About
656
Publications
147,493
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
19,093
Citations
Citations since 2017
Introduction
Publications
Publications (656)
Skin cancer, particularly melanoma, has remained a severe issue for many years due to its increasing incidences. The rising mortality rate associated with melanoma demands immediate attention at early stages to facilitate timely diagnosis and effective treatment. Due to the similar visual appearance of malignant tumors and normal cells, the detecti...
Although Digital Twins (DTs) became very popular in industry, nowadays they represent a pre-requisite of many systems across different domains, by taking advantage of the disrupting digital technologies such as Artificial Intelligence (AI), Edge Computing and Internet of Things (IoT). In this paper we present our “opportunistic” interpretation, whi...
Collaborative software crowdsourcing (CSC) is now a vital part of the technological workforce due to the rising need for software solutions in an industry 5.0 smart city that exceeds performance standards without sacrificing cost-effectiveness. When a buyer intends to hire a group of productive workers within their budget limit and time frame, the...
The integration of artificial intelligence (AI) with cyber–physical–social systems (CPSS) creates new research opportunities and challenges with major societal implications. The behavioral and cognitive enhancement of intelligent systems promotes a productive and creative partnership and collaboration between humans and machines. Advancements in th...
Transport Mode Detection (TMD) has become a crucial part of Intelligent Transportation Systems (ITS) thanks to the recent advancements in Artificial Intelligence and the Internet of Things, which enable the collection and processing of a vast amount of information on how people move and behave over space and time. Since smartphones and smartwatches...
Network agility, automation, and intelligence are at the forefront of the next-generation networks (NGNs) vision, which aims to provide zero-touch service management and self-optimizing networks. In this article, we give an overview of the significance of artificial intelligence (AI)-enabled NGNs, their projected benefits, design requirements, and...
With the raise of Internet of Things (IoT), the Digital Twin (DT) concept came across newfound lifeblood. The rapidly growing volume and breadth of data that can be captured, processed and forwarded by the smart devices through IoT-related technology, indeed, represent a key enabling factor for making DTs finally ready for prime time, beyond the bo...
Background and objective:
Survival prediction of heart failure patients is critical to improve the prognostic management of the cardiovascular disease. The existing survival prediction methods focus on the clinical information while lacking the cardiac motion information. we propose a motion-based analysis method to predict the survival risk of he...
The Edge Intelligence (EI) paradigm has recently emerged as a promising solution to overcome the inherent limitations of cloud computing (latency, autonomy, cost, etc.) in the development and provision of next-generation Internet of Things (IoT) services. Therefore, motivated by its increasing popularity, relevant research effort was expended in or...
Engineering structures and infrastructure continue to be used despite approaching or having reached their design lifetime. While contact-based measurement techniques are challenging to implement at a large scale and provide information at discrete locations only, non-contact methods are more user-friendly and offer accurate, robust, and continuous...
Given its advantages in low latency, fast response, context-aware services, mobility, and privacy preservation, edge computing has emerged as the key support for intelligent applications and 5G/6G Internet of things (IoT) networks. This technology extends the cloud by providing intermediate services at the edge of the network and improving the qual...
Positioning systems have gained paramount importance for many different productive sector; however, traditional systems such as Global Positioning System (GPS) have failed to offer accurate and scalable solutions for indoor positioning requirements. Nowadays, alternative solutions such as fingerprinting allow the recognition of the characteristic s...
Continuous advancements of technologies such as machine-to-machine interactions and big data analysis have led to the internet of things (IoT) making information sharing and smart decision-making possible using everyday devices. On the other hand, swarm intelligence (SI) algorithms seek to establish constructive interaction among agents regardless...
The early, valid prediction of heart problems would minimize life threats and save lives, while lack of prediction and false diagnosis can be fatal. Addressing a single dataset alone to build a machine learning model for the identification of heart problems is not practical because each country and hospital has its own data schema, structure, and q...
The Metaverse is an emerging concept that aims to integrate the physical and virtual worlds, creating a shared 3D virtual world where users can interact and immerse in new experiences. With the rise of Metaverse-driven Cyber-Physical-Social Systems (CPSSs), integrating drones as a critical technology in the Metaverse has become increasingly importa...
In practical cyber-manufacturing systems (CMS), the node component is the forwarder of information and the provider of services. This dual role makes the whole system have the typical physical-services interaction characteristic, making CMS more vulnerable to cascading failures than general manufacturing systems. In this work, in order to reasonabl...
With the evaluation of cellular network internet data traffic, forecasting and understanding traffic patterns become the critical objectives for managing the network-designed Quality of Service (QoS) benchmark. For this purpose, cellular network planners often use different methodologies for predicting data traffic. However, traditional traffic for...
The blockchain paradigm is currently modifying all the major Internet of Things (IoT) application domains, giving the opportunity of constructing decentralized environments in which trustful and anonymous activities can be efficiently performed. Blockchain proposes an approach which assures data saved on a distributed ledger would be continuously s...
The expeditious propagation of Internet of Things (IoT) technologies implanted in different smart devices such as smartphones and smartwatches have a ubiquitous consequence on the modern population. These devices are employed to collect data and to aid in tracking and analyzing the users’ daily activities using various human activity monitoring and...
Securing Electronic Medical Records (EMRs) is one of the most critical applications of cryptography over the Internet due to the value and importance of data contained in such EMRs. Although blockchain-based healthcare systems can provide security, privacy, and immutability to EMRs, several outstanding security and latency issues are associated wit...
In this paper, a sustainable routing algorithm for vehicle platoons operating in smart urban networks is presented. The proposed approach makes use of deep reinforcement learning (DRL) and set-theoretic model predictive control (MPC). In particular, the learning process aims at reducing traffic congestion and
$CO_2$
emissions, whereas the MPC uni...
The healthcare industry faces challenges due to rising treatment costs, an aging population, and limited medical resources. Remote monitoring technology offers a promising solution to these issues. This paper introduces an innovative adaptive method that deploys an Ultra-Wideband (UWB) radar-based Internet-of-Medical-Things (IoMT) system to remotel...
In the Cognitive Internet of Vehicles (CIoV), vehicles, road side units (RSU) and other key nodes have been equipped with more and more software to support intelligent transportation system (ITS), vehicle automatic control and intelligent road information services. Additionally, technological innovation forces the software in the CIoV to update and...
Cryptocurrencies are the new form of trade that has revolutionized how we look into our financial institutions. Bitcoin dominates the industry with the highest market share among the hundreds of other cryptocurrencies. However, high energy consumption leading to increasing carbon emission, prioritizing high-value transactions, and long waiting time...
The Internet of Things (IoT) promises to change many aspects of our daily lives thanks to the opportunity of interconnecting a massive numbers of smart objects with increasing computational, storage, communication, and power capabilities, in such a way making “smart” and “interactive” most of the world around us. In other words, smart objects and h...
With the rise of the Industrial Internet of Things (IIoT), more and more industrial devices can be connected via the network. Data collection, processing, analysis, task execution, and other devices that can product network traffic volume are gradually being deployed to IIoT. However, under the limited spectrum resources and low-cost and low-energy...
Research trends are pushing artificial intelligence (AI) across the Internet of Things (IoT)–edge–fog–cloud continuum to enable effective data analytics, decision making, as well as the efficient use of resources for QoS targets. Approaches for collective adaptive systems (CASs) engineering, such as aggregate computing, provide declarative programm...
Internet of Things (IoT) is gaining importance as its applications are found in many critical infrastructure sectors (e.g., Industry 4.0, healthcare, transportation, and commercial facilities). This reinforces the importance of investigating the security risks associated with IoT deployment. Hence, in this paper, we perform a comprehensive review o...
The task of identifying malicious activities in logs and predicting threats is crucial nowadays in industrial sector. In this paper, we focus on the identification of past malicious activities and in the prediction of future threats by proposing a novel technique based on the combination of Marked Temporal Point Processes (MTTP) and Neural Networks...
Recent years have witnessed an increasing popularity of wireless body area network (WBAN), with which continuous collection of physiological signals can be conveniently performed for healthcare monitoring. Energy consumption is a critical issue because it directly affects the duration of the equipped sensors. In this paper, we propose a low-cost an...
Background and objective:
COVID-19 outbreak has become one of the most challenging problems for human being. It is a communicable disease caused by a new coronavirus strain, which infected over 375 million people already and caused almost 6 million deaths. This paper aims to develop and design a framework for early diagnosis and fast classificatio...
As development steadily advances and the capacity for practical applications grows, 5G networks are being deeply expanded in many fields, such as manufacturing, transportation and logistics, and agriculture. The rapid growth in the number of devices in application deployments is causing manual methods of managing resources to become inefficient and...
Ambient intelligence (AmI) refers to the ability of devices to interact seamlessly with their surroundings. An increased use of IoT in ambient intelligence has led to a heightened concern for cybersecurity. Vulnerabilities in the software or firmware of IoT devices have been exploited by hackers to gain control of the devices or the networks. They...
The Internet of Things (IoT) aims to enable a scenario where smart objects, inserted into information networks, supply smart services for human beings. The introduction of edge computing in IoT can reduce the decision-making latency, save bandwidth resources, and expand the cloud services to be allocated at the network’s edge. However, edge-based I...
The COVID-19 pandemic has impacted the lifestyle of people in every community and workplace, including universities. There, places like cafeterias where people are expected to not wear a mask for the majority of time, i.e., while eating or drinking, are potentially very risky. In such scenarios, the Internet of Things (IoT) technological stack and...
In recent years many amazing deep learning models have been developed, but in the process of practical applications, people often find that these deep learning models have high requirements for hardware storage space and computing power. In Artificial Intelligent of Things (AIoT) scenario, the computing power of the edge or terminal side are relati...
With the emerging need for human–machine interactions, multi-modal sensory interaction is gradually pursued rather than satisfying common perception forms (visual or auditory), so developing flexible, adaptive, and stiffness-variable force-sensing devices is the key to further promoting human–machine fusion. However, current sensor sensitivity is f...
In the last fifteen years, there has been a widespread diffusion of wearable sensorized devices for a plethora of applications in heterogeneous domains. Wearable technology provides fundamental capabilities such as smart sensing, monitoring, data recording, and multi-modal interaction, in a seamless, pervasive, and easy-to-use way. An emerging rese...
The use of wearable devices in daily activities is continuously and rapidly growing. Wearable technology provides seamless sensing, monitoring, multimodal interaction, without continuous manual intervention and effort for users. These devices support the realization of novel applications in many domains, from healthcare to security and entertainmen...
The increasingly large availability of sensors in modern houses, due to the establishment of home assistants , allow to think in terms of smart houses where behaviours can be automatized based on user habits. Common tasks required to this aim include activity prediction, i.e., the task of forecasting what is the next activity a human is going to pe...
Intrusion Detection Systems (IDS) based on deep learning models can identify and mitigate cyberattacks in IoT applications in a resilient and systematic manner. These models, which support the IDS’s decision, could be vulnerable to a cyberattack known as adversarial attack. In this type of attack, attackers create adversarial samples by introducing...
The advent of the digital economy and Industry 4.0 enables financial organizations to adapt their processes and mitigate the risks and losses associated with the fraud. Machine learning algorithms facilitate effective predictive models for fraud detection for Industry 4.0. This study aims to identify an efficient and stable model for fraud detectio...
The development of activity recognition based on multi-modal data makes it possible to reduce human intervention in the process of monitoring. This paper proposes an efficient and cost-effective multi-modal sensing framework for activity monitoring, it can automatically identify human activities based on multi-modal data, and provide help to patien...
This paper firstly introduces common wearable sensors, smart wearable devices and the key application areas. Since multi-sensor is defined by the presence of more than one model or channel, e.g. visual, audio, environmental and physiological signals. Hence, the fusion methods of multi-modality and multi-location sensors are proposed. Despite it has...
Glaucoma causes blindness in long-time untreated cases. So, its early diagnosis is very important. Moving from that, there have been lots of Deep Learning oriented studies to diagnose Glaucoma from color fundus images. However, it is important to know about how humans can trust to black-box level Deep Learning models in their decision makings. In t...
Motion capture technology has been widely used in the sport analysis to improve their performance and reduce the injury risk. Kayak, a popular outdoor sport, employs coordination of multiple muscles and skeletons especially those of upper limbs that must be investigated carefully. The fine time phase segmentation of rowing cycle plays an important...
For simplifying and speeding up the development of the Internet of Things (IoT) ecosystem, there has been a proliferation of IoT platforms, built up according to different design principles, computing paradigms, technologies, and targets. This paper proposes a review of main examples populating the wide landscape of IoT platforms and their comparis...
The papers in this special section focus on advanced networking technologies used to combat the outbreak of epidemic diseases. Currently, COVID-19 is a major global public health challenge. Worse, this epidemic could last for 2 years, according to US experts. To address it, scientific research institutions attempt to actively leveraged networking t...
With the outstanding growth in the number of consumer IoT connected devices, especially boosted by smart home applications and wearables, there is a need to provide such devices with security. If any device in such consumer IoT systems gets compromised, a data leak may cause serious threats to privacy, material losses and even put people's lives at...
Cognitive networking is a valuable enabler to improve the capability of intelligent transportation system (ITS) by analyzing and utilizing the heterogeneous traffic information. However, the significant increase in the amount of decision-making tasks makes it difficult to guarantee real-time performance of decision response. This paper focuses on t...
In this work we introduce a clustering reputation-based approach for edge-based IoT (Internet of Things) environments where it’s possible to process and save data on edge servers. In particular, once in an edge domain two Smart IoT Objects (SOs) exchanged a service, supported by their associated agents, they will release a feedback about their resp...
For simplifying and speeding up the development of Internet of Things (IoT) ecosystem, there has been a proliferation of IoT Platforms, built up according to different design principles, computing paradigms, technologies, and targets. This paper proposes a review of main examples populating the wide landscape of IoT Platforms and their comparison o...
Computing has emerged from traditional computers to pervasive scenarios where smart wearable and mobile devices are essential to provide human-centric uninterrupted services anywhere and at any time. Wearable computing systems, along with their enabling technology known as Body Sensor Network, represent a ground-breaking innovation with extremely d...