References
- R. Ganti, F. Ye and H. Lei, "Mobile Crowdsensing-Current State and Future Challenges," IEEE Communications Magazine, vo.49, no.11, pp.32-39, Nov. 2011. https://doi.org/10.1109/MCOM.2011.6069707
- B. Guo, Z. Yu, X. Zhou and D. Zhang, "From Participatory Sensing to Mobile Crowd Sensing," in Proc. of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), pp.593-598, 2014.
- Y. J. Kim, Y. Y. He and J. K. Park, "Efficient Anomaly Detection Through Confidence Interval Estimation Based on Time Series Analysis," The Journal of Korean Institute of Communications and Information Sciences, vo.39, no.1, pp.708-715, Aug. 2014.
- S. Suthaharan, C. Leckie, M. Moshtaghi and S. Karunasekera, "Sensor data boundary estimation for anomaly detection in wireless sensor networks," in Proc. of the IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS), 2010, pp.546-551.
- A. Chirayil, R. Maharjan and C. Sehwu "Survey on Anomaly Detection in Wireless Sensor Networks (WSNs)," in Proc. of the IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2019, pp.150-157.
- M. Musthag, A. Raij, D. Ganesan, S. Kumar and S. Shiffman, "Exploring micro-incentive strategies for participant compensation in high-burden studies," in Proc. of the Proceedings of the 13th international conference on Ubiquitous computing, 2011, pp.435-444.
- D. Chatzopoulos, S. Gujar, B. Faltings and P. Hui, "Privacy Preserving and Cost Optimal Mobile Crowdsensing Using Smart Contracts on Blockchain," in Proc. of the 2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2018, pp.442-450.
- S. H. Kwan, M. J. Ahnn and H. C. Lee, "Fault Detection and Classification of Process Cycle Signals using Density-based Clustering and Deep Learning," Korean Institute of Industrial Engineers, vo.44, no.6, pp.475-482, Dec. 2018. https://doi.org/10.7232/JKIIE.2018.44.6.475
- A. Truong, A. Walters and J. Goodsitt, "Towards Automated Machine Learning: Evaluation and Comparison of AutoML Approaches and Tools," in Proc. of the IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI), 2019, pp.1471-1479.
- L. Klopfenstein, S. Delpriori, P. Polidori and A. Sergiacomi, "Mobile crowdsensing for road sustainability: exploitability of publicly-sourced data," International Review of Applied Economics, vo.0, no.0, pp.1-22, Jul. 2019.
- L. Buczak and E. Guven, "A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection," IEEE Communications Surveys & Tutorials, vo.18, no.0, pp.1153-1176, Oct. 2015. https://doi.org/10.1109/COMST.2015.2494502
- D. Bui, D. K. Nguyen and T. D. Ngo, "Supervising an Unsupervised Neural Network," in Proc. of the First Asian Conference on Intelligent Information and Database Systems, 2019, pp.307-312.
- Y. Sani, A. Mohamedou and K. Ali, "An overview of neural networks use in anomaly Intrusion Detection Systems," in Proc. of the IEEE Student Conference on Research and Development (SCOReD), 2009, pp.89-92.
- B. K. Ko and J. G. Back, "Anomaly Detection With Variational Autoencoder To Prevent System Malfunctions," Korean Institute of Industrial Engineers, vo.0, no.6, pp.537-557, Nov. 2018.
- H. Cai, J. Lin, Y. Lin and Z. Liu, "AutoML for Architecting Efficient and Specialized Neural Networks," IEEE Micro, vo.40, no.1, pp.75-82, Jan. 2020. https://doi.org/10.1109/mm.2019.2953153
- C. Wendl, D. Marcos and D. Tuia, "Novelty detection in very high resolution urban scenes with Density Forests", Joint Urban Remote Sensing Event (JURSE), vo.0, no.0, pp.1-4, Aug. 2019.
- A. Goldbloom, "Kaggle", https://www.kaggle.com/