Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleDecember 2024
A Dual Transformer-Based Deep Learning Model for Passenger Anomaly Behavior Detection in Elevator Cabs
International Journal of Swarm Intelligence Research (IJSIR-IGI), Volume 15, Issue 1Pages 1–14https://doi.org/10.4018/IJSIR.361578Effective detection of abnormal behaviors within elevator cabins is critical to ensure elevator safety. While existing deep learning based anomaly detection methods mainly focus on convolutional neural networks for spatial feature extraction and ...
- research-articleNovember 2024
Modeling multi-factor user preferences based on Transformer for next point of interest recommendation
Expert Systems with Applications: An International Journal (EXWA), Volume 255, Issue PDhttps://doi.org/10.1016/j.eswa.2024.124894AbstractWith the rapid development of the mobile network and the gradual popularization of mobile devices, more and more users try to find attractive places to visit through WeChat, Twitter applications. In this trend, personalized next point of interest(...
Highlights- An innovative next POI recommendation algorithm called MUPT is proposed.
- GGNN is employed to learn expressive POI embedding based on the constructed graph.
- It adopts three Transformer encoders to model multi-factor user ...
- research-articleNovember 2024
Online network traffic classification based on external attention and convolution by IP packet header
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 252, Issue Chttps://doi.org/10.1016/j.comnet.2024.110656AbstractNetwork traffic classification is an important part of network monitoring and network management. Three traditional methods for network traffic classification are flow-based, session-based, and packet-based, while flow-based and session-based ...
- research-articleNovember 2024
Deep reinforcement learning-based resource scheduling for energy optimization and load balancing in SDN-driven edge computing
AbstractTraditional techniques for edge computing resource scheduling may result in large amounts of wasted server resources and energy consumption; thus, exploring new approaches to achieve higher resource and energy efficiency is a new challenge. Deep ...
- research-articleNovember 2024
DRTP: A generic Differentiated Reliable Transport Protocol
- Yongmao Ren,
- Yundong Zhang,
- Ming Yin,
- Anmin Xu,
- Xu Zhou,
- Cong Li,
- Yifang Qin,
- Qinghua Wu,
- Mohamed Ali Kaafar,
- Gaogang Xie
AbstractWith rapid development of network communications, the performance requirements of applications are getting more differentiated. Many applications like high-definition video transfer require high throughput but do tolerate occasional packet ...
-
- research-articleSeptember 2024
Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing
RAID '24: Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and DefensesPages 450–464https://doi.org/10.1145/3678890.3678933Coverage-based greybox fuzzing (CGF) is an efficient technique for detecting vulnerabilities, but its coverage-feedback mechanism introduces significant overhead in binary-only fuzzing. Although hardware-assisted greybox fuzzing (HGF) has been proposed ...
- research-articleSeptember 2024
TwinPilots: A New Computing Paradigm for GPU-CPU Parallel LLM Inference
SYSTOR '24: Proceedings of the 17th ACM International Systems and Storage ConferencePages 91–103https://doi.org/10.1145/3688351.3689164When trained Large Language Models (LLMs) become available, it is desirable to carry out LLM inferences at the user end with limited resources. A common belief on LLM inference is that GPU is essentially the only meaningful processor as almost all ...
- research-articleOctober 2024
IEmu: Interrupt modeling from the logic hidden in the firmware
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 154, Issue Chttps://doi.org/10.1016/j.sysarc.2024.103237AbstractThe security of embedded firmware has become a critical issue in light of the rapid development of the Internet of Things. Current security analysis approaches, such as dynamic analysis, still face bottlenecks and difficulties due to the wide ...
- ArticleAugust 2024
Capturing Fine and Coarse Grained User Preferences with Dual-Transformer for Next POI Recommendation
AbstractThe next Point of Interest (POI) recommendation is of great significance to provide personalized location suggestions for users to visit next. Most existing researches fail to explore user coarse-grained category movement preferences embedded in ...
- ArticleAugust 2024
Multi-strategy Enhanced Particle Swarm Optimization Algorithm for Elevator Group Scheduling
AbstractAlthough particle swarm optimization has shown great potentials in solving the complex elevator group scheduling problem, it still suffers from the issue of local optimum. In order to improve the capability of finding the global optimum, a multi-...
- research-articleJuly 2024
HCCNet: Hybrid Coupled Cooperative Network for Robust Indoor Localization
ACM Transactions on Sensor Networks (TOSN), Volume 20, Issue 4Article No.: 100, Pages 1–22https://doi.org/10.1145/3665645Accurate localization of unmanned aerial vehicle (UAV) is critical for navigation in GPS-denied regions, which remains a highly challenging topic in recent research. This article describes a novel approach to multi-sensor hybrid coupled cooperative ...
- research-articleJuly 2024
Multi-Modal Attribute Prompting for Vision-Language Models
IEEE Transactions on Circuits and Systems for Video Technology (IEEETCSVT), Volume 34, Issue 11_Part_2Pages 11579–11591https://doi.org/10.1109/TCSVT.2024.3424566Pre-trained Vision-Language Models (VLMs), like CLIP, exhibit strong generalization ability to downstream tasks but struggle in few-shot scenarios. Existing prompting techniques primarily focus on global text and image representations, yet overlooking ...
- research-articleJuly 2024
HyperGo: Probability-based directed hybrid fuzzing
AbstractDirected grey-box fuzzing (DGF) is a target-guided fuzzing intended for testing specific targets (e.g., the potential buggy code). Despite numerous techniques proposed to enhance directedness, the existing DGF techniques still face challenges, ...
- research-articleJune 2024
SA2E-AD: A Stacked Attention Autoencoder for Anomaly Detection in Multivariate Time Series
ACM Transactions on Knowledge Discovery from Data (TKDD), Volume 18, Issue 7Article No.: 174, Pages 1–15https://doi.org/10.1145/3653677Anomaly detection for multivariate time series is an essential task in the modern industrial field. Although several methods have been developed for anomaly detection, they usually fail to effectively exploit the metrical-temporal correlation and the ...
- research-articleJune 2024
Efficient lower layers parameter decoupling personalized federated learning method of facial expression recognition for home care robots
AbstractFacial expression recognition (FER) is a crucial and pivotal functionality for home care robots that engage in intimate interactions with human individuals. However, the potential privacy risk associated with home care robots resides in their ...
Highlights- A lightweight neural network architecture is proposed for facial expression recognition on home care robots.
- An efficient lower layer parameter decoupling personalized FL method is introduced.
- It can be easily applied to existing ...
- research-articleJuly 2024
A multipath scheduler based on cross-layer information for low-delay applications in 5G edge networks
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 244, Issue Chttps://doi.org/10.1016/j.comnet.2024.110333AbstractVirtual Reality (VR) applications that require extremely low delay and high image quality are widely used in online games and other 5G scenarios, becoming a hot research field in recent years. However, the limited bandwidth in 5G edge networks ...
- research-articleJuly 2024
An improved context-aware weighted matrix factorization algorithm for point of interest recommendation in LBSN
AbstractThe point of interest (POI) recommendation algorithm in location based social network (LBSN) can assist people to find more appealing locations and satisfy their specific demands. However, it is challengeable to infer user’s preference due to the ...
- research-articleApril 2024
VCApather: A Network as a Service Solution for Video Conference Applications
- Dongbiao He,
- Canshu Lin,
- Xian Yu,
- Cedric Westphal,
- Zhongxing Ming,
- Laizhong Cui,
- Xu Zhou,
- J. J. Garcia-Luna-Aceves
NOSSDAV '24: Proceedings of the 34th edition of the Workshop on Network and Operating System Support for Digital Audio and VideoPages 57–63https://doi.org/10.1145/3651863.3651884We propose a network service as a solution for video conference applications by constructing network layer routing strategies. Our approach takes into account the characteristics of conferencing flows, addresses various self-customized metrics, and ...
- research-articleApril 2024
A novel smoothed particle hydrodynamics method for multi-physics simulation of laser powder bed fusion
Computational Mechanics (SPCM), Volume 74, Issue 5Pages 1009–1036https://doi.org/10.1007/s00466-024-02465-5AbstractIn this work, we propose an efficient smoothed particle hydrodynamics (SPH) method for simulating laser powder bed fusion (LPBF). The multi-physics process of LPBF, including the heat transfer and phase change with complex boundaries, is ...
- research-articleMarch 2024
Efficient Distributed Hop-Constrained Path Enumeration on Large-Scale Graphs
Proceedings of the ACM on Management of Data (PACMMOD), Volume 2, Issue 1Article No.: 22, Pages 1–25https://doi.org/10.1145/3639277The enumeration of hop-constrained simple paths is a building block in many graph-based areas. Due to the enormous search spaces in large-scale graphs, a single machine can hardly satisfy the requirements of both efficiency and memory, which causes an ...