https://cis.temple.edu/~jiewu/research/publications/Publication_files/1-s2.0-S0957417424018475-main.pdf
However, due to the diversity and complexity, modeling human actions as general graphs and capturing discriminative spatial–temporal motion patterns is challenging. Besides, the inevitable interference, especially occlusion, impairs the robustness of existing methods that depend on complete skeletons. To solve these problems, we propose a Multi-Granular Spatial-Temporal Synchronous Graph ...
https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/RILA_Moenig_JRI_final.pdf
Registered index-linked annuities (RILAs) are increasingly popular equity-based re-tirement savings products o ered by U.S. life insurance companies. They combine features of xed-index annuities and traditional variable annuities (TVAs), o ering in-vestors equity exposure with downside protection in a tax-deferred setting. This article introduces RILAs to the academic literature by describing ...
https://cis.temple.edu/~wu/research/publications/Publication_files/Social-Aware%20DT-Assisted%20Service%20Provisioning%20in%20Serverless%20Edge%20Computing.pdf
Social-Aware DT-Assisted Service Provisioning in Serverless Edge Computing Jing Li†, Jianping Wang†, Weifa Liang†, Jie Wu¶, Quan Chen§, and Zichuan Xu$ † Department of Computer Science, City University of Hong Kong, Hong Kong, P. R. China ¶ Department of Computer and Information Sciences, Temple University, Philadelphia, USA
https://cis.temple.edu/~jiewu/research/publications/Publication_files/jiang_www_2020.pdf
ABSTRACT Serendipity recommendation has attracted more and more atten-tion in recent years; it is committed to providing recommendations which could not only cater to users’ demands but also broaden their horizons. However, existing approaches usually measure user-item relevance with a scalar instead of a vector, ignoring user preference direction, which increases the risk of unrelated ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf
Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/AVOA_Fuzzy.pdf
Abstract—The Internet of Things (IoT) has rapidly grown in the past decade as an emerging technology. Due to the heterogeneity and energy limitations of IoT devices, adopting eficient management practices for developing IoT applications and managing IoT networks is a challenging task. One of the most critical IoT challenges that needs to be considered is routing due to its significant impact ...