Survey on placement methods in the edge and beyond

B Sonkoly, J Czentye, M Szalay… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Edge computing is a (r) evolutionary extension of traditional cloud computing. It expands
central cloud infrastructure with execution environments close to the users in terms of …

A novel intrusion detection method based on lightweight neural network for internet of things

R Zhao, G Gui, Z Xue, J Yin, T Ohtsuki… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The purpose of a network intrusion detection (NID) is to detect intrusions in the network,
which plays a critical role in ensuring the security of the Internet of Things (IoT). Recently …

Edge AI for Internet of Energy: Challenges and perspectives

Y Himeur, A Sayed, A Alsalemi, F Bensaali, A Amira - Internet of Things, 2023 - Elsevier
The digital landscape of the Internet of Energy (IoE) is on the brink of a revolutionary
transformation with the integration of edge Artificial Intelligence (AI). This comprehensive …

NOMA assisted multi-task multi-access mobile edge computing via deep reinforcement learning for industrial Internet of Things

L Qian, Y Wu, F Jiang, N Yu, W Lu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Multiaccess mobile edge computing (MA-MEC) has been envisioned as one of the key
approaches for enabling computation-intensive yet delay-sensitive services in future …

Intelligent intrusion detection based on federated learning aided long short-term memory

R Zhao, Y Yin, Y Shi, Z Xue - Physical Communication, 2020 - Elsevier
Deep learning based intelligent intrusion detection (IID) methods have been received
strongly attention for computer security protection in cybersecurity. All these learning models …

An efficient intrusion detection method based on dynamic autoencoder

R Zhao, J Yin, Z Xue, G Gui, B Adebisi… - IEEE Wireless …, 2021 - ieeexplore.ieee.org
The proliferation of wireless sensor networks (WSNs) and their applications has attracted
remarkable growth in unsolicited intrusions and security threats, which disrupt the normal …

Cloud-based xr services: A survey on relevant challenges and enabling technologies

T Theodoropoulos, A Makris, A Boudi… - Journal of Networking …, 2022 - iecscience.org
In recent years, the emergence of XR (eXtended Reality) applications, including
Holography, Augmented, Virtual and Mixed Reality, has resulted in the creation of rather …

Multi-task travel route planning with a flexible deep learning framework

F Huang, J Xu, J Weng - IEEE Transactions on Intelligent …, 2020 - ieeexplore.ieee.org
Travel route planning aims to map out a feasible sightseeing itinerary for a traveler covering
famous attractions and meeting the tourist's desire. It is very useful for tourists to plan their …

Spectral efficiency enhanced cooperative device-to-device systems with NOMA

Y Ji, W Duan, M Wen, P Padidar, J Li… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
This paper considers a cooperative device-to-device (D2D) system with non-orthogonal
multiple access (NOMA). We assume that the base station (BS) can simultaneously …

Multi-helper NOMA for cooperative mobile edge computing

SS Yılmaz, B Özbek - IEEE Transactions on Intelligent …, 2021 - ieeexplore.ieee.org
The next-generation wireless networks are expected to support a number of computation-
intensive and delay-sensitive applications such as virtual reality (VR), autonomous driving …