Autonomous Crowdsensing: Operating and Organizing Crowdsensing for
Sensing Automation
- URL: http://arxiv.org/abs/2401.03229v1
- Date: Sat, 6 Jan 2024 14:41:13 GMT
- Title: Autonomous Crowdsensing: Operating and Organizing Crowdsensing for
Sensing Automation
- Authors: Wansen Wu, Weiyi Yang, Juanjuan Li, Yong Zhao, Zhengqiu Zhu, Bin Chen,
Sihang Qiu, Yong Peng, and Fei-Yue Wang
- Abstract summary: Crowdsensing Intelligence (CSI) has been proposed to collect data from Cyber-Physical-Social Systems.
This letter reports the outcomes of the latest Distributed/Decentralized Hybrid Workshop on Crowdsensing Intelligence.
- Score: 18.73616489977625
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The precise characterization and modeling of Cyber-Physical-Social Systems
(CPSS) requires more comprehensive and accurate data, which imposes heightened
demands on intelligent sensing capabilities. To address this issue,
Crowdsensing Intelligence (CSI) has been proposed to collect data from CPSS by
harnessing the collective intelligence of a diverse workforce. Our first and
second Distributed/Decentralized Hybrid Workshop on Crowdsensing Intelligence
(DHW-CSI) have focused on principles and high-level processes of organizing and
operating CSI, as well as the participants, methods, and stages involved in
CSI. This letter reports the outcomes of the latest DHW-CSI, focusing on
Autonomous Crowdsensing (ACS) enabled by a range of technologies such as
decentralized autonomous organizations and operations, large language models,
and human-oriented operating systems. Specifically, we explain what ACS is and
explore its distinctive features in comparison to traditional crowdsensing.
Moreover, we present the ``6A-goal" of ACS and propose potential avenues for
future research.
Related papers
- A Survey on Integrated Sensing, Communication, and Computation [57.6762830152638]
The forthcoming generation of wireless technology, 6G, promises a revolutionary leap beyond traditional data-centric services.
It aims to usher in an era of ubiquitous intelligent services, where everything is interconnected and intelligent.
Existing techniques like integrated communication and computation (ICC), integrated sensing and computation (ISC), and integrated sensing and communication (ISAC) have made partial strides in addressing this challenge.
This paper begins with a comprehensive survey of historic and related techniques such as ICC, ISC, and ISAC, highlighting their strengths and limitations.
It then explores the state-of-the-art signal designs for
arXiv Detail & Related papers (2024-08-15T11:01:35Z) - Socialized Learning: A Survey of the Paradigm Shift for Edge Intelligence in Networked Systems [62.252355444948904]
This paper presents the findings of a literature review on the integration of edge intelligence (EI) and socialized learning (SL)
SL is a learning paradigm predicated on social principles and behaviors, aimed at amplifying the collaborative capacity and collective intelligence of agents.
We elaborate on three integrated components: socialized architecture, socialized training, and socialized inference, analyzing their strengths and weaknesses.
arXiv Detail & Related papers (2024-04-20T11:07:29Z) - Position Paper: Agent AI Towards a Holistic Intelligence [53.35971598180146]
We emphasize developing Agent AI -- an embodied system that integrates large foundation models into agent actions.
In this paper, we propose a novel large action model to achieve embodied intelligent behavior, the Agent Foundation Model.
arXiv Detail & Related papers (2024-02-28T16:09:56Z) - Operational Collective Intelligence of Humans and Machines [7.8074313693407635]
We explore the use of aggregative crowdsourced forecasting (ACF) as a mechanism to help operationalize collective intelligence''
This research asks whether ACF, as a key way to enable Operational Collective Intelligence, could be brought to bear on operational scenarios.
arXiv Detail & Related papers (2024-02-16T22:45:09Z) - TSTEM: A Cognitive Platform for Collecting Cyber Threat Intelligence in the Wild [0.06597195879147556]
The extraction of cyber threat intelligence (CTI) from open sources is a rapidly expanding defensive strategy.
Previous research has focused on improving individual components of the extraction process.
The community lacks open-source platforms for deploying streaming CTI data pipelines in the wild.
arXiv Detail & Related papers (2024-02-15T14:29:21Z) - AI for IT Operations (AIOps) on Cloud Platforms: Reviews, Opportunities
and Challenges [60.56413461109281]
Artificial Intelligence for IT operations (AIOps) aims to combine the power of AI with the big data generated by IT Operations processes.
We discuss in depth the key types of data emitted by IT Operations activities, the scale and challenges in analyzing them, and where they can be helpful.
We categorize the key AIOps tasks as - incident detection, failure prediction, root cause analysis and automated actions.
arXiv Detail & Related papers (2023-04-10T15:38:12Z) - Towards AI-Empowered Crowdsourcing [27.0404686687184]
We propose a taxonomy which divides AI-Empowered Crowdsourcing into three major areas: task delegation, motivating workers, and quality control.
We discuss the limitations and insights, and curate the challenges of doing research in each of these areas to highlight promising future research directions.
arXiv Detail & Related papers (2022-12-28T05:06:55Z) - Wizard of Search Engine: Access to Information Through Conversations
with Search Engines [58.53420685514819]
We make efforts to facilitate research on CIS from three aspects.
We formulate a pipeline for CIS with six sub-tasks: intent detection (ID), keyphrase extraction (KE), action prediction (AP), query selection (QS), passage selection (PS) and response generation (RG)
We release a benchmark dataset, called wizard of search engine (WISE), which allows for comprehensive and in-depth research on all aspects of CIS.
arXiv Detail & Related papers (2021-05-18T06:35:36Z) - A System for Automated Open-Source Threat Intelligence Gathering and
Management [53.65687495231605]
SecurityKG is a system for automated OSCTI gathering and management.
It uses a combination of AI and NLP techniques to extract high-fidelity knowledge about threat behaviors.
arXiv Detail & Related papers (2021-01-19T18:31:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.