Publications

A Workload Prediction Approach using Models Stacking based on Recurrent Neural Network and Autoencoder

November 21st, 2017|Publications|

Workload prediction in computing systems like Cloud and Grid is an essential prerequisite for successful load balancing and achieving service-level agreements. However, since workloads in different systems and architectures have varied characteristics, providing an accurate single prediction model can be very challenging. Therefore, in this paper we have designed and implemented a model of stacking prediction algorithms to predict workload time series in Cloud and Grid systems using Recurrent Neural Network and Autoencoder. We have also performed experiments with several [...]

The Privacy Exposure Problem in Mobile Location-based Services

November 21st, 2017|Publications|

Mobile location-based services (LBSs) empowered by mobile crowdsourcing provide users with context- aware intelligent services based on user locations. As smartphones are capable of collecting and disseminating massive user location-embedded sensing information, privacy preservation for mobile users has become a crucial issue. This paper proposes a metric called privacy exposure to quantify the notion of privacy, which is subjective and qualitative in nature, in order to support mobile LBSs to evaluate the effectiveness of privacy-preserving solutions. This metric incorporates activity [...]

Leverage a Trust Service Platform for Data Usage Control in Smart City

November 21st, 2017|Publications|

In the Internet of Thing, data is almost collected, aggregated and analyzed without human intervention by machine-to-machine communications resulting in raising serious challenges on access control. Particularly in Smart City ecosystems in which multi-modal data comes from heterogeneous sources, data owners cannot imagine how their data is used to extract sensitive information. Thus, there is a critical need for novel access control methods that minimize privacy risks while increase ability of personalized access control. Our solution is to build a [...]

We Hear Your Activities through Wi-Fi Signals

November 21st, 2017|Publications|

In this paper, we focus on the problem of human activity recognition without identification of the individuals in a scene. We consider using Wi-Fi signals to detect certain human mobility behaviors such as stationary, walking, or running. The main objective is to successfully detect these behaviors for the individuals and based on that enable detection of the crowd's overall mobility behavior. We propose a method which infers mobility behaviors in two stages: from Wi-Fi signals to trajectories and from trajectories [...]

Toward a Trust Evaluation Mechanism in the Social Internet of Things

November 21st, 2017|Publications|

In the blooming era of the Internet of Things (IoT), trust has been accepted as a vital factor for provisioning secure, reliable, seamless communications and services. However, a large number of challenges still remain unsolved due to the ambiguity of the concept of trust as well as the variety of divergent trust models in different contexts. In this research, we augment the trust concept, the trust definition and provide a general conceptual model in the context of the Social IoT [...]

Study on Enhancing National Defense Security Based on RFID and Internet of Things Technology

November 21st, 2017|Publications|

Radio-frequency identification (RFID) is being used in various fields as a technology for identifying objects (people, things etc.) using radio frequencies. In the past, there was an attempt to apply RFID into national defence, but failed to spread RFID in the defence field because of some limitations of RFID in a specific situation (e.g., low recognition rate). Therefore, in this paper, we propose how to overcome the limitation of RFID by adopting the Internet of Things (IoT) technology which is [...]

Press Release