2021
DOI: 10.1109/jiot.2020.3028387
|View full text |Cite
|
Sign up to set email alerts
|

Request–Response and Censoring-Based Energy-Efficient Decentralized Change-Point Detection With IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…In Computer Science, Complex Event Processing [54]- [56] and deep-learning methods [21]- [24] are popular. Within changepoint detection [57], [58], such as cumulative statistics thresholding (CUSUM) or adaptive online thresholding (AOT), there are relatively few papers on the multi-variate problem [59]-[62, e.g. ], and fewer still, which allow for missing data [63], [64].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In Computer Science, Complex Event Processing [54]- [56] and deep-learning methods [21]- [24] are popular. Within changepoint detection [57], [58], such as cumulative statistics thresholding (CUSUM) or adaptive online thresholding (AOT), there are relatively few papers on the multi-variate problem [59]-[62, e.g. ], and fewer still, which allow for missing data [63], [64].…”
Section: Related Workmentioning
confidence: 99%
“…IoT applications of anomaly detection are numerous and varied [57], [58], [80], mirroring much of the development in change-point, anomaly, outlier, and event detection at large. As suggested in the introduction, notable examples include transportation applications [2]- [4], [6], [33], [34], [65], power systems [1], [8]- [10], manufacturing [12], [13] and environmental applications [14].…”
Section: Related Workmentioning
confidence: 99%