
-
An Improved Naive Bayes Classifier-based Noise Detection Technique for Classifying User Phone Call Behavior
The presence of noisy instances in mobile phone data is a fundamental is...
read it
-
Weighted diffusion LMP algorithm for distributed estimation in non-uniform noise conditions
This letter presents an improved version of diffusion least mean ppower ...
read it
-
Double-detector for Sparse Signal Detection from One Bit Compressed Sensing Measurements
This letter presents the sparse vector signal detection from one bit com...
read it
-
Sparse Diffusion Steepest-Descent for One Bit Compressed Sensing in Wireless Sensor Networks
This letter proposes a sparse diffusion steepest-descent algorithm for o...
read it
-
Dictionary Learning for Blind One Bit Compressed Sensing
This letter proposes a dictionary learning algorithm for blind one bit c...
read it
-
Bayesian Hypothesis Testing for Block Sparse Signal Recovery
This letter presents a novel Block Bayesian Hypothesis Testing Algorithm...
read it
-
Iterative Bayesian Reconstruction of Non-IID Block-Sparse Signals
This paper presents a novel Block Iterative Bayesian Algorithm (Block-IB...
read it
-
Off-grid Direction of Arrival Estimation Using Sparse Bayesian Inference
Direction of arrival (DOA) estimation is a classical problem in signal p...
read it
-
Tera-scale Astronomical Data Analysis and Visualization
We present a high-performance, graphics processing unit (GPU)-based fram...
read it
-
A Distributed GPU-based Framework for real-time 3D Volume Rendering of Large Astronomical Data Cubes
We present a framework to interactively volume-render three-dimensional ...
read it
-
Interchanging Interactive 3-d Graphics for Astronomy
We demonstrate how interactive, three-dimensional (3-d) scientific visua...
read it
-
Modelling and Analysis of Temporal Preference Drifts Using A Component-Based Factorised Latent Approach
The changes in user preferences can originate from substantial reasons, ...
read it
-
Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks
Deep neural network (DNNs) has shown impressive performance on hard perc...
read it
-
The Maximum Trajectory Coverage Query in Spatial Databases
With the widespread use of GPS-enabled mobile devices, an unprecedented ...
read it
-
Mining User Behavioral Rules from Smartphone Data through Association Analysis
The increasing popularity of smart mobile phones and their powerful sens...
read it
-
Automated Big Traffic Analytics for Cyber Security
Network traffic analytics technology is a cornerstone for cyber security...
read it
-
Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones
Intelligent Personal Assistant (IA), also known as Voice Assistant (VA),...
read it
-
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps
Android users are increasingly concerned with the privacy of their data ...
read it
-
Immutable Autobiography of Smart Cars
The popularity of smart cars is increasing around the world as they offe...
read it
-
SilentPhone: Inferring User Unavailability based Opportune Moments to Minimize Call Interruptions
The increasing popularity of cell phones has made them the most personal...
read it
-
Research Issues in Mining User Behavioral Rules for Context-Aware Intelligent Mobile Applications
Context-awareness in smart mobile applications is a growing area of stud...
read it
-
Mobile Data Science: Towards Understanding Data-Driven Intelligent Mobile Applications
Due to the popularity of smart mobile phones and context-aware technolog...
read it
-
Understanding the Role of Data-Centric Social Context in Personalized Mobile Applications
Context-awareness in personalized mobile applications is a growing area ...
read it
-
Individualized Time-Series Segmentation for Mining Mobile Phone User Behavior
Mobile phones can record individual's daily behavioral data as a time-se...
read it
-
A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers
Demand response (DR) is not only a crucial solution to the demand side m...
read it
-
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples
We demonstrated that Non-Maximum Suppression (NMS), which is commonly us...
read it
-
A Machine Learning based Robust Prediction Model for Real-life Mobile Phone Data
Real-life mobile phone data may contain noisy instances, which is a fund...
read it
-
Service Capacity Enhanced Task Offloading and Resource Allocation in Multi-Server Edge Computing Environment
An edge computing environment features multiple edge servers and multipl...
read it
-
Fast Single Image Dehazing via Multilevel Wavelet Transform based Optimization
The quality of images captured in outdoor environments can be affected b...
read it
-
Bug Searching in Smart Contract
With the frantic development of smart contracts on the Ethereum platform...
read it
-
A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing
Fuzzing is a promising technique for detecting security vulnerabilities....
read it
-
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT
Voice interfaces and assistants implemented by various services have bec...
read it
-
The Audio Auditor: Participant-Level Membership Inference in Internet of Things Voice Services
Voice interfaces and assistants implemented by various services have bec...
read it
-
Edge User Allocation with Dynamic Quality of Service
In edge computing, edge servers are placed in close proximity to end-use...
read it
-
A novel text representation which enables image classifiers to perform text classification, applied to name disambiguation
Patent data are often used to study the process of innovation and resear...
read it
-
CalBehav: A Machine Learning based Personalized Calendar Behavioral Model using Time-Series Smartphone Data
The electronic calendar is a valuable resource nowadays for managing our...
read it
-
Cutting the Unnecessary Long Tail: Cost-Effective Big Data Clustering in the Cloud
Clustering big data often requires tremendous computational resources wh...
read it
-
E-MIIM: An Ensemble Learning based Context-Aware Mobile Telephony Model for Intelligent Interruption Management
Nowadays, mobile telephony interruptions in our daily life activities ar...
read it
-
AppsPred: Predicting Context-Aware Smartphone Apps using Random Forest Learning
Due to the popularity of context-awareness in the Internet of Things (Io...
read it
-
Optimizing the Transition Waste in Coded Elastic Computing
Distributed computing, in which a resource-intensive task is divided int...
read it
-
Corrfunc: Blazing fast correlation functions with AVX512F SIMD Intrinsics
Correlation functions are widely used in extra-galactic astrophysics to ...
read it
-
Finding Effective Geo-Social Group for Impromptu Activity with Multiple Demands
Geo-social group search aims to find a group of people proximate to a lo...
read it
-
Distributed Machine Learning for Predictive Analytics in Mobile Edge Computing Based IoT Environments
Predictive analytics in Mobile Edge Computing (MEC) based Internet of Th...
read it
-
PGD-UNet: A Position-Guided Deformable Network for Simultaneous Segmentation of Organs and Tumors
Precise segmentation of organs and tumors plays a crucial role in clinic...
read it
-
A Novel DNN Training Framework via Data Sampling and Multi-Task Optimization
Conventional DNN training paradigms typically rely on one training set a...
read it
-
Efficient Exact Algorithms for Maximum Balanced Biclique Search in Bipartite Graphs
Given a bipartite graph, the maximum balanced biclique (MBB) problem, di...
read it
-
On the Security of Networked Control Systems in Smart Vehicle and its Adaptive Cruise Control
With the benefits of Internet of Vehicles (IoV) paradigm, come along unp...
read it
-
Efficiently Finding a Maximal Clique Summary via Effective Sampling
Maximal clique enumeration (MCE) is a fundamental problem in graph theor...
read it
-
ExpFinder: An Ensemble Expert Finding Model Integrating N-gram Vector Space Model and μCO-HITS
Finding an expert plays a crucial role in driving successful collaborati...
read it