A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit <a rel="external noopener" href="https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.293">the original URL</a>. The file type is <code>application/pdf</code>.
<a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qtl3kjm3l5f4fayo2qubpvvvyi" style="color: black;">Internet Technology Letters</a>
MOTIVATION With the popularization of smart and Internet of Things (IoT) devices, a tremendous amount of data is being produced by devices distributed everywhere on the globe. Meanwhile, many new smart applications are appearing which require Internet connection to operate. Artificial intelligence (AI)-driven IoT and network applications has been widely recognized as a promising solution for smart scenarios. 1,2 For IoT and emerging smart applications (eg, smart city, smart healthcare, and<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/itl2.293">doi:10.1002/itl2.293</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wa7rfulktjdxlacscv545w74ya">fatcat:wa7rfulktjdxlacscv545w74ya</a> </span>
more »... agriculture), it is often unfeasible to collect thousands of uniformly distributed data from heterogeneous distributed devices to train a reasonable model. Such systems typically only use relatively a small amount of samples to train a goal-oriented model which could be heavily affected by minor anomalies. Therefore, in the IoT and emerging network applications, it is urgent to detect anomalies from the collected samples to alleviate the side effect on model training. 3, 4 Anomalies can be defined as the patterns that do not conform to expected behavior. 5,6 Actually, anomalies can appear in different forms in real applications, f.i., illegal intrusions on the Internet of services, 7 irregular behaviors in the scenario of smart city, 8 and abnormal events in smart agriculture. 9 Anomaly detection has been researched for several decades and many anomaly detection methods have been proposed so far. However, an important open question to be answered is how to use anomaly detection methods to find minor meaningful patterns in real applications. This special issue will focus on identifying minor anomalies in real applications by using state-of-the-art anomaly detection methods. Examples of applications can be found in many fields, f.i., The key issues when using intelligent computing to enhance IoT applications and services are the data collected by the associated applications and devices. The quality of the collected data are strongly affect the performance of intelligent computing. Additionally, some IoT applications pay more attention to minor anomalies, such as emergent event, unusual visiting. Thus, it needs to consider to improve the quality of collected data as well as the minor anomalies when adopting intelligent computing for IoT applications and services. Internet Technology Letters. 2021;4:e293. wileyonlinelibrary.com/journal/itl2
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210718071311/https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/itl2.293" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fd/fd/fdfd60aa9fc4d6950e462b68c1e14696061141bc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/itl2.293"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>