[4]
L. Kong, G. Li, W. Rafique, S. Shen, Q. He, M. R. Khosravi, R. Wang, and L. Qi, Time-aware missing healthcare data prediction based on ARIMA model, IEEE/ACM Trans. Comput. Biol. Bioinf.
[8]
X. Zhou, Y. Li, and W. Liang, CNN-RNN based intelligent recommendation for online medical pre-diagnosis support, IEEE/ACM Trans. Comput. Biol. Bioinf., vol. 18, no. 3, pp. 912–921, 2021.
[11]
D. Xu, T. Li, Y. Li, X. Su, S. Tarkoma, T. Jiang, J. Crowcroft, and P. Hui, Edge intelligence: Architectures, challenges, and applications, arXiv preprint arXiv: 2003.12172, 2020.
[12]
L. Kong, L. Wang, W. Gong, C. Yan, Y. Duan, and L. Qi, LSH-aware multitype health data prediction with privacy preservation in edge environment, World Wide Web, vol. 25, no. 5, pp. 1793–1808, 2022.
[14]
C. Janiesch, P. Zschech, and K. Heinrich, Machine learning and deep learning, Electronic Markets, vol. 31, no. 3, pp. 685–695, 2021.
[20]
M. Zhang, J. Cao, Y. Sahni, Q. Chen, S. Jiang, and T. Wu, EaaS: A service-oriented edge computing framework towards distributed intelligence, in Proc. 2022 IEEE Int. Conf. Service-Oriented System Engineering, Newark, CA, USA, 2022, pp. 165–175.
[21]
X. Xu, S. Huang, L. Feagan, Y. Chen, Y. Qiu, and Y. Wang, EAaaS: Edge analytics as a service, in Proc. 2017 IEEE Int. Conf. Web Services, Honolulu, HI, USA, 2017, pp. 349–356.
[22]
Y. Xu, Z. Feng, X. Xue, S. Chen, H. Wu, X. Zhou, M. Xing, and H. Chen, MemTrust: Find deep trust in your mind, in Proc. 2021 IEEE Int. Conf. Web Services, Chicago, IL, USA, 2021, pp. 598–607.
[28]
E. G. Renart, J. Diaz-Montes, and M. Parashar, Data-driven stream processing at the edge, in Proc. IEEE 1 st Int. Conf. Fog and Edge Computing, Madrid, Spain, 2017, pp. 31–40.
[35]
C. Luo, J. Zhan, X. Xue, L. Wang, R. Ren, and Q. Yang, Cosine normalization: Using cosine similarity instead of dot product in neural networks, in Proc. 27 th Int. Conf. Artificial Neural Networks, Rhodes, Greece, 2018, pp. 382–391.
[39]
S. Pesme and N. Flammarion, Online robust regression via SGD on the ℓ1 loss, in Proc. 34 th Int. Conf. Neural Information Processing Systems, Vancouver, Canada, 2020, p. 214.
[42]
J. Tang, H. Gao, H. Liu, and A. Das Sarma, eTrust: Understanding trust evolution in an online world, in Proc. 18 th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, Beijing, China, 2012, pp. 253–261.
[46]
Y. Yang, X. Yang, M. Heidari, M. A. Khan, G. Srivastava, M. R. Khosravi, and L. Qi, ASTREAM: Data-stream-driven scalable anomaly detection with accuracy guarantee in IIoT environment, IEEE Trans. Netw. Sci. Eng., vol. 10, no. 5, pp. 3007–3016, 2023.