Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Pedestrian and Vehicle Detection Based on Pruning YOLOv4 with Cloud-Edge Collaboration

    Huabin Wang1, Ruichao Mo2, Yuping Chen3, Weiwei Lin2,4,*, Minxian Xu5, Bo Liu3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 2025-2047, 2023, DOI:10.32604/cmes.2023.026910 - 26 June 2023

    Abstract Nowadays, the rapid development of edge computing has driven an increasing number of deep learning applications deployed at the edge of the network, such as pedestrian and vehicle detection, to provide efficient intelligent services to mobile users. However, as the accuracy requirements continue to increase, the components of deep learning models for pedestrian and vehicle detection, such as YOLOv4, become more sophisticated and the computing resources required for model training are increasing dramatically, which in turn leads to significant challenges in achieving effective deployment on resource-constrained edge devices while ensuring the high accuracy performance. For… More >

  • Open Access

    ARTICLE

    Anomaly Detection and Access Control for Cloud-Edge Collaboration Networks

    Bingcheng Jiang, Qian He*, Zhongyi Zhai, Hang Su

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2335-2353, 2023, DOI:10.32604/iasc.2023.039989 - 21 June 2023

    Abstract Software-defined networking (SDN) enables the separation of control and data planes, allowing for centralized control and management of the network. Without adequate access control methods, the risk of unauthorized access to the network and its resources increases significantly. This can result in various security breaches. In addition, if authorized devices are attacked or controlled by hackers, they may turn into malicious devices, which can cause severe damage to the network if their abnormal behaviour goes undetected and their access privileges are not promptly restricted. To solve those problems, an anomaly detection and access control mechanism… More >

Displaying 1-10 on page 1 of 2. Per Page