4.6 Article

Launching an Efficient Participatory Sensing Campaign: A Smart Mobile Device-Based Approach

Publisher

ASSOC COMPUTING MACHINERY
DOI: 10.1145/2808198

Keywords

Design; Algorithms; Performance; Participatory sensing; deployment; recruitment; tensor; DTA; trajectory

Ask authors/readers for more resources

Participatory sensing is a promising sensing paradigm that enables collection, processing, dissemination and analysis of the phenomena of interest by ordinary citizens through their handheld sensing devices. Participatory sensing has huge potential in many applications, such as smart transportation and air quality monitoring. However, participants may submit low-quality, misleading, inaccurate, or even malicious data if a participatory sensing campaign is not launched effectively. Therefore, it has become a significant issue to establish an efficient participatory sensing campaign for improving the data quality. This article proposes a novel five-tier framework of participatory sensing and addresses several technical challenges in this proposed framework including: (1) optimized deployment of data collection points (DC-points); and (2) efficient recruitment strategy of participants. Toward this end, the deployment of DC-points is formulated as an optimization problem with maximum utilization of sensor and then a Wise-Dynamic DC-points Deployment (WD3) algorithm is designed for high-quality sensing. Furthermore, to guarantee the reliable sensing data collection and communication, a trajectory-based strategy for participant recruitment is proposed to enable campaign organizers to identify well-suited participants for data sensing based on a joint consideration of temporal availability, trust, and energy. Extensive experiments and performance analysis of the proposed framework and associated algorithms are conducted. The results demonstrate that the proposed algorithm can achieve a good sensing coverage with a smaller number of DC-points, and the participants that are termed as social sensors are easily selected, to evaluate the feasibility and extensibility of the proposed recruitment strategies.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

CRB Weighted Source Localization Method Based on Deep Neural Networks in Multi-UAV Network

Jingyu Cong, Xianpeng Wang, Chenggang Yan, Laurence T. Yang, Mianxiong Dong, Kaoru Ota

Summary: With the development of the Internet of Things (IoT), the use of multi-unmanned aerial vehicle (UAV) networks for source detection and localization has gained attention. However, the real-time signal processing of UAVs is limited by computing speed and embedded hardware accuracy, reducing the effectiveness of source localization. This study proposes a Cramer-Rao bound (CRB) weighted multi-UAV network source localization method, using deep neural networks (DNNs) and spatial-spectrum fitting (SSF) to improve accuracy and computational efficiency. The proposed method utilizes UAVs equipped with radar arrays and a deep SSF (DeepSSF) algorithm to achieve accurate DOA estimation.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Theory & Methods

How Can Incentive Mechanisms and Blockchain Benefit with Each Other? A Survey

Rong Han, Zheng Yan, Xueqin Liang, Laurence T. Yang

Summary: In a blockchain-based system, designing a feasible incentive mechanism becomes essential to improve system performance by regulating entity behaviors. This study proposes evaluation requirements and taxonomies for incentive mechanisms in blockchain systems. Through a thorough review, the study discusses the advantages and disadvantages of existing incentive mechanisms and identifies unresolved issues and potential directions for future research on the relationship between incentive mechanisms and blockchain.

ACM COMPUTING SURVEYS (2023)

Article Automation & Control Systems

Jointly Low-Rank Tensor Completion for Estimating Missing Spatiotemporal Values in Logistics Systems

Yuan Gao, Laurence T. Yang, Jing Yang, Dehua Zheng, Yaliang Zhao

Summary: In this article, a jointly low-rank tensor completion method is proposed for logistics data completion, which constructs multiple periodic subtensors by setting an appropriate time window and performs jointly low-rank completion and imputation. Experimental results demonstrate the promising performance of the proposed method compared with other state-of-the-art competitors in logistics systems.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Automation & Control Systems

Multirelational Tensor Graph Attention Networks for Knowledge Fusion in Smart Enterprise Systems

Jing Yang, Laurence Tianruo Yang, Hao Wang, Yuan Gao

Summary: Augmented Intelligence of Things, empowered by knowledge graph, drives cognitive intelligence in smart enterprise management systems. The proposed MR-GAT approach effectively improves the accuracy of knowledge fusion by utilizing tensor-based graph attention networks for multirelational graph representation learning.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Automation & Control Systems

An Efficient Approach to Sharing Edge Knowledge in 5G-Enabled Industrial Internet of Things

Yaguang Lin, Xiaoming Wang, Hongguang Ma, Liang Wang, Fei Hao, Zhipeng Cai

Summary: This article proposes a decentralized knowledge sharing platform for the industrial Internet of Things (IIoT), including public knowledge sharing and private knowledge sharing. For public knowledge, a dynamics model is established to quantitatively describe the sharing process, and an optimal control method is presented. For private knowledge, a trusted transaction control method based on blockchain technology is proposed to protect knowledge integrity and privacy.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Automation & Control Systems

TCE-IDS: Time Interval Conditional Entropy- Based Intrusion Detection System for Automotive Controller Area Networks

Zhangwei Yu, Yan Liu, Guoqi Xie, Renfa Li, Siming Liu, Laurence T. Yang

Summary: Intelligent connected vehicles are experiencing rapid growth, but this also increases the vulnerability of automotive CAN networks to cyberattacks. Existing intrusion detection technologies for automotive CAN networks are often ineffective against sophisticated attacks. In this study, a novel time interval conditional entropy method is proposed, which shows higher accuracy and ease of deployment compared to existing methods.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Hardware & Architecture

A Socially-Aware Dependent Tasks Offloading Strategy in Mobile Edge Computing

Yanqi Gong, Fei Hao, Liang Wang, Liang Zhao, Geyong Min

Summary: This paper presents a Mobile Edge Computing (MEC) model based on a dependent task offloading strategy, which achieves efficient offloading and execution solutions by considering social relationships between users and factors such as network latency and energy consumption. Experimental results demonstrate that the proposed strategy significantly reduces overhead compared to other baseline strategies.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2023)

Article Computer Science, Information Systems

Dual-LightGCN: Dual light graph convolutional network for discriminative recommendation

Wenqing Huang, Fei Hao, Jiaxing Shang, Wangyang Yu, Shengke Zeng, Carmen Bisogni, Vincenzo Loia

Summary: In recent years, graph neural networks have been important in graph data analysis, and the use of graph convolutional networks (GCN) in recommender systems has been extensively studied. This paper proposes a novel dual light graph convolutional network model called Dual-LightGCN, which filters disliked items to achieve more discriminative recommendations. The model divides the user-item interaction graph into two bipartite subgraphs, one for modeling user-item preferences and the other for modeling dislike relationships. Results show that Dual-LightGCN significantly improves F1-score compared to other recommendation algorithms, making it suitable for deployment in various IoT scenarios.

COMPUTER COMMUNICATIONS (2023)

Article Computer Science, Artificial Intelligence

Symbiotic Attention for Egocentric Action Recognition With Object-Centric Alignment

Xiaohan Wang, Linchao Zhu, Yu Wu, Yi Yang

Summary: In this paper, a framework called SAOA is proposed to tackle egocentric action recognition by suppressing background distractors and enhancing action-relevant interactions. The framework introduces two extra sources of information, spatial location and discriminative features of candidate objects, to enable concentration on the occurring interactions. It includes an object-centric feature alignment method and a symbiotic attention mechanism to provide meticulous reasoning between the actor and the environment, achieving state-of-the-art performance on the largest egocentric video dataset.

IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2023)

Article Computer Science, Hardware & Architecture

Decentralized P2P Federated Learning for Privacy-Preserving and Resilient Mobile Robotic Systems

Xiaokang Zhou, Wei Liang, Kevin I-Kai Wang, Zheng Yan, Laurence T. Yang, Wei Wei, Jianhua Ma, Qun Jin

Summary: In this article, a Peer-to-Peer (P2P) based Privacy-Perceiving Asynchronous Federated Learning (PPAFL) framework is introduced for secure and resilient decentralized model training in modern mobile robotic systems. This framework uses reputation-aware coordination and secret sharing based communication mechanisms to achieve encrypted P2P federated learning and anonymous local model updates.

IEEE WIRELESS COMMUNICATIONS (2023)

Article Computer Science, Artificial Intelligence

HMSG: Heterogeneous graph neural network based on Metapath SubGraph learning

Mengya Guan, Xinjun Cai, Jiaxing Shang, Fei Hao, Dajiang Liu, Xianlong Jiao, Wancheng Ni

Summary: This paper proposes a new HGNN model named HMSG, which can comprehensively capture structural, semantic, and attribute information from both homogeneous and heterogeneous neighbors more purposefully. The performance of HMSG is evaluated through multiple graph-mining tasks and outperforms state-of-the-art baselines.

KNOWLEDGE-BASED SYSTEMS (2023)

Article Computer Science, Artificial Intelligence

Domain-Adaptive Graph Attention-Supervised Network for Cross-Network Edge Classification

Xiao Shen, Mengqiu Shao, Shirui Pan, Laurence T. Yang, Xi Zhou

Summary: This paper proposes a novel domain-adaptive graph attention-supervised network (DGASN) to effectively tackle the problem of cross-network homophilous and heterophilous edge classification (CNHHEC), and achieves state-of-the-art performance in CNHHEC according to extensive experiments on real-world benchmark datasets.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2023)

Article Computer Science, Information Systems

Tensor-Empowered Federated Learning for Cyber-Physical-Social Computing and Communication Systems

Laurence T. Yang, Ruonan Zhao, Debin Liu, Wanli Lu, Xianjun Deng

Summary: The deep fusion of human-centered Cyber-Physical-Social Systems (CPSSs) and the importance of big data for providing proactive and accurate wisdom services are discussed. The traditional data centralized learning paradigm is no longer suitable due to concerns about data privacy and security. Federated Learning (FL) is introduced as a distributed privacy-preserving machine learning paradigm with great research significance and application values. The overview and extensive researches on FL from the perspective of human-centered CPSSs and tensor theory are presented. The theory about tensor representation, operation and decomposition, as well as tensor-empowered solutions for heterogeneous resource management, communication overhead, security and privacy are described.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2023)

Article Computer Science, Cybernetics

Tensor-Based Baum-Welch Algorithms in Coupled Hidden Markov Model for Responsible Activity Prediction

Shunli Zhang, Laurence T. Yang, Yue Zhang, Zhixing Lu, Jing Yu, Zongmin Cui

Summary: The development and applications of artificial intelligence (AI) bring both unprecedented opportunities and challenges for humans. Responsible AI offers a solution by incorporating social/physical rules into AI systems. However, these rules are challenging to formalize. In this article, we propose a data-driven responsible CPSS framework that mines valuable rules from CPSS data to optimize CPSS adaptively.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

Article Computer Science, Cybernetics

AFCMiner: Finding Absolute Fair Cliques From Attributed Social Networks for Responsible Computational Social Systems

Fei Hao, Yixuan Yang, Jiaxing Shang, Doo-Soon Park

Summary: This article emphasizes the importance of cohesive subgraph mining on attributed social networks and introduces a new problem that incorporates fairness into cliques model. The article proposes an efficient algorithm called AFCMiner to detect absolute fair cliques in different types of attributive social networks. Extensive experiments show that AFCMiner significantly reduces the time for finding absolute fair cliques while ensuring correctness. A case study demonstrates the usefulness of the proposed model.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2023)

No Data Available