1 |
S. M. Moon, and J. W. Kim, "Collecting Health Data from Wearable Devices by Leveraging Salient Features in a Privacy-Preserving Manner," Journal of the Korea Society of Computer and Information, Vol. 25, No. 10, pp. 59-67, Oct. 2020.
DOI
|
2 |
J. H. Lim, and J. W. Kim, "Privacy-Preserving IoT Data Collection in Fog-Cloud Computing Environment," Journal of the Korea Society of Computer and Information Vol. 24, No. 9, pp. 43-49, Sep. 2019.
DOI
|
3 |
P. C. M. Arachchige, P. Bertok, I. Khalil, D. Liu, S. Camtepe, and M. Atiquzzaman, "Local differential privacy for deep learning," IEEE Internet of Things Journal, Vol. 7, No.7, pp. 5827-5842, Nov. 2019.
DOI
|
4 |
T. Mikolov, M. Karafiat, L. Burget, J. Cernocky, and S. Khudanpur, "Recurrent neural network based language model," Interspeech. Vol. 2, No. 3, pp. 1045-1048, Jul. 2010.
|
5 |
M. Moniruzzaman, H. Maoh, and W. Anderson, "Short-term prediction of border crossing time and traffic volume for commercial trucks: A case study for the Ambassador Bridge," Transportation Research Part C: Emerging Technologies, Vol.63, pp. 182-194, Feb. 2016.
DOI
|
6 |
D. P. Kingma, and J. Ba, "Adam: A method for stochastic optimization." arXiv preprint arXiv:1412.6980, Dec. 2014.
|
7 |
M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean, et al. "Tensorflow: A system for large-scale machine learning." 12th {USENIX} symposium on operating systems design and implementation ({OSDI} 16). Nov. 2016.
|
8 |
T. Chai, and R. R. Draxler, "Root mean square error (RMSE) or mean absolute error (MAE)?-Arguments against avoiding RMSE in the literature," Geoscientific model development, Vol. 7, No. 3, pp. 1247-1250, Jun. 2014.
DOI
|
9 |
H. Sak, A. W. Senior, and F. Beaufays, "Long short-term memory recurrent neural network architectures for large scale acoustic modeling." Sep. 2014.
|
10 |
Seoul Metropolitan Government.Big Data Campus, https://bigdata.seoul.go.kr/
|
11 |
C. J. Willmott, and K. Matsuura, "Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance.", Climate research Vol. 30, No. 1, pp. 79-82, Dec. 2005.
DOI
|
12 |
C. Dwork, "Differential privacy," International Colloquium on Automata, Languages, and Programming, Springer, Berlin, Heidelberg, pp. 1-12 Jul. 2006.
|
13 |
N. Lu, N. Cheng, N. Zhang, X. Shen, and J. W. Mark, "Connected vehicles: Solutions and challenges," IEEE internet of things journal, Vol. 1, No. 4, pp. 289-299, Aug. 2014.
DOI
|
14 |
J. W. Kim, J. H. Lim, S. M. Moon, and B. Jang, "Collecting health lifelog data from smartwatch users in a privacy-preserving manner," IEEE Transactions on Consumer Electronics, Vol. 65, No. 3, pp. 369-378, Aug. 2019.
DOI
|
15 |
H. Feng, and Y. Shu, "Study on network traffic prediction techniques," Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005., IEEE, Vol. 2, pp. 1041-1044, Dec. 2005.
|
16 |
H. Yao, X. Tang, H. Wei, G. Zheng, and Z. Li, "Revisiting spatial-temporal similarity: A deep learning framework for traffic prediction," Proceedings of the AAAI conference on artificial intelligence, Vol. 33, No. 01, pp. 5668-5675, Jul. 2019.
|
17 |
J. Z. Zhu, J. Z. Cao, and Y. Zhu, "Traffic volume forecasting based on radial basis function neural network with the consideration of traffic flows at the adjacent intersections," Transportation Research Part C: Emerging Technologies, Vol. 47, pp. 139-154, Oct. 2014.
DOI
|
18 |
T. T. Nguyen, X. Xiao, Y. Yang, S. C. Hui, H. Shin, and J. Shin, "Collecting and analyzing data from smart device users with local differential privacy," arXiv preprint arXiv:1606.05053 Jul. 2016.
|
19 |
A. M. Nagy, and V. Simon, "Survey on traffic prediction in smart cities," Pervasive and Mobile Computing, Vol. 50, pp. 148-163, Oct. 2018
DOI
|
20 |
N. K. Jain, R. K. Saini, and P. Mittal, "A review on traffic monitoring system techniques," Soft Computing: Theories and Applications. Springer, Singapore, pp.569-577. Aug. 2019.
|
21 |
X. Yin, G. Wu, J. Wei, Y. Shen, H. Qi, and B. Yin, "A comprehensive survey on traffic prediction,." arXiv preprint arXiv:2004.08555 Apr. 2020.
|
22 |
S. M. Moon, and J. W. Kim, "Privacy-Preserving Method to Collect Health Data from Smartband," Journal of the Korea Society of Computer and Information, Vol. 25, No. 4, pp. 113-121, Apr. 2020.
|
23 |
S. Hochreiter, and J. Schmidhuber, "Long short-term memory," Neural computation, Vol. 9, No. 8, pp. 1735-1780, Nov. 1997.
DOI
|
24 |
J. W. Kim, S. M. Moon, S. Kang, B. Jang "Effective privacy-preserving collection of health data from a user's wearable device." Applied Sciences Oct. 2020.
|
25 |
F. Yang, S. Wang, J. Li, Z. Liu, and Q. Sun, "An overview of internet of vehicles," China communications, Vol. 11, No. 10, pp.1-15, Oct. 2014.
|
26 |
Ministry of Land, Infrastructure and Transport, Automobile Operation Insurance Division, https://index.go.kr
|
27 |
J. W. Kim, K Edemacu, J. S. Kim, Y. D. Chung, B. Jang "A Survey of Differential Privacy-based Techniques and their Applicability to Location-Based Services." Computers and Security Sep. 2021.
|
28 |
J. H. Lim, and J. W. Kim. "Privacy-Preserving Aggregation of IoT Data with Distributed Differential Privacy," Journal of the Korea Society of Computer and Information Vol. 25, No. 6, pp. 65-72, June. 2020.
|
29 |
J. W. Kim, and B. Jang. "Workload-aware indoor positioning data collection via local differential privacy," IEEE Communications Letters, Vol. 23, No. 8, pp. 1352-1356, Aug. 2019.
DOI
|