Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Chugui Xu"'
Publikováno v:
Mathematical Problems in Engineering. 2022:1-9
Neural network is a supervised classification algorithm which can deal with high complexity and nonlinear data analysis. Supervised algorithm needs some known labels in the training process, and then corrects parameters through backpropagation method
Publikováno v:
IEEE Transactions on Information Forensics and Security. 14:2358-2371
By learning generative models of semantic-rich data distributions from samples, generative adversarial network (GAN) has recently attracted intensive research interests due to its excellent empirical performance as a generative model. The model is us
Publikováno v:
IEEE Internet of Things Journal. 6:5140-5151
Deep neural networks have been widely applied in various machine learning applications for mobile data analytics in cloud. However, this approach introduces significant data challenges, because the cloud operator can perform deep inferences on the av
Publikováno v:
IEEE Communications Magazine. 56:20-25
Edge computing has emerged as a promising paradigm for delay-sensitive and context-aware IoT data analytics, through migrating data processing from the cloud to the edge of the network. However, traditional solutions adopting homomorphic encryption t
Publikováno v:
IEEE Transactions on Information Forensics and Security. 12:3081-3093
Releasing representative data sets without compromising the data privacy has attracted increasing attention from the database community in recent years. Differential privacy is an influential privacy framework for data mining and data release without
Publikováno v:
IEEE Network. 31:96-105
By moving service provisioning from the cloud to the edge, edge computing becomes a promising solution in the era of IoT to meet the delay requirements of IoT applications, enhance the scalability and energy efficiency of lightweight IoT devices, pro
Publikováno v:
Chinese Journal of Electronics. 26:1-12
The explosive growth of data volume and the ever-increasing demands of data value extraction have driven us into the era of big data. The “5V” (Variety, Velocity, Volume, Value, and Veracity) characteristics of big data pose great challenges to t
Publikováno v:
HPCC/SmartCity/DSS
Differential privacy (DP) has been recognized as a useful technique to achieve the trade-off between privacy guarantee and data utility. However, applying DP on the continuous data stream to protect sensitive inferred information faces two significan
Autor:
Chugui Xu, Yi-wen Zhang
Publikováno v:
Microprocessors and Microsystems. 45:164-175
We consider a scheduling problem of the sporadic task that shares resources.We present a new scheduling policy based on a fixed-priority scheduling.The energy management problem is considered in a real time system.Two techniques are presented to solv
Publikováno v:
EUC
The failed nodes lead to the phenomenon of coverage holes in Wireless Sensor Networks (WSN), which is due to the exhausted energy or destroyed environment. In this paper, the Best Fit Node Policy (BFNP) is proposed to repair coverage holes of WSN. Th