暂无分享,去创建一个
[1] Tony Q. S. Quek,et al. Coordinated Container Migration and Base Station Handover in Mobile Edge Computing , 2020, GLOBECOM 2020 - 2020 IEEE Global Communications Conference.
[2] Tony Q. S. Quek,et al. Contextual-Bandit Anomaly Detection for IoT Data in Distributed Hierarchical Edge Computing , 2020, 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS).
[3] Tony Q. S. Quek,et al. Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing , 2020, ArXiv.
[4] Raphaël Marinier,et al. SEED RL: Scalable and Efficient Deep-RL with Accelerated Central Inference , 2019, ICLR.
[5] Wei Sun,et al. Robust Anomaly Detection for Multivariate Time Series through Stochastic Recurrent Neural Network , 2019, KDD.
[6] Tony Q. S. Quek,et al. Enabling intelligence in fog computing to achieve energy and latency reduction , 2019, Digit. Commun. Networks.
[7] Mianxiong Dong,et al. AAIoT: Accelerating Artificial Intelligence in IoT Systems , 2019, IEEE Wireless Communications Letters.
[8] Raghavendra Chalapathy University of Sydney,et al. Deep Learning for Anomaly Detection: A Survey , 2019, ArXiv.
[9] Yehia El-khatib,et al. Adaptive deep learning model selection on embedded systems , 2018, LCTES.
[10] Tie Luo,et al. Distributed Anomaly Detection Using Autoencoder Neural Networks in WSN for IoT , 2018, 2018 IEEE International Conference on Communications (ICC).
[11] Mianxiong Dong,et al. Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing , 2018, IEEE Network.
[12] Mohsen Guizani,et al. Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[13] Larry S. Davis,et al. BlockDrop: Dynamic Inference Paths in Residual Networks , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[14] Mahadev Satyanarayanan,et al. An empirical study of latency in an emerging class of edge computing applications for wearable cognitive assistance , 2017, SEC.
[15] H. T. Kung,et al. Distributed Deep Neural Networks Over the Cloud, the Edge and End Devices , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[16] Trevor N. Mudge,et al. Neurosurgeon: Collaborative Intelligence Between the Cloud and Mobile Edge , 2017, ASPLOS.
[17] Jiwen Lu,et al. Runtime Neural Pruning , 2017, NIPS.
[18] Akash Singh,et al. Anomaly Detection for Temporal Data using Long Short-Term Memory (LSTM) , 2017 .
[19] H. T. Kung,et al. BranchyNet: Fast inference via early exiting from deep neural networks , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).
[20] Lovekesh Vig,et al. LSTM-based Encoder-Decoder for Multi-sensor Anomaly Detection , 2016, ArXiv.
[21] Song Han,et al. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding , 2015, ICLR.
[22] Samy Bengio,et al. Scheduled Sampling for Sequence Prediction with Recurrent Neural Networks , 2015, NIPS.
[23] Geoffrey E. Hinton,et al. Distilling the Knowledge in a Neural Network , 2015, ArXiv.
[24] Lovekesh Vig,et al. Long Short Term Memory Networks for Anomaly Detection in Time Series , 2015, ESANN.
[25] Quoc V. Le,et al. Sequence to Sequence Learning with Neural Networks , 2014, NIPS.
[26] Charu C. Aggarwal,et al. Outlier Detection for Temporal Data: A Survey , 2014, IEEE Transactions on Knowledge and Data Engineering.
[27] Eamonn J. Keogh,et al. HOT SAX: efficiently finding the most unusual time series subsequence , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[28] Ronald J. Williams,et al. Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning , 2004, Machine Learning.
[29] Yishay Mansour,et al. Policy Gradient Methods for Reinforcement Learning with Function Approximation , 1999, NIPS.