scispace - formally typeset
Search or ask a question
Author

Yafeng Li

Bio: Yafeng Li is an academic researcher from Baoji University of Arts and Sciences. The author has contributed to research in topics: Data aggregator & Information privacy. The author has an hindex of 2, co-authored 4 publications receiving 43 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This article introduces TrustData, a scheme for high-quality data collection for event detection in the ICPS, referred to as “Trust worthy and secured Data collection” scheme, which alleviates authentic data for accumulation at groups of sensor devices in theICPS.
Abstract: In this article, an industrial cyber-physical system (ICPS) is utilized for monitoring critical events such as structural equipment conditions in industrial environments. Such a system can easily be a point of attraction for the cyberattackers, in addition to system faults, severe resource constraints (e.g., bandwidth and energy), and environmental problems. This makes data collection in the ICPS untrustworthy, even the data are altered after the data forwarding. Without validating this before data aggregation, detection of an event through the aggregation in the ICPS can be difficult. This article introduces TrustData , a scheme for high-quality data collection for event detection in the ICPS, referred to as “ Trust worthy and secured Data collection” scheme. It alleviates authentic data for accumulation at groups of sensor devices in the ICPS. Based on the application requirements, a reduced quantity of data is delivered to an upstream node, say, a cluster head. We consider that these data might have sensitive information, which is vulnerable to being altered before/after transmission. The contribution of this article is threefold. First, we provide the concept of TrustData to verify whether or not the acquired data are trustworthy (unaltered) before transmission, and whether or not the transmitted data are secured (data privacy is preserved) before aggregation. Second, we utilize a general measurement model that helps to verify acquired signal untrustworthy before transmitting toward upstream nodes. Finally, we provide an extensive performance analysis through a real-world dataset, and our results prove the effectiveness of TrustData .

60 citations

Journal ArticleDOI
TL;DR: DependData would be the first framework to address data dependability aside from current substantial studies of security and privacy protocols and it is believed the three layers decision-making framework would attract a wide range of applications in the future.

22 citations

Journal ArticleDOI
TL;DR: This research study develops an effective day-ahead resource scheduling framework for a microgrid (MG), taking into account the PHEVs and renewable energy sources (RESs), and the nickel–metal hydride battery as a widely-used and reliable technology is employed in this study.

10 citations

Journal ArticleDOI
TL;DR: Transformer with a bidirectional gated recurrent unit (GRU) deep learning (DL) method, called TRANS-BiGRU, was proposed in this article to efficiently learn and recognize different types of activities performed by multiple residents.
Abstract: Several techniques for human activity recognition (HAR) in a smart indoor environment have been developed and improved along with the rapid advancement of sensor technologies. However, recognizing multiple people’s activities is still challenging due to the complexity of their activities, such as parallel and collaborative activities. To address these challenges, we propose a transformer with a bidirectional gated recurrent unit (GRU) deep learning (DL) method, called TRANS-BiGRU, to efficiently learn and recognize different types of activities performed by multiple residents. We compare the proposed model with the state-of-the-art models and various DL models, such as Ensemble2LSTM (Ens2-LSTM), bidirectional GRUs (Bi-GRU), and traditional machine learning (ML) models, such as support vector machine (SVM). Our experimental results based on the center for advanced studies in adaptive system and ARAS public data sets show that our model significantly outperforms the existing models for complex activity recognition of multiple residents.

2 citations

Journal ArticleDOI
TL;DR: In this article, an interaction modeling and classification scheme (IMCS) is introduced to improve the accuracy of human-robot interaction (HRI) in real-time applications and services through physical observation.
Abstract: BACKGROUND Human-robot interaction (HRI) is becoming a current research field for providing granular real-time applications and services through physical observation. Robotic systems are designed to handle the roles of humans and assist them through intrinsic sensing and commutative interactions. These systems handle inputs from multiple sources, process them, and deliver reliable responses to the users without delay. Input analysis and processing is the prime concern for the robotic systems to understand and resolve the queries of the users. OBJECTIVES In this manuscript, the Interaction Modeling and Classification Scheme (IMCS) is introduced to improve the accuracy of HRI. This scheme consists of two phases, namely error classification and input mapping. In the error classification process, the input is analyzed for its events and conditional discrepancies to assign appropriate responses in the input mapping phase. The joint process is aided by a linear learning model to analyze the different conditions in the event and input detection. RESULTS The performance of the proposed scheme shows that it is capable of improving the interaction accuracy by reducing the ratio of errors and interaction response by leveraging the information extraction from the discrete and successive human inputs. CONCLUSION The fetched data are analyzed by classifying the errors at the initial stage to achieve reliable responses.

Cited by
More filters
Journal ArticleDOI
TL;DR: Various Artificial Intelligence (AI) techniques and tools for SC privacy protection are investigated and a case study of retail marketing is presented, which uses AI and SC to preserve its security and privacy.
Abstract: Applications of Blockchain (BC) technology and Cyber-Physical Systems (CPS) are increasing exponentially. However, framing resilient and correct smart contracts (SCs) for these smart application is a quite challenging task because of the complexity associated with them. SC is modernizing the traditional industrial, technical, and business processes. It is self-executable, self-verifiable, and embedded into the BC that eliminates the need for trusted third-party systems, which ultimately saves administration as well as service costs. It also improves system efficiency and reduces the associated security risks. However, SCs are well encouraging the new technological reforms in Industry 4.0, but still, various security and privacy challenges need to be addressed. In this paper, a survey on SC security vulnerabilities in the software code that can be easily hacked by a malicious user or may compromise the entire BC network is presented. As per the literature, the challenges related to SC security and privacy are not explored much by the authors around the world. From the existing proposals, it has been observed that designing a complex SCs cannot mitigate its privacy and security issues. So, this paper investigates various Artificial Intelligence (AI) techniques and tools for SC privacy protection. Then, open issues and challenges for AI-based SC are analyzed. Finally, a case study of retail marketing is presented, which uses AI and SC to preserve its security and privacy.

151 citations

Journal ArticleDOI
TL;DR: This article first encode the state of the service provisioning system and the resource allocation scheme and model the adjustment of allocated resources for services as a Markov decision process (MDP), and gets a trained resource allocating policy with the help of the reinforcement learning (RL) method.
Abstract: Edge computing (EC) is now emerging as a key paradigm to handle the increasing Internet-of-Things (IoT) devices connected to the edge of the network. By using the services deployed on the service provisioning system which is made up of edge servers nearby, these IoT devices are enabled to fulfill complex tasks effectively. Nevertheless, it also brings challenges in trustworthiness management. The volatile environment will make it difficult to comply with the service-level agreement (SLA), which is an important index of trustworthiness declared by these IoT services. In this article, by denoting the trustworthiness gain with how well the SLA can comply, we first encode the state of the service provisioning system and the resource allocation scheme and model the adjustment of allocated resources for services as a Markov decision process (MDP). Based on these, we get a trained resource allocating policy with the help of the reinforcement learning (RL) method. The trained policy can always maximize the services’ trustworthiness gain by generating appropriate resource allocation schemes dynamically according to the system states. By conducting a series of experiments on the YouTube request dataset, we show that the edge service provisioning system using our approach has 21.72% better performance at least compared to baselines.

112 citations

Journal ArticleDOI
TL;DR: A data-driven dynamic clustering framework for moderating the adverse economic impact of COVID-19 flare-up is proposed and the idea can be exploited for potentially the next waves of corona virus-related diseases and other upcoming viral life-threatening calamities.

111 citations

Journal ArticleDOI
TL;DR: This article designs a data collection and preprocessing scheme based on deep learning, which adopts the semisupervised learning algorithm of data augmentation and label guessing, which significantly reduces the amount of data uploaded to the cloud, and meanwhile protects the user's data privacy effectively.
Abstract: The development of smart cities and deep learning technology is changing our physical world to a cyber world. As one of the main applications, the Internet of Vehicles has been developing rapidly. However, privacy leakage and delay problem for data collection remain as the key concerns behind the fast development of the cyber intelligence technologies. If the original data collected are directly uploaded to the cloud for processing, it will bring huge load pressure and delay to the network communication. Moreover, during this process, it will lead to the leakage of data privacy. To this end, in this article we design a data collection and preprocessing scheme based on deep learning, which adopts the semisupervised learning algorithm of data augmentation and label guessing. Data filtering is performed at the edge layer, and a large amount of similar data and irrelevant data are cleared. If the edge device cannot process some complex data independently, it will send the processed and reliable data to the cloud for further processing, which maximizes the protection of user privacy. Our method significantly reduces the amount of data uploaded to the cloud, and meanwhile protects the user's data privacy effectively.

89 citations

Journal ArticleDOI
TL;DR: This paper introduces electric vehicles to conduct trust evaluation for heterogeneous vehicle network in smart cities and investigates the problem of minimizing transmission hops of trust evaluation as the mobile trust evaluation problem (MTEP).
Abstract: Smart cities can manage assets and resources efficiently by using different types of electronic data collection sensors, devices and vehicles However, growing complexity of systems and heterogeneous networking also enlarge the destructive effect of compromised or malicious sensor nodes In this paper, we introduce electric vehicles to conduct trust evaluation for heterogeneous vehicle network in smart cities Compared with traditional trust evaluation mechanism, mobility-based trust evaluation owns the advantages of low energy consumption and high evaluation accuracy Meanwhile, we investigate the problem of minimizing transmission hops of trust evaluation and refers to this as the mobile trust evaluation problem (MTEP) We first formalize the MTEP into an optimization problem and present a heuristic moving strategy of single electric vehicle Then, we consider the MTEP with multiple electric vehicles By scheduling the electric vehicles to access the nodes on spanning tree with maximum neighbor distance ratio, the algorithm can improve the efficiency of trust evaluation In experiments, we compare moving strategy of single electric vehicle and multiple electric vehicles with existing methods respectively The results demonstrate that the proposed algorithms are able to effectively reduce the entire transmission hops of trust evaluation and thus prolong the life of the network

75 citations