet era brings more and more
opportunities and challenges to modern industry. Specifically, the revolution of the …

A dynamic ensemble algorithm for anomaly detection in IoT imbalanced data streams

J Jiang, F Liu, Y Liu, Q Tang, B Wang, G Zhong… - Computer …, 2022 - Elsevier
With the rapid development of ambient intelligence (AmI) in the Internet of Things (IoT),
many data streams are generated from sensing devices in intelligent scenarios. Due to the …

An efficient vehicle-assisted aggregate authentication scheme for infrastructure-less vehicular networks

H Tan, W Zheng, P Vijayakumar… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
In recent years, growing research interest from both industry and academia has been
aroused to the vehicular networks, which is regarded as the fundamental component of the …

LCCDE: a decision-based ensemble framework for intrusion detection in the internet of vehicles

L Yang, A Shami, G Stevens… - GLOBECOM 2022-2022 …, 2022 - ieeexplore.ieee.org
Modern vehicles, including autonomous vehicles and connected vehicles, have adopted an
increasing variety of functionalities through connections and communications with other …

Refining one-class representation: A unified transformer for unsupervised time-series anomaly detection

G Zhong, F Liu, J Jiang, B Wang, CLP Chen - Information Sciences, 2024 - Elsevier
The deep unsupervised time-series anomaly detector depends on the one-class
representation, which is more effective by only formulating the normal samples. However …

AERF: Adaptive ensemble random fuzzy algorithm for anomaly detection in cloud computing

J Jiang, F Liu, WWY Ng, Q Tang, G Zhong… - Computer …, 2023 - Elsevier
The abnormality of system behavior is inevitable in cloud computing because of its
complexity and scale. How to perform anomaly detection on the system's operating data to …

CNN‐Based Attack Defense for Device‐Free Localization

Z Han, L Lin, Z Wang, Z Lian, C Qiu… - Mobile Information …, 2022 - Wiley Online Library
Device‐free localization technology aims to find a target by analyzing the signal strength
difference between transmitter and receiver deployed in the target area in advance. Up to …

Federated learning for reliable model updates in network-based intrusion detection

RR dos Santos, EK Viegas, AO Santin, P Tedeschi - Computers & Security, 2023 - Elsevier
Abstract Machine Learning techniques for network-based intrusion detection are widely
adopted in the scientific literature. Besides being highly variable, network traffic behavior …

[PDF][PDF] Enhancing object detection in aerial images

V Pandey, K Anand, A Kalra, A Gupta, PP Roy… - Math. Biosci …, 2022 - aimspress.com
Unmanned Aerial Vehicles have proven to be helpful in domains like defence and
agriculture and will play a vital role in implementing smart cities in the upcoming years …

TraceGra: A trace-based anomaly detection for microservice using graph deep learning

J Chen, F Liu, J Jiang, G Zhong, D Xu, Z Tan… - Computer …, 2023 - Elsevier
Trace is widely used to detect anomalies in distributed microservice systems because of the
capability of precisely reconstructing user request paths. However, most existing trace …