Results 51 to 60 of about 48,358 (211)
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT
With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs ...
Asokan, N. +6 more
core +1 more source
Continual Learning for Multimodal Data Fusion of a Soft Gripper
Models trained on a single data modality often struggle to generalize when exposed to a different modality. This work introduces a continual learning algorithm capable of incrementally learning different data modalities by leveraging both class‐incremental and domain‐incremental learning scenarios in an artificial environment where labeled data is ...
Nilay Kushawaha, Egidio Falotico
wiley +1 more source
Research on Data Poisoning Attack against Smart Grid Cyber–Physical System Based on Edge Computing
Data poisoning attack is a well-known attack against machine learning models, where malicious attackers contaminate the training data to manipulate critical models and predictive outcomes by masquerading as terminal devices. As this type of attack can be
Yanxu Zhu +5 more
doaj +1 more source
gnSPADE integrates gene‐network structures into a probabilistic topic modeling framework to achieve reference‐free cell‐type deconvolution in spatial transcriptomics. By embedding gene connectivity within the generative process, gnSPADE enhances biological interpretability and accuracy across simulated and real datasets, revealing spatial organization ...
Aoqi Xie, Yuehua Cui
wiley +1 more source
Content-oriented network slicing optimization based on cache-enabled hybrid radio access network
With the development of smart mobile devices and various mobile applications, content-oriented service has become the most popular service which occupies network resources and results in high traffic load.
Hao Jin, Haiya Lu, Chenglin Zhao
doaj +1 more source
An Eco‐Social Lens on Voice for Undervoiced and Unvoiced Stakeholders
ABSTRACT This conceptual paper argues it is important from an ecological–social (eco‐social) whole system point of view for businesses and policymakers to take the interests of and impacts on unvoiced and undervoiced [un(der)voiced] stakeholders into consideration for both strategic and justice reasons.
Sandra Waddock
wiley +1 more source
As the Internet of Things (IoT) continues to expand, the volume of data generated by IoT devices and the demand for IoT applications is increasing exponentially. These applications critically rely on real-time context reasoned from IoT data for effective
Ashish Manchanda +4 more
doaj +1 more source
StreamLearner: Distributed Incremental Machine Learning on Event Streams: Grand Challenge
Today, massive amounts of streaming data from smart devices need to be analyzed automatically to realize the Internet of Things. The Complex Event Processing (CEP) paradigm promises low-latency pattern detection on event streams.
Abdo, Majd +2 more
core +1 more source
Efficiently allocating distributed caching resources in future smart networks [PDF]
During the last decade, Internet Service Providers (ISPs) infrastructure has undergone a major metamorphosis driven by new networking paradigms, namely: Software Defined Networks (SDN) and Network Function Virtualization (NFV). The upcoming advent of 5G will certainly represent an important achievement of this evolution.
Ben Ammar, Hamza +2 more
openaire +1 more source
Advances in Triboelectric Nanogenerators With Rotating Structure
The rotating TENG has been widely studied for its superiorities of simple structure, high efficiency, and stable output. This review introduced the four different principles of rotating TENG and offered a thorough summary for performance and application research through three‐level classification. Importantly, the current existing problems, challenges,
Chuguo Zhang +4 more
wiley +1 more source

