Wireless powered mobile edge computing networks: A survey

X Wang, J Li, Z Ning, Q Song, L Guo, S Guo… - ACM Computing …, 2023 - dl.acm.org
Wireless Powered Mobile Edge Computing (WPMEC) is an integration of Mobile Edge
Computing (MEC) and Wireless Power Transfer (WPT) technologies, to both improve …

Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system

X Zhou, W Liang, W Li, K Yan, S Shimizu… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The advancement of Internet of Things (IoT) technologies leads to a wide penetration and
large-scale deployment of IoT systems across an entire city or even country. While IoT …

Digital-twin-enabled 6G: Vision, architectural trends, and future directions

LU Khan, W Saad, D Niyato, Z Han… - IEEE Communications …, 2022 - ieeexplore.ieee.org
Internet of Everything (IoE) applications such as haptics, human-computer interaction, and
extended reality, using the sixth-generation (6G) of wireless systems have diverse …

Combining federated learning and edge computing toward ubiquitous intelligence in 6G network: Challenges, recent advances, and future directions

Q Duan, J Huang, S Hu, R Deng… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Full leverage of the huge volume of data generated on a large number of user devices for
providing intelligent services in the 6G network calls for Ubiquitous Intelligence (UI). A key to …

An in-depth analysis of IoT security requirements, challenges, and their countermeasures via software-defined security

W Iqbal, H Abbas, M Daneshmand… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is transforming everyone's life by providing features, such as
controlling and monitoring of the connected smart objects. IoT applications range over a …

Deep learning in security of internet of things

Y Li, Y Zuo, H Song, Z Lv - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Internet-of-Things (IoT) technology is increasingly prominent in the current stage of social
development. All walks of life have begun to implement the IoT integration technology, so as …

Smart parking systems: comprehensive review based on various aspects

A Fahim, M Hasan, MA Chowdhury - Heliyon, 2021 - cell.com
Parking allocation has become a major problem in modern cities for which numerous smart
parking systems (SPS) have been developed. This paper aims to provide comprehensive …

Internet of things security: challenges and key issues

M Azrour, J Mabrouki, A Guezzaz… - Security and …, 2021 - Wiley Online Library
Internet of Things (IoT) refers to a vast network that provides an interconnection between
various objects and intelligent devices. The three important components of IoT are sensing …

Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

A Attkan, V Ranga - Complex & Intelligent Systems, 2022 - Springer
The recent years have garnered huge attention towards the Internet of Things (IoT) because
it enables its consumers to improve their lifestyles and professionally keep up with the …