Distributed artificial intelligence empowered by end-edge-cloud computing: A survey

S Duan, D Wang, J Ren, F Lyu, Y Zhang… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
As the computing paradigm shifts from cloud computing to end-edge-cloud computing, it
also supports artificial intelligence evolving from a centralized manner to a distributed one …

Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey

A Barua, MA Al Alamin, MS Hossain… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …

XAI for cybersecurity: state of the art, challenges, open issues and future directions

G Srivastava, RH Jhaveri, S Bhattacharya… - arXiv preprint arXiv …, 2022 - arxiv.org
In the past few years, artificial intelligence (AI) techniques have been implemented in almost
all verticals of human life. However, the results generated from the AI models often lag …

A systematic review on machine learning and deep learning models for electronic information security in mobile networks

C Gupta, I Johri, K Srinivasan, YC Hu, SM Qaisar… - Sensors, 2022 - mdpi.com
Today's advancements in wireless communication technologies have resulted in a
tremendous volume of data being generated. Most of our information is part of a widespread …

An effective secured privacy-protecting data aggregation method in IoT

S Pramanik - Achieving Full Realization and Mitigating the …, 2022 - igi-global.com
Because privacy concerns in IoT devices are the most sensitive of all the difficulties, such an
extreme growth in IoT usage has an impact on the privacy and life spans of IoT devices …

Fusion of IoT, AI, edge–fog–cloud, and blockchain: Challenges, solutions, and a case study in healthcare and medicine

F Firouzi, S Jiang, K Chakrabarty… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The digital transformation is characterized by the convergence of technologies—from the
Internet of Things (IoT) to edge–fog–cloud computing, artificial intelligence (AI), and …

Deep learning and artificial intelligence framework to improve the cyber security

D Ghillani - Authorea Preprints, 2022 - advance.sagepub.com
Department of Computer Engineering, Gujrat Technological College, Ahmedabad,
IndiaEmail address: Shezi1131@ gmail. comTo cite this article: Diptiben Ghelni. Deep …

Edge learning for 6G-enabled Internet of Things: A comprehensive survey of vulnerabilities, datasets, and defenses

MA Ferrag, O Friha, B Kantarci… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The deployment of the fifth-generation (5G) wireless networks in Internet of Everything (IoE)
applications and future networks (eg, sixth-generation (6G) networks) has raised a number …

Cybersecurity Risk Analysis in the IoT: A Systematic Review

TS AlSalem, MA Almaiah, A Lutfi - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is increasingly becoming a part of our daily lives, raising
significant concerns about future cybersecurity risks and the need for reliable solutions. This …

Internet of things (IoT)-Based environmental monitoring and control system for home-based mushroom cultivation

JL Chong, KW Chew, AP Peter, HY Ting, PL Show - Biosensors, 2023 - mdpi.com
The control and monitoring of the environmental conditions in mushroom cultivation has
been a challenge in the mushroom industry. Currently, research has been conducted to …