Zoran Salcic

Zoran Salcic
University of Auckland · Department of Electrical Computer and Software Engineering

PhD

About

358
Publications
48,379
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,207
Citations
Citations since 2017
70 Research Items
1627 Citations
20172018201920202021202220230100200300
20172018201920202021202220230100200300
20172018201920202021202220230100200300
20172018201920202021202220230100200300
Additional affiliations
June 1994 - December 2018
University of Auckland
Position
  • Chair
January 1994 - present
University of Auckland
March 1993 - May 1994
Czech Technical University in Prague
Position
  • Professor

Publications

Publications (358)
Article
Most of the real-world embedded hard real-time applications are multi-task programs. Reduction in energy consumption for these systems is essential, especially if they are battery-powered. For multi-task applications, energy management could be considered in the offline or online scheduler. We developed an offline non-preemptive rate monotonic sche...
Conference Paper
Recently issued data privacy regulations like GDPR (General Data Protection Regulation) grant individuals the right to be forgotten. In the context of machine learning, this requires a model to forget about a training data sample if requested by the data owner (i.e., machine unlearning). As an essential step prior to machine unlearning, it is still...
Preprint
Full-text available
Recently issued data privacy regulations like GDPR (General Data Protection Regulation) grant individuals the right to be forgotten. In the context of machine learning, this requires a model to forget about a training data sample if requested by the data owner (i.e., machine unlearning). As an essential step prior to machine unlearning, it is still...
Article
Advanced wireless communication technologies are leading towards large-scale, geographically distributed systems, which consist of thousands of co-existing devices with potentially conflicting application requirements, such as high data delivery ratio and low power consumption. At the same time, devices are challenged by varying environmental condi...
Article
Machine learning (ML) models have been widely applied to various applications, including image classification, text generation, audio recognition, and graph data analysis. However, recent studies have shown that ML models are vulnerable to membership inference attacks (MIAs), which aim to infer whether a data record was used to train a target model...
Article
Full-text available
Wireless networks are trending towards large scale systems, containing thousands of nodes, with multiple co-existing applications. Congestion is an inevitable consequence of this scale and complexity, which leads to inefficient use of the network capacity. This paper proposes an autonomous and adaptive wireless network management framework, utilisi...
Article
Optimizations in energy consumption are critical for battery-powered hard real-time embedded systems. Energy management is often accomplished by dynamic frequency scaling which requires compilers to insert special instructions in the code at appropriate places, which are then used by the operating system and the processor to calculate and change th...
Article
Lots of non-additive cost assignment methods designed for image steganography have improved the security of stego images, but surprisingly there are only a few such non-additive cost assignment methods for video steganography. In this paper, we first analyze the distortion propagation by decomposing it into inner-block, inter-block, and inter-frame...
Article
Full-text available
This paper demonstrates how deep learning (DL) pipeline can be accelerated by the use of field-programmable gate array (FPGA)-based accelerator. An affordable Cyclone V FPGA was tested against two benchmark programs which perform classification and object detection. Use of FPGA helps significant reduction of average processing time for classificati...
Preprint
Full-text available
Federated learning (FL) has emerged as a promising privacy-aware paradigm that allows multiple clients to jointly train a model without sharing their private data. Recently, many studies have shown that FL is vulnerable to membership inference attacks (MIAs) that can distinguish the training members of the given model from the non-members. However,...
Conference Paper
Full-text available
Model inference is the final stage in machine/deep learning application deployments in practical applications. Hardware-implemented or accelerated model inferences find significant attractions as they offer faster inference than those implemented as programs. This is especially attractive for real-time applications. In this paper, we address models...
Preprint
Full-text available
Machine learning (ML) models have been widely applied to various applications, including image classification, text generation, audio recognition, and graph data analysis. However, recent studies have shown that ML models are vulnerable to membership inference attacks (MIAs), which aim to infer whether a data record was used to train a target model...
Article
Full-text available
Recommender systems are important applications in big data analytics because accurate recommendation items or high‐valued suggestions can bring high profit to both commercial companies and customers. To make precise recommendations, a recommender system often needs large and fine‐grained data for training. In the current big data era, data often ex...
Article
Anomaly detection is a significant but challenging data mining task in a wide range of applications. Different domains usually use different ways to measure the characteristics of data and to define the anomaly types. As a result, it is a big challenge to develop a versatile anomaly detection framework that can be universally applied with satisfact...
Article
Cost assignment plays a key role in coding performance and security of video steganography. Existing cost assignment methods (for adaptive video steganography) are designed for specific transform coefficients rather than all transform coefficients. In addition, existing video steganographic frameworks do not allow Syndrome-Trellis Codes (STCs) to m...
Article
Full-text available
In this paper, we propose a comprehensive multi-layer (IoT-device, edge, fog, and cloud) streaming analytics platform with two-tier fog layer, which comprises streaming and analytics tiers. The approach, functionally validated on a testbed of clusters of low-cost off-the-shelf components, demonstrates that both real-time streaming processing and la...
Article
Full-text available
Information fusion combining inertial navigation and radio frequency (RF) technologies, is commonly applied in indoor positioning systems (IPSs) to obtain more accurate tracking results. The performance of the inertial navigation system (INS) subsystem is affected by sensor drift over time and the RF-based subsystem aims to correct the position est...
Article
Full-text available
This paper investigates the fusion of wearable and ambient sensors for recognizing activities of daily living in a smart home setting using ontology. The proposed approach exploits the advantages of both types of sensing to resolve uncertainties due to missing sensor data. The resulting system is able to infer activities which cannot be inferred wi...
Article
Fusion techniques are employed in pedestrian tracking to achieve more accurate and robust tracking systems. A common approach is to fuse Inertial Navigation System (INS), worn by a pedestrian, with a radio-based system to complement each other and mitigate their shortcomings. Despite the increased accuracy achieved in the state-of-the-art approache...
Article
Sensor fusion of Inertial Navigation System (INS) and ultra-wideband (UWB) technology is an effective approach to enhance the accuracy and robustness of indoor pedestrian tracking system. The main drawbacks of state-of-the-art approaches are the number of required UWB anchors and poor system scalability in terms of cost-effectiveness when covering...
Article
This paper introduces DSF, a Distributed Service Framework supporting development, and deployment of trust- worthy and privacy-preserving distributed Internet of Things (IoT) and Industrial IoT (IIoT) applications. DSF provides a common protocol and infrastructure for secure service specifi- cation, registration, discovery, publishing, and subscrip...
Article
The event-driven model of computation provides a good platform for capturing complex real-time applications with low latency requirements since this model is free of problems like deadlocks, livelocks and performance bottlenecks such as locking overheads. Furthermore, there is great potential for extracting parallelism from an event-driven model on...
Article
Full-text available
Dynamic reconfigurability and adaptability are crucial features of the future manufacturing systems that must be supported by adequate software technologies. Currently, they are typically achieved as add-ons to existing software tools and run-time systems, which are not based on any formal foundation such as formal model of computation (MoC). This...
Chapter
Energy management is very important and sometimes critical for certain classes of hard real-time systems. In this paper, we present effective energy reduction techniques for hard real-time systems developed in Java, which execute on bare metal and run on a time-predictable specialized Java processor. We modified traditional clock gating and dynamic...
Article
Inertial Navigation System (INS) using kinematic sensors is able to provide accurate pedestrian tracking over a short distance. Information fusion of INS with wireless technology has been commonly employed to develop more robust and accurate tracking systems over longer distances. Ultra-Wideband (UWB) based system offers further improvement and ach...
Article
Ultrawideband (UWB) technology applied in indoor localization systems is able to offer centimeter-level error in position measurement and attracts increasing popularity in various solutions. Position estimation is calculated based on ranging measurements between mobile nodes and anchors at known locations. Most existing works employ UWB in position...
Article
SystemJ is a programming language based on the Globally Asynchronous Locally Synchronous (GALS) Model of Computation (MoC) used to design safety critical hard real-time systems. SystemJ uses the Java programming language as the “host” language, for carrying out data computations, because Java provides clearly defined operational semantics, type and...
Article
Foot-mounted navigation based on inertial navigation sensors struggles with unobservable heading error. Existing solutions for heading error rely on acquiring geomagnetic information or prior knowledge such as building maps, which are susceptible to magnetic disturbance or lack of maps, respectively. A prominent approach to mitigate the heading err...
Article
Electrical stimulators are often prescribed to correct foot drop walking. However, commercial foot drop stimulators trigger inappropriately under certain non-gait scenarios. Past researches addressed this limitation by defining stimulation control based on automaton of a gait cycle executed by foot drop of affected limb/foot only. Since gait is a c...
Article
Full-text available
One of the key challenges in modern manufacturing systems is how to dynamically reconfigure software behaviours that govern machines to reflect changes in physical manufacturing process without completely resetting the entire manufacturing operation. The existing software solutions used to describe software behaviours in manufacturing systems are t...
Article
Full-text available
The heterogeneity of execution platforms and operating software in manufacturing machines and robots, as well as various sensors and actuators, creates challenges for integration into larger systems. Existing approaches make use of different types of middleware to mitigate the challenges of designing interoperable systems. However, middleware can s...
Article
Objective: Distance estimation in pedestrian dead reckoning is acquired using vector norm of accelerations that results in positive values. However, anteroposterior acceleration is negative when step taken backwards, so must be detected for accurate localisation. This paper proposes a novel approach for detection of walking direction that uses a d...
Article
MPSoC-based embedded systems design is becoming increasingly complex. Not only do we need to satisfy multiple design objectives, we increasingly need to address potential security risks. In this work, we propose a security-aware systematic design approach which explores the design space, given a system-level application description, by generating p...
Article
With the increasing connectivity and complexity of embedded systems, security issues have become a key consideration in design. In this paper, we propose a decentralized system-level approach for isolating application tasks without the need to rely on a centralized privileged authority at run-time. We discuss the need for isolation to reduce the po...
Article
Unlike industrial-grade Inertial Navigation Sensors (INSs) that can provide credible tracking performance, more affordable consumer-grade low-cost INSs produce drifts in heading angles and positions that result in a poor tracking accuracy. Researchers have proposed drift correction methods that attempt to attenuate the drifts when walking straight...
Conference Paper
Full-text available
One of the most efficient ways of reducing household energy consumption is through an online feedback system, which helps users in reducing their household energy. There are several research and commercial products available, yet over-consumption issues are still prevalent. An important factor fueling these issues is rendering too many features or...
Article
Full-text available
A novel Distributed Particle Filter Algorithm with Resampling Tree, called DART, is proposed in this paper, where particles are resampled by Branch Resampling and Root Resampling in a flexible tree-like structure. Though sampling and weight calculation can be executed in parallel on a group of Processing Elements, resampling is the bottleneck for d...
Article
Scalability and performance in multicore processors for embedded and real-time systems usually don't go well each with the other. Networks on Chip (NoCs) provide scalable execution platforms suitable for such kind of embedded systems. This article presents a NoC-based Heterogeneous Multi-Processor system, called NoC-HMP, which is a scalable platfor...
Article
This paper presents the modelling, simulation, implementation and performance analysis of a novel electropermanent magnet based, bistable wireless microactuator for microvalves with milli Joule level energy consumption. The microactuator is powered wirelessly through inductive power transfer with energy buffered in a supercapacitor bank. Two millim...
Article
We propose a novel silicon structure, Hot Electron Emitting Substrate (HEES), which exhibits important effect of repeated tunneling at two different voltage ranges, which we refer to as double tunneling. In ambient atmosphere and room temperature, the I–V characteristic of HEES shows two current peaks during voltage sweep from 2 to 15 V. These two...
Article
Submicron zinc oxide (ZnO) spheres prepared by a two-stage hydrothermal method were assembled into a layer on a substrate by vertical deposition. Vanadium pentoxide (V2O5) was deposited onto the top of ZnO spheres by magnetron sputtering followed by annealing in oxygen atmosphere at 500∘C for an hour. The microstructures and optical properties of t...
Article
The synchronous model of computation is well suited for real-time systems, because it allows static analysis in order to find and guarantee their reaction times. Today’s multi-core systems are becoming the predominant computing platforms. Synchronous programs are typically compiled into single threaded code, which makes them unsuitable for exploiti...
Conference Paper
While cloud computing has become an attractive platform for supporting data intensive applications, a major obstacle to the adoption of cloud computing in sectors such as health and defense is the privacy risk associated with releasing datasets to third-parties in the cloud for analysis. A widely-adopted technique for data privacy preservation is t...
Conference Paper
Embedded systems are becoming increasingly complex as designers integrate different functionalities into a single application for execution on heterogeneous hardware platforms. In this work we propose a system-level security approach in order to provide isolation of tasks without the need to trust a central authority at run-time. We discuss securit...
Article
Full-text available
Abstract Ontology-based activity recognition is gaining interest due to its expressiveness and comprehensive reasoning mechanism. An obstacle to its wider use is that the imperfect observations result in failure of recognizing activities. This paper proposes a novel reasoning algorithm for activity recognition in smart environments. The algorithm i...
Article
Full-text available
Previous studies on physical activity recognition have utilized various fixed window sizes for signal segmentation targeting specific activities. Naturally, an optimum window size varies depending on the characteristics of activity signals and fixed window size will not produce good segmentation for all activities. This paper presents a novel appro...
Conference Paper
The Time-Predictable Heterogeneous Multicore Processor (TP-HMP) is based on a NoC and fully implemented in a standard FPGA chip. The NoC uses TDMA-MIN interconnect with bounded latency, high throughput and low implementation cost. TP-HMP is used for execution of programs written in concurrent GALS language SystemJ suited for both soft and hard real...
Conference Paper
Full-text available
This paper presents the Service Oriented SystemJ (SOSJ) framework, which combines correct-by-construction language features of GALS (Globally Asynchronous Locally Synchronous) system-level language SystemJ with dynamic reconfiguration features of Service Oriented Architecture (SOA), creating a new programming paradigm suitable for designing dynamic...
Article
Development of electrochemical impedance biosensor with reliable detection output is important for bringing the technology to use in real world applications. The use of increase in charge-transfer resistance, a component of faradaic impedance, as indicator of analyte-sensor interaction is one of the conventional approaches of data interpretation. H...
Conference Paper
Time-predictability of the execution architecture is a key requirement for successful implementation of hard real-time systems. This paper presents a scalable and fully time-predictable multicore processor, TP-HMP, that comprises of two types of time-predictable cores and a novel NoC interconnect that are used in creation of heterogeneous multiproc...