• A Sanitization Approach to Secure Shared Data in an IoT Environment 

      Lin, Chun Wei; Wu, Jimmy Ming-Tai; Fournier-Viger, Philippe; Djenouri, Youcef; Chen, Chun-Hao; Zhang, Yuyu (Journal article; Peer reviewed, 2019)
      Internet of Things (IoT) supports high flexibility and convenience in several applications because the IoT devices continuously transfer, share, and exchange data without human intervention. During shared or exchanged ...
    • A Survey on Urban Traffic Anomalies Detection Algorithms 

      Djenouri, Youcef; Belhadi, Asma; Lin, Chun Wei; Djenouri, Djamel; Cano, Alberto (Journal article; Peer reviewed, 2019)
      This paper reviews the use of outlier detection approaches in urban traffic analysis. We divide existing solutions into two main categories: flow outlier detection and trajectory outlier detection. The first category groups ...
    • Adapted k-Nearest Neighbors for Detecting Anomalies on Spatio-Temporal Traffic Flow 

      Djenouri, Youcef; Belhadi, Asma; Lin, Chun Wei; Djenouri, Djamel; Cano, Alberto (Journal article; Peer reviewed, 2019)
      Outlier detection is an extensive research area, which has been intensively studied in several domains such as biological sciences, medical diagnosis, surveillance, and traffic anomaly detection. This paper explores advances ...
    • Adaptive Systems for Internet-Delivered Psychological Treatments 

      Mukhiya, Suresh Kumar; Wake, Jo Dugstad; Inal, Yavuz; Lamo, Yngve (Peer reviewed; Journal article, 2020)
      Internet-Delivered Psychological Treatments (IDPT) are based on evidence-based psychological treatment models adjusted for interaction through the Internet. The use of Internet technologies has the potential to increase ...
    • An Effective Approach for Obtaining a Group Trading Strategy Portfolio Using Grouping Genetic Algorithm 

      Chen, Chun-Hao; Chen, Yu-Hsuan; Lin, Chun Wei; Wu, Mu-En (Journal article; Peer reviewed, 2019)
      To determine an appropriate trading time for buying or selling stocks is always a difficult task. The common way to deal with it is using trading strategies formed by technical or fundamental indicators. Lots of approaches ...
    • “Digital Twins” for Highly Customized Electronic Devices – Case Study on a Rework Operation 

      Cupek, Rafal; Drewniak, Marek; Ziebinski, Adam; Fojcik, Marcin (Peer reviewed; Journal article, 2019)
      The ongoing changes in manufacturing require that new information models for industrial computer systems be developed and applied. This paper describes a concept for the material model as a “digital twin” for producing ...
    • An Effective Approach for the Diverse Group Stock Portfolio Optimization Using Grouping Genetic Algorithm 

      Chen, Chung-Hao; Lu, Cheng-Yu; Hong, Tzung-Pei; Lin, Chun Wei; Gaeta, Matteo (Peer reviewed; Journal article, 2019)
      Finding useful portfolios that could be a portfolio of trading strategy or a stock portfolio from financial datasets is always an attractive research topic due to the nature of financial markets. Because investors always ...
    • Multi-Network Vulnerability Causal Model for Infrastructure Co-Resilience 

      Konila Sriram, Lalitha Madhavi; Ulak, Mehmet Baran; Ozguven, Eren Erman; Arghandeh, Reza (Journal article; Peer reviewed, 2019)
      Resilience is mostly considered as a single-dimension attribute of a system. Most of the recent works on resilience treat it as a single-dimension attribute of a system or study the different dimensions of the resilience ...
    • Visualization of generic utility of sequential patterns 

      Wiktorski, Tomasz; Królak, Aleksandra; Rosińska, Karolina; Strumillo, Pawel; Lin, Jerry Chun-Wei (Peer reviewed; Journal article, 2020)
      Most of the literature on utility pattern mining (UPM) assumes that the particular patterns' utility in known in advance. Concurrently, in frequent pattern mining (FPM) it is assumed that all patterns take the same value. ...