Special Issues

AI Powered Human-centric Computing with Cloud/Fog/Edge

Submission Deadline: 30 December 2023 (closed) View: 179

Guest Editors

Dr. Hongyang Yan, Guangzhou University, China.
Dr. Arif Ali Khan, University of Oulu, Finland.
Dr. Yanwei Xu, Tianjin University, China.
Dr. Maqbool Khan, Software Competence Center Hagenberg, Austria.
Dr. Wajid Rafique, University of Calgary, Canada.

Summary

In the past decade, human-centric computing (HCC) has emerged as a cross-disciplinary research domain that enables the effective integration of various human-related computational elements, benefiting the interactions and collaborations among the physical devices, cyber space and people significantly. Through intelligent HCC techniques, software and hardware engineers can develop various human-computer applications conveniently to satisfy the users’ sophisticated functional and non-functional requirements. However, HCC applications have been generating an unprecedented volume of industrial data and therefore, require the support of powerful computing and storage infrastructures. Fortunately, modern computing paradigms, e.g., cloud, fog and edge, provide a promising way to provision HCC applications the cloud/fog/edge resources in an economic and flexible manner. The adaption of cloud/fog/edge computing to HCC applications is a fundamental challenge and raise a variety of issues, e.g., time-efficient data transmission, energy-aware resource offloading, secure communications & collaborations, and so on.

Recently, Artificial Intelligence (AI) has emerged as one of the key technologies to realize intelligent cloud/fog/edge data processing. AI algorithms have the capability to process the streaming data generated at cloud/fog/edge networks, and provide powerful tools to deal with complex big data analytics. Therefore, the adaptation of AI-based methods is highly demanded to achieve their full potentials in cloud/fog/edge-based HCC applications. The security and privacy issues also call for efforts in order to guarantee service quality delivered by cloud/fog/edge-based HCC applications.


Keywords

Human-centered semantic analyses in Cloud/Fog/Edge
Knowledge-driven human-computer interaction in Cloud/Fog/Edge
Collaborative systems and decisions in Cloud/Fog/Edge
Intelligent big data analyses in HCC with Cloud/Fog/Edge
Security, privacy and trust in Cloud/Fog/Edge
AI algorithms for multi-agent systems in HCC
People-cyber-physical interactions in Cloud/Fog/Edge
AI powered smart applications in HCC
Power, energy and cost of HCC with Cloud/Fog/Edge
Intelligent interfaces and user modeling
Smart service quality optimization in HCC with Cloud/Fog/Edge
Multimedia applications in HCC with Cloud/Fog/Edge

Published Papers


  • Open Access

    ARTICLE

    Chase, Pounce, and Escape Optimization Algorithm

    Adel Sabry Eesa
    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 697-723, 2024, DOI:10.32604/iasc.2024.053192
    (This article belongs to the Special Issue: AI Powered Human-centric Computing with Cloud/Fog/Edge)
    Abstract While many metaheuristic optimization algorithms strive to address optimization challenges, they often grapple with the delicate balance between exploration and exploitation, leading to issues such as premature convergence, sensitivity to parameter settings, and difficulty in maintaining population diversity. In response to these challenges, this study introduces the Chase, Pounce, and Escape (CPE) algorithm, drawing inspiration from predator-prey dynamics. Unlike traditional optimization approaches, the CPE algorithm divides the population into two groups, each independently exploring the search space to efficiently navigate complex problem domains and avoid local optima. By incorporating a unique search mechanism that integrates More >

  • Open Access

    ARTICLE

    BArcherFuzzer: An Android System Services Fuzzier via Transaction Dependencies of BpBinder

    Jiawei Qin, Hua Zhang, Hanbing Yan, Tian Zhu, Song Hu, Dingyu Yan
    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 527-544, 2024, DOI:10.32604/iasc.2024.047509
    (This article belongs to the Special Issue: AI Powered Human-centric Computing with Cloud/Fog/Edge)
    Abstract By the analysis of vulnerabilities of Android native system services, we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and server. The existing research cannot find the above two types of vulnerabilities and the test cases of them face the problem of low coverage. In this paper, we propose an extraction method of test cases based on the native system services of the client and design a case construction method that supports multi-parameter mutation based on genetic algorithm and priority strategy. Based on the above method, More >

  • Open Access

    ARTICLE

    Attentive Neighborhood Feature Augmentation for Semi-supervised Learning

    Qi Liu, Jing Li, Xianmin Wang, Wenpeng Zhao
    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1753-1771, 2023, DOI:10.32604/iasc.2023.039600
    (This article belongs to the Special Issue: AI Powered Human-centric Computing with Cloud/Fog/Edge)
    Abstract Recent state-of-the-art semi-supervised learning (SSL) methods usually use data augmentations as core components. Such methods, however, are limited to simple transformations such as the augmentations under the instance’s naive representations or the augmentations under the instance’s semantic representations. To tackle this problem, we offer a unique insight into data augmentations and propose a novel data-augmentation-based semi-supervised learning method, called Attentive Neighborhood Feature Augmentation (ANFA). The motivation of our method lies in the observation that the relationship between the given feature and its neighborhood may contribute to constructing more reliable transformations for the data, and further… More >

  • Open Access

    ARTICLE

    Instance Reweighting Adversarial Training Based on Confused Label

    Zhicong Qiu, Xianmin Wang, Huawei Ma, Songcao Hou, Jing Li, Zuoyong Li
    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1243-1256, 2023, DOI:10.32604/iasc.2023.038241
    (This article belongs to the Special Issue: AI Powered Human-centric Computing with Cloud/Fog/Edge)
    Abstract Reweighting adversarial examples during training plays an essential role in improving the robustness of neural networks, which lies in the fact that examples closer to the decision boundaries are much more vulnerable to being attacked and should be given larger weights. The probability margin (PM) method is a promising approach to continuously and path-independently measuring such closeness between the example and decision boundary. However, the performance of PM is limited due to the fact that PM fails to effectively distinguish the examples having only one misclassified category and the ones with multiple misclassified categories, where… More >

Share Link