2023
DOI: 10.1145/3565973
|View full text |Cite
|
Sign up to set email alerts
|

Graph Neural Networks in IoT: A Survey

Abstract: The Internet of Things (IoT) boom has revolutionized almost every corner of people’s daily lives: healthcare, environment, transportation, manufacturing, supply chain, and so on. With the recent development of sensor and communication technology, IoT artifacts including smart wearables, cameras, smartwatches, and autonomous systems can accurately measure and perceive their surrounding environment. Continuous sensing generates massive amounts of data and presents challenges for machine learning. Deep learning m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 263 publications
0
14
0
Order By: Relevance
“…In other work like [69,70,77], NAS is applied to the existing image object detectors to improve the performance. Besides NAS, recent works have begun using dynamic models [13,21,51,62,81,84,89] to improve efficiency dynamic convolutions [7,16,17,72], dynamic heads [12], and dynamic proposals [10], which are introduced to the existing object detectors to balance the performance and inference speed. For video object detection, DFA [8] proposes a model which can dynamically select the frames used to aggregate the features according to the input frames.…”
Section: Related Workmentioning
confidence: 99%
“…In other work like [69,70,77], NAS is applied to the existing image object detectors to improve the performance. Besides NAS, recent works have begun using dynamic models [13,21,51,62,81,84,89] to improve efficiency dynamic convolutions [7,16,17,72], dynamic heads [12], and dynamic proposals [10], which are introduced to the existing object detectors to balance the performance and inference speed. For video object detection, DFA [8] proposes a model which can dynamically select the frames used to aggregate the features according to the input frames.…”
Section: Related Workmentioning
confidence: 99%
“…The existing surveys on progress in AI research for IoT are presented from four perspectives: perceiving, learning, reasoning, and behaving in Reference74 A comprehensive review of recent advances in the application of GNNs to the IoT field is given in Reference15 in which three typical IoT sensing paradigms and their combinations are reviewed: autonomous thing, human‐centric, and environment embedded systems. GNN for anomaly detection in three typical Industrial IoT (IIoT) fields are examined in Reference75 including smart transportation, smart energy and smart factory.…”
Section: Summary Of the Existing Gnn‐based Aiot Framework Issues And ...mentioning
confidence: 99%
“…It should be explicitly pointed out that the existing GNN works in IoT sensing applications have been surveyed by Dong et al, 15 including three typical of IoT sensing scenarios: human sensing, autonomous things, and environmental sensing. Significantly different from the work above, instead of presenting the various GNN schemes in vertical IoT sensing applications, our work focuses on the systematically reviewing the horizontal infrastructure that all AIoT applications should possess, that is, data sensing and acquisition based on GNN and some emerging AI factors including adversarial training, self‐supervision learning, and graph reinforcement learning, etc.…”
Section: Introductionmentioning
confidence: 99%
“…We hypothesize that people who are in early stage of influenza will subconsciously become less active, and avoid unnecessary traveling and person-to-person interactions. We leverage multiple embedded sensors to capture human behavior information: GPS sensors are used to capture human mobility behaviors; Bluetooth encounters are used as proximity to measure social behaviors; accelerometer and gyroscope can monitor physical activeness; web-virtual behaviors are tracked by recording app usages; and ambient contexts can be inferred by WiFi signals [7].…”
Section: Graph Modeling In Mobile Sensingmentioning
confidence: 99%
“…Many privacy-preserving approaches and algorithms have been proposed according to different application scenarios. For instance, k-anonymity algorithm and its variants have been proposed to hide identities in the source of data items [7,8]. Differential privacy aims to reduce exposure of authentic information by adding perturbations that follow certain noise distribution while maintain data utility.…”
Section: Introductionmentioning
confidence: 99%