Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
ForestQB: Enhancing Linked Data Exploration through Graphical and Conversational UIs Integration
ACM Journal on Computing and Sustainable Societies (ACMJCSS), Volume 2, Issue 3Article No.: 32, Pages 1–33https://doi.org/10.1145/3675759This article introduces the Forest Query Builder (ForestQB), an innovative toolkit designed to enhance the exploration and application of observational Linked Data (LD) within the field of wildlife research and conservation. Addressing the challenges ...
- research-articleSeptember 2024
Empowering IoT Developers with Privacy-Preserving End-User Development Tools
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 8, Issue 3Article No.: 90, Pages 1–47https://doi.org/10.1145/3678588Internet of Things applications (IoT) have the potential to derive sensitive user data, necessitating adherence to privacy and data protection laws. However, developers often struggle with privacy issues, resulting in personal data misuse. Despite the ...
- research-articleAugust 2024
CASPER: Context-Aware IoT Anomaly Detection System for Industrial Robotic Arms
ACM Transactions on Internet of Things (TIOT), Volume 5, Issue 3Article No.: 18, Pages 1–36https://doi.org/10.1145/3670414Industrial cyber-physical systems (ICPS) are widely employed in supervising and controlling critical infrastructures, with manufacturing systems that incorporate industrial robotic arms being a prominent example. The increasing adoption of ubiquitous ...
- research-articleApril 2024
Designing Privacy-Aware IoT Applications for Unregulated Domains
ACM Transactions on Internet of Things (TIOT), Volume 5, Issue 2Article No.: 11, Pages 1–32https://doi.org/10.1145/3648480Internet of Things (IoT) applications (apps) are challenging to design because of the heterogeneous systems on which they are deployed. IoT devices and apps may collect and analyse sensitive personal data, which is often protected by data privacy laws, ...
- surveyOctober 2023
A Survey on Deep Learning Based Forest Environment Sound Classification at the Edge
ACM Computing Surveys (CSUR), Volume 56, Issue 3Article No.: 66, Pages 1–36https://doi.org/10.1145/3618104Forest ecosystems are of paramount importance to the sustainable existence of life on earth. Unique natural and artificial phenomena pose severe threats to the perseverance of such ecosystems. With the advancement of artificial intelligence technologies, ...
-
- research-articleSeptember 2023
Query Interface for Smart City Internet of Things Data Marketplaces: A Case Study
ACM Transactions on Internet of Things (TIOT), Volume 4, Issue 3Article No.: 19, Pages 1–39https://doi.org/10.1145/3609336Cities are increasingly becoming augmented with sensors through public, private, and academic sector initiatives. Most of the time, these sensors are deployed with a primary purpose (objective) in mind (e.g., deploy sensors to understand noise pollution) ...
- surveySeptember 2023
Interactive Privacy Management: Toward Enhancing Privacy Awareness and Control in the Internet of Things
ACM Transactions on Internet of Things (TIOT), Volume 4, Issue 3Article No.: 18, Pages 1–34https://doi.org/10.1145/3600096The balance between protecting user privacy while providing cost-effective devices that are functional and usable is a key challenge in the burgeoning Internet of Things (IoT). In traditional desktop and mobile contexts, the primary user interface is a ...
- surveyJuly 2023
Sensing within Smart Buildings: A Survey
ACM Computing Surveys (CSUR), Volume 55, Issue 13sArticle No.: 297, Pages 1–35https://doi.org/10.1145/3596600Increasingly, buildings are being fitted with sensors for the needs of different sectors, such as education, industry and business. Using Internet of Things devices combined with analysis of data being generated by these devices, it is possible to infer a ...
- ArticleOctober 2023
FOO: An Upper-Level Ontology for the Forest Observatory
The Semantic Web: ESWC 2023 Satellite EventsPages 154–158https://doi.org/10.1007/978-3-031-43458-7_29AbstractWildlife and preservation research activities in the tropical forest of Sabah, Malaysia, can generate a wide variety of data. However, each research activity manages its data independently. Since these data are disparate, gaining unified access to ...
- short-paperMay 2023
Poster Abstract: Camera-Assisted Training of Non-Vision Sensors for Anomaly Detection
IoTDI '23: Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and ImplementationPages 452–453https://doi.org/10.1145/3576842.3589164Cameras are becoming pervasive and used for image classification and object detection in various applications, including anomaly detection. However, cameras pose a privacy threat and require significant power resources. To address these issues, ...
- research-articleMarch 2023
PARROT: Interactive Privacy-Aware Internet of Things Application Design Tool
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 7, Issue 1Article No.: 1, Pages 1–37https://doi.org/10.1145/3580880Internet of Things (IoT) applications typically collect and analyse personal data that is categorised as sensitive or special category of personal data. These data are subject to a higher degree of protection under data privacy laws. Regardless of legal ...
- research-articleSeptember 2023
Edge analytics on resource constrained devices
International Journal of Computational Science and Engineering (IJCSE), Volume 26, Issue 5Pages 513–527https://doi.org/10.1504/ijcse.2023.133674Camera sensors can measure our environment at high precision, providing the basis for detecting more complex phenomena in comparison to other sensors, e.g., temperature or humidity. Using benchmarks, this work evaluates object classification on resource ...
- research-articleJanuary 2023
Semantics-based privacy by design for Internet of Things applications
Future Generation Computer Systems (FGCS), Volume 138, Issue CPages 280–295https://doi.org/10.1016/j.future.2022.08.013AbstractAs Internet of Things (IoT) technologies become more widespread in everyday life, privacy issues are becoming more prominent. The aim of this research is to develop a personal assistant that can answer software engineers’ questions ...
Highlights- PARROT ontology helps developers design privacy-preserving IoT systems.
- ...
- research-articleDecember 2022
License plate recognition using neural architecture search for edge devices
- Jithmi Shashirangana,
- Heshan Padmasiri,
- Dulani Meedeniya,
- Charith Perera,
- Soumya R. Nayak,
- Janmenjoy Nayak,
- Shanmuganthan Vimal,
- Seifidine Kadry
International Journal of Intelligent Systems (IJIS), Volume 37, Issue 12Pages 10211–10248https://doi.org/10.1002/int.22471AbstractThe mutually beneficial blend of artificial intelligence with internet of things has been enabling many industries to develop smart information processing solutions. The implementation of technology enhanced industrial intelligence systems is ...
- posterNovember 2022
Poster: Ontology Enabled Chatbot for Applying Privacy by Design in IoT Systems
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 3323–3325https://doi.org/10.1145/3548606.3563504Our aim is to create a personal assistant, a chatbot, that can answer queries from software developers regarding Privacy by Design (PbD) methods and applications throughout the design phase of IoT system development. We used semantic web technologies to ...
- posterApril 2023
Privacy-Patterns for IoT Application Developers
UbiComp/ISWC '22 Adjunct: Adjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable ComputersPages 7–9https://doi.org/10.1145/3544793.3560333Designing Internet of things (IoT) applications (apps) is challenging due to the heterogeneous nature of the systems on which these apps are deployed. Personal data, often classified as sensitive, may be collected and analysed by IoT apps, where data ...
- surveySeptember 2022
Cybersecurity of Industrial Cyber-Physical Systems: A Review
ACM Computing Surveys (CSUR), Volume 54, Issue 11sArticle No.: 229, Pages 1–35https://doi.org/10.1145/3510410Industrial cyber-physical systems (ICPSs) manage critical infrastructures by controlling the processes based on the “physics” data gathered by edge sensor networks. Recent innovations in ubiquitous computing and communication technologies have prompted ...
- research-articleSeptember 2021
Analysing environmental impact of large-scale events in public spaces with cross-domain multimodal data fusion
AbstractIn this study, we demonstrate how we can quantify environmental implications of large-scale events and traffic (e.g., human movement) in public spaces, and identify specific regions of a city that are impacted. We develop an innovative data fusion ...
- research-articleJune 2021
Synthesising Privacy by Design Knowledge Toward Explainable Internet of Things Application Designing in Healthcare
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 17, Issue 2sArticle No.: 62, Pages 1–29https://doi.org/10.1145/3434186Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduce risks within their application designs, yet it remains commonplace for developers to retain little conceptual understanding of what is meant by privacy. ...
- research-articleMay 2021
δ-Risk: Toward Context-aware Multi-objective Privacy Management in Connected Environments
- Karam Bou-Chaaya,
- Richard Chbeir,
- Mansour Naser Alraja,
- Philippe Arnould,
- Charith Perera,
- Mahmoud Barhamgi,
- Djamal Benslimane
ACM Transactions on Internet Technology (TOIT), Volume 21, Issue 2Article No.: 51, Pages 1–31https://doi.org/10.1145/3418499In today’s highly connected cyber-physical environments, users are becoming more and more concerned about their privacy and ask for more involvement in the control of their data. However, achieving effective involvement of users requires improving their ...