2021
DOI: 10.1109/jsac.2020.3020677
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Transfer Learning for Emotion Recognition Under Cloud-Edge-Client Collaborations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
23
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8
1

Relationship

3
6

Authors

Journals

citations
Cited by 56 publications
(23 citation statements)
references
References 39 publications
0
23
0
Order By: Relevance
“…e rapid developments of big data, Internet of ings (IoT), and the fifth-generation mobile communication (5G) technologies promote an explosion growth in data volumes generated by users' mobile devices, which also result in the widespread popularity and further upgrading of 5G cloud storage services in cloud service provider (CSP) [1][2][3]. CSP provides users with massive data storage services without requiring the users to store data in local devices [4], which not only saves users' a large amount of money for building their own storage, but also can search and retrieve the required data more quickly and share the data with other users more expediently, such as Dropbox, Baidu Cloud, and Alibaba Cloud [5][6][7].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…e rapid developments of big data, Internet of ings (IoT), and the fifth-generation mobile communication (5G) technologies promote an explosion growth in data volumes generated by users' mobile devices, which also result in the widespread popularity and further upgrading of 5G cloud storage services in cloud service provider (CSP) [1][2][3]. CSP provides users with massive data storage services without requiring the users to store data in local devices [4], which not only saves users' a large amount of money for building their own storage, but also can search and retrieve the required data more quickly and share the data with other users more expediently, such as Dropbox, Baidu Cloud, and Alibaba Cloud [5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…scheme uses KP-ABE algorithm to encrypt data, and the ciphertext is related to the attribute set. As the data size increases, the number of input: random data block f R transpose rule output: a series of random data blocks (1) Begin;(2) for j ←0 to m do(3) DivideFile(f R , l 1 ) ⟶ d r1 , d r2 , . .…”
mentioning
confidence: 99%
“…In order to help realize the utilization potentiality of the Internet of Things (IoT), the WSN virtualization architecture is emerging to overcome the inefficiencies of proprietary, single-purpose, single-user WSNs [ 2 , 3 ]. Driven by the developing needs of the IoT, the 5G mMTC scenario should deploy a huge number of sensors [ 4 , 5 , 6 ], while the traditional WSN in the public area is generally laid separately by each user for his specific task, which is unavailable for other users even if the state of WSN is idle. Some other sensing nodes need to be deployed when the user performs other types of sensing tasks, which leads to the high cost and low reuse rate.…”
Section: Introductionmentioning
confidence: 99%
“…Data owners (e.g., mobile and smart device users) enjoy personalized services by gaining various application privileges while data collectors (e.g., service providers and application developers) obtain vast amounts of personal sensitive and security-critical data through privileged interfaces [6]. Such user data become attractive targets of attacks and are subject to serious privacy disclosures [7,8].…”
Section: Introductionmentioning
confidence: 99%