{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:10:12Z","timestamp":1775067012823,"version":"3.50.1"},"reference-count":260,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/comst.2017.2707140","type":"journal-article","created":{"date-parts":[[2017,5,23]],"date-time":"2017-05-23T21:00:01Z","timestamp":1495573201000},"page":"2432-2455","source":"Crossref","is-referenced-by-count":722,"title":["State-of-the-Art Deep Learning: Evolving Machine Intelligence Toward Tomorrow\u2019s Intelligent Network Traffic Control Systems"],"prefix":"10.1109","volume":"19","author":[{"given":"Zubair Md.","family":"Fadlullah","sequence":"first","affiliation":[]},{"given":"Fengxiao","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Bomin","family":"Mao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8769-302X","authenticated-orcid":false,"given":"Nei","family":"Kato","sequence":"additional","affiliation":[]},{"given":"Osamu","family":"Akashi","sequence":"additional","affiliation":[]},{"given":"Takeru","family":"Inoue","sequence":"additional","affiliation":[]},{"given":"Kimihiro","family":"Mizutani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_26"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.133"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.826277"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028805"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322122"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1145\/1162678.1162679"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064220"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254309"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1997.646179"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/505672.505678"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988742"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6639349"},{"key":"ref38","first-page":"1045","article-title":"Recurrent neural network based language model","author":"mikolov","year":"2010","journal-title":"Proc INTERSPEECH"},{"key":"ref33","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"krizhevsky","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref32","first-page":"1","article-title":"Discriminative unsupervised feature learning with convolutional neural networks","volume":"abs 1406","author":"dosovitskiy","year":"2014","journal-title":"CoRR"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553380"},{"key":"ref30","first-page":"153","article-title":"Greedy layer-wise training of deep networks","volume":"19","author":"bengio","year":"2007","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488598000094"},{"key":"ref36","first-page":"1017","article-title":"Generating text with recurrent neural networks","author":"sutskever","year":"2011","journal-title":"Proc 28th Int Conf Mach Learn (ICML)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1989.1.4.541"},{"key":"ref34","first-page":"1090","article-title":"Learning convolutional feature hierarchies for visual recognition","author":"kavukcuoglu","year":"2010","journal-title":"Advances in neural information processing systems"},{"key":"ref181","author":"wang","year":"2016","journal-title":"The Applications of Deep Learning on Traffic Identification"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.014"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863992"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1996.493355"},{"key":"ref182","first-page":"61","author":"oliveira","year":"2014","journal-title":"Multilayer Perceptron and Stacked Autoencoder for Internet Traffic Prediction"},{"key":"ref189","first-page":"2528","article-title":"Selecting receptive fields in deep networks","author":"coates","year":"2011","journal-title":"Proc NIPS"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.21236\/ADA459707"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1145\/1273496.1273592"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1038\/14819"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","article-title":"Reducing the dimensionality of data with neural networks","volume":"313","author":"hinton","year":"2006","journal-title":"Science"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1145\/1163593.1163596"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2006.18.7.1527"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1017\/atsip.2013.9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1162\/08997660260293319"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1561\/2200000006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/72.125866"},{"key":"ref23","author":"bengio","year":"2007","journal-title":"Scaling Learning Algorithms Toward AI"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2011.2116010"},{"key":"ref25","author":"bourlard","year":"1993","journal-title":"Connectionist Speech Recognition A Hybrid Approach"},{"key":"ref50","first-page":"1","article-title":"Deep reinforcement learning with double q-learning","volume":"abs 1509","author":"van hasselt","year":"2015","journal-title":"CoRR"},{"key":"ref51","first-page":"1","article-title":"Prioritized experience replay","volume":"abs 1511","author":"schaul","year":"2015","journal-title":"CoRR"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ICUMT.2009.5345599"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425458"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017616"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30583-5_54"},{"key":"ref150","first-page":"1","article-title":"Consensus-based distributed principal component analysis in wireless sensor networks","author":"macua","year":"2010","journal-title":"Proc 11th Int Workshop Signal Process Adv Wireless Commun"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2010.5706781"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.211"},{"key":"ref146","first-page":"372","volume":"86","author":"chen","year":"2011","journal-title":"Intrusion Detection System Based on Immune Algorithm and Support Vector Machine in Wireless Sensor Network"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.11.001"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2008.4761978"},{"key":"ref149","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/79.985674","article-title":"Detection, classification, and tracking of targets","volume":"19","author":"li","year":"2002","journal-title":"IEEE Signal Process Mag"},{"key":"ref59","first-page":"224","article-title":"Deep learning for efficient discriminative parsing","author":"collobert","year":"2011","journal-title":"Proc 14th Int Conf Artif Intell Statist (AISTATS)"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35289-8_34"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2013.07.017"},{"key":"ref56","first-page":"315","article-title":"Deep sparse rectifier neural networks","author":"glorot","year":"2011","journal-title":"Proc 14th Int Conf Artif Intell Statist (AISTATS)"},{"key":"ref55","first-page":"1","article-title":"Better mixing via deep representations","volume":"abs 1207","author":"bengio","year":"2012","journal-title":"CoRR"},{"key":"ref54","first-page":"1","article-title":"Large-scale feature learning with spike-and-slab sparse coding","author":"goodfellow","year":"2012","journal-title":"Proc 29th Int Conf Mach Learn"},{"key":"ref53","first-page":"1","article-title":"Continuous control with deep reinforcement learning","volume":"abs 1509","author":"lillicrap","year":"2015","journal-title":"CoRR"},{"key":"ref52","first-page":"1","article-title":"Dueling network architectures for deep reinforcement learning","volume":"abs 1511","author":"wang","year":"2015","journal-title":"CoRR"},{"key":"ref40","article-title":"Training recurrent neural networks","author":"sutskever","year":"2013"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39671-0_9"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_25"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/WINCOM.2016.7777201"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2014.011714.130505"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.51"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2002.1181362"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2007.4496872"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/166237.166256"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488188"},{"key":"ref6","first-page":"118","article-title":"Multipath routing management using neural networks-based traffic prediction","author":"barabas","year":"2011","journal-title":"Proc Int Conf Emerg Netw Intell"},{"key":"ref5","author":"marcus","year":"2014","journal-title":"The Economic Impact of Internet Traffic Growth on Network Operators 2014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-007-9061-1"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.127"},{"key":"ref49","year":"2016","journal-title":"Methods and Apparatus for Reinforcement Learning"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1989.118375"},{"key":"ref157","author":"jolliffe","year":"2002","journal-title":"Principal Component Analysis"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/72.286889"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2007.4496810"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2007.19.5.1422"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"1265","DOI":"10.1162\/NECO_a_00848","article-title":"An infinite restricted Boltzmann machine","volume":"28","author":"c\u00f4t\u00e9","year":"2016","journal-title":"Neural Comput"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2015.2406889"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/BF00332918"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2008.04.030"},{"key":"ref44","article-title":"Unsupervised learning of distributions on binary vectors using two layer networks","author":"freund","year":"1994"},{"key":"ref43","first-page":"5","article-title":"Deep learning for NLP (without magic)","author":"socher","year":"2012","journal-title":"Proc ACL Tutorial Abstracts ACL"},{"key":"ref73","first-page":"1","article-title":"Feature learning in deep neural networks&#x2014;A study on speech recognition tasks","volume":"abs 1301 3605","author":"yu","year":"2013","journal-title":"CoRR"},{"key":"ref72","first-page":"437","article-title":"Conversational speech transcription using context-dependent deep neural networks","author":"seide","year":"2011","journal-title":"Proc 12th Annu Conf Int Speech Commun Assoc (INTERSPEECH)"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU.2011.6163899"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2014.2339736"},{"key":"ref76","first-page":"1","article-title":"Recursive deep models for semantic compositionality over a sentiment treebank","volume":"1631","author":"socher","year":"2013","journal-title":"Proc Conf Empirical Methods Nat Lang Process (EMNLP)"},{"key":"ref77","first-page":"801","article-title":"Dynamic pooling and unfolding recursive autoencoders for paraphrase detection","author":"socher","year":"2011","journal-title":"Advances in neural information processing systems"},{"key":"ref74","year":"2016","journal-title":"Microsoft Audio Video Indexing Service (MAVIS)"},{"key":"ref75","first-page":"1139","article-title":"On the importance of initialization and momentum in deep learning","volume":"28","author":"sutskever","year":"2013","journal-title":"Proc Int Conf Mach Learn (ICML)"},{"key":"ref78","year":"2016","journal-title":"The iBrain is Here and It's Already Inside Your Phone"},{"key":"ref79","first-page":"1","article-title":"Learning distributed representations of concepts","author":"hinton","year":"1986","journal-title":"Proc 8th Annu Conf Cogn Sci Soc"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/34.754617"},{"key":"ref62","year":"2016","journal-title":"The MNIST database"},{"key":"ref61","first-page":"516","article-title":"High accuracy recognition of ETL9B using exclusive learning neural network-II: ELNET-II","volume":"79","author":"saruta","year":"1996","journal-title":"IEICE Trans Inf Syst"},{"key":"ref63","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref64","first-page":"1855","article-title":"A generative process for sampling contractive auto-encoders","author":"rifai","year":"2012","journal-title":"Proc 29th Int Conf Mach Learn (ICML)"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248110"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-015-0816-y"},{"key":"ref67","year":"2016","journal-title":"Google Unveils Neural Network With &#x2018;Superhuman&#x2019; Ability to Determine the Location of Almost Any Image"},{"key":"ref68","first-page":"531","article-title":"Learning a minimally structured back propagation network to recognize speech","author":"landauer","year":"1987","journal-title":"Proc 9th Annu Conf Cogn Sci Soc"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30568-2_19"},{"key":"ref197","article-title":"Predicting ads click-through rate with decision rules","author":"dembczynski","year":"2008","journal-title":"Workshop on Targeting and Ranking in Online Advertising"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1287\/mksc.1100.0574"},{"key":"ref199","first-page":"1","article-title":"Predicting online user behaviour using deep learning algorithms","volume":"abs 1511","author":"vieira","year":"2015","journal-title":"CoRR"},{"key":"ref193","author":"hyndman","year":"2016","journal-title":"DataMarket Data Library (TSDL)"},{"key":"ref194","first-page":"165","article-title":"Fusing social networks with deep learning for volunteerism tendency prediction","author":"jia","year":"2016","journal-title":"Proc 30th AAAI Conf Artif Intell"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2684160"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1324054111"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2016.7759632"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2016.7759205"},{"key":"ref190","first-page":"1237","article-title":"Incoherent dictionary learning for sparse representation","volume":"14","author":"lin","year":"2012","journal-title":"Proc ICPR"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2015.7353857"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539964"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ROBIO.2013.6739623"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2010.5539989"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2015.7354004"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2016.2637444"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638346"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2016.7603237"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/IST.2016.7738193"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2015.7322485"},{"key":"ref82","first-page":"455","article-title":"Parsing with compositional vector grammars","author":"socher","year":"2013","journal-title":"Proc ACL"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390177"},{"key":"ref84","year":"2016","journal-title":"Wall Street Journal-Based Continuous Speech Recognition (CSR) Corpus"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.specom.2012.08.004"},{"key":"ref80","first-page":"1137","article-title":"A neural probabilistic language model","volume":"3","author":"bengio","year":"2003","journal-title":"J Mach Learn Res"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2016.7759581"},{"key":"ref85","first-page":"11","article-title":"Large, pruned or continuous space language models on a GPU for statistical machine translation","author":"schwenk","year":"2012","journal-title":"Proc NAACL Workshop Future Lang Model"},{"key":"ref86","author":"castelvecchi","year":"2016","journal-title":"Nature News Deep Learning Boosts Google Translate Tool"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2016.2634089"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2016.7759720"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"ref101","year":"2016","journal-title":"The Game Imitation A Portable Deep Learning Model for Modern Gaming AI"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2004.837629"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646094"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.21236\/ADA452802"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0210-x"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557109"},{"key":"ref207","year":"2016","journal-title":"The Zettabyte EraTrends and Analysis"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2328"},{"key":"ref205","first-page":"31","article-title":"Deep learning for social media analysis in crises situations (position paper)","author":"lazreg","year":"2016","journal-title":"Proc 29th Annu Workshop Swedish Artif Intell Soc (SAIS)"},{"key":"ref206","author":"russon","year":"2016","journal-title":"Using Deep Learning Neural Networks to Predict Social Unrest Five Days Before it Happens"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/CONECT.2004.1375211"},{"key":"ref210","year":"2016","journal-title":"The Zettabyte Era-Trends and Analysis"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2709742"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007735"},{"key":"ref214","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1613\/jair.606","article-title":"Identifying mislabeled training data","volume":"11","author":"brodley","year":"1999","journal-title":"J Artif Intell Res"},{"key":"ref215","first-page":"220","article-title":"Intelligent selection of language model training data","author":"moore","year":"2010","journal-title":"Proc ACL Conf Short Papers"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020581"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2016.2631141"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1145\/2505821.2505823"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840811"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070952"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.79.016111"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.1.011001"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342522"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1145\/2525314.2525343"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/81\/48005"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.86.026102"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1145\/2030112.2030126"},{"key":"ref224","first-page":"384","article-title":"Measuring social functions of city regions from large-scale taxi behaviors","author":"qi","year":"2011","journal-title":"Proc IEEE Percom"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339561"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2007.4496866"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.10.024"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01203-7_20"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2009.5179075"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0474-5"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2006.1665221"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.637"},{"key":"ref133","first-page":"1214","article-title":"Real-time forest fire detection with wireless sensor networks","volume":"2","author":"yu","year":"2005","journal-title":"Proc Int Conf Wireless Commun Netw Mobile Comput"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2007.913803"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13033-5_27"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.28"},{"key":"ref232","first-page":"607","article-title":"Mobility prediction using fully-complex extreme learning machines","author":"ghouti","year":"2014","journal-title":"Proc Eur Symp Artif Neural Netw"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2007.07.025"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.176"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.2991\/icaita-16.2016.24"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523809"},{"key":"ref238","first-page":"253","article-title":"An adaptive media access control mechanism for cognitive radio","volume":"j94 b","author":"konno","year":"2011","journal-title":"IEICE Trans Commun"},{"key":"ref235","first-page":"1","article-title":"Deepspace: An online deep learning framework for mobile big data to understand human mobility patterns","volume":"abs 1610","author":"ouyang","year":"2016","journal-title":"CoRR"},{"key":"ref234","first-page":"2618","article-title":"DeepTransport: Prediction and simulation of human mobility and transportation mode at a citywide level","author":"song","year":"2016","journal-title":"Proc IJCAI"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654926"},{"key":"ref236","first-page":"1453","article-title":"Online incremental feature learning with denoising autoencoders","author":"zhou","year":"2012","journal-title":"Proc Artif Intell Statist (AISTATS) Conf"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/1317425.1317434"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1606090"},{"key":"ref138","author":"ayodele","year":"2010","journal-title":"Types of machine learning algorithms"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49257-7_15"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/21.97458"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/MASSP.1987.1165576"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(98)00031-9"},{"key":"ref142","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-77242-4","author":"steinwart","year":"2008","journal-title":"Support Vector Machines"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77024-4_51"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2010.5506589"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2337336"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70800"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1016\/B978-075067952-7\/50008-8"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2016.7786995"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4300983"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-015-0381-7"},{"key":"ref240","first-page":"3c","article-title":"Cognitive radios with genetic algorithms: Intelligent control of software defined radios","author":"rondeau","year":"2004","journal-title":"Software Defined Radio Forum Technical Conference"},{"key":"ref248","first-page":"1223","article-title":"Large scale distributed deep networks","author":"dean","year":"2012","journal-title":"Proc NIPS"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553486"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44188-7_16"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2471178"},{"key":"ref249","first-page":"860","article-title":"Adaptive spectrum sensing and learning in cognitive radio networks","author":"taherpour","year":"2010","journal-title":"Proc 18th Eur Signal Process Conf"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1478-9"},{"key":"ref108","author":"chintala","year":"2016","journal-title":"Understanding Natural Language with Deep Neural Networks Using Torch"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600317WC"},{"key":"ref106","year":"2016","journal-title":"WILL API"},{"key":"ref105","first-page":"10","article-title":"Spark: Cluster computing with working sets","author":"zaharia","year":"2010","journal-title":"Proc 2nd USENIX Conf Hot Topics in Cloud Computing"},{"key":"ref104","author":"white","year":"2009","journal-title":"Hadoop The Definitive Guide"},{"key":"ref103","year":"2016","journal-title":"Deep Learning Comp Sheet Deeplearning4j vs Torch vs Theano vs Caffe vs TensorFlow"},{"key":"ref102","first-page":"1","article-title":"Knowledge-defined networking","volume":"abs 1606 6222","author":"mestres","year":"2016","journal-title":"CoRR"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2163872"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2443171"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.050112.111222"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00116"},{"key":"ref251","author":"agoulmine","year":"2011","journal-title":"Autonomic Network Management Principles From Concepts to Applications"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20463"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2012.6214281"},{"key":"ref252","first-page":"170","article-title":"A cooperative reinforcement learning approach for inter-cell interference coordination in OFDMA cellular networks","author":"dirani","year":"2010","journal-title":"Proc Int Symp Model Optim Mobile Ad-Hoc Wireless Netw (WiOpt)"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2010.5671622"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2010.5507157"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2507158"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/RoEduNet.2011.5993687"},{"key":"ref259","year":"2016","journal-title":"Intel Autonomous Cars"},{"key":"ref11","first-page":"425","author":"liu","year":"2013","journal-title":"Deep Learning Approaches for Link Prediction in Social Network Services"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803174"},{"key":"ref12","first-page":"73","article-title":"Inferring origin flow patterns in Wi-Fi with deep learning","volume":"18","author":"gwon","year":"2014","journal-title":"Proc 11th Int Conf Auton Comput (ICAC)"},{"key":"ref13","first-page":"689","article-title":"Multimodal deep learning","author":"ngiam","year":"2011","journal-title":"Proc Int Conf Mach Learn (ICML)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4236\/cn.2009.12013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4236\/jilsa.2010.23018"},{"key":"ref16","first-page":"1878","article-title":"Top-down regularization of deep belief networks","author":"goh","year":"2013","journal-title":"Proc 26th Int Conf Neural Inf Process Syst (NIPS)"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320099"},{"key":"ref17","first-page":"2222","article-title":"Multimodal learning with deep Boltzmann machines","author":"srivastava","year":"2012","journal-title":"Advances in neural information processing systems"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.010312.110783"},{"key":"ref18","first-page":"448","article-title":"Deep Boltzmann machines","author":"salakhutdinov","year":"2009","journal-title":"Proc AISTATS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1162\/NECO_a_00311"},{"key":"ref119","volume":"40","author":"box","year":"2011","journal-title":"Bayesian Inference in Statistical Analysis"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.023"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.10.001"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2318177"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2262676"},{"key":"ref120","author":"rasmussen","year":"2006","journal-title":"Gaussian Processes for Machine Learning"},{"key":"ref121","first-page":"1","article-title":"Localization using neural networks in wireless sensor networks","author":"shareef","year":"2007","journal-title":"Proc 1st Int Conf Mobile Wireless Middleware Oper Syst Appl"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502618"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2009.2021981"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.5.21"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8115327\/07932863.pdf?arnumber=7932863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:27:34Z","timestamp":1750274854000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7932863\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":260,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2017.2707140","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}