Security and privacy on 6g network edge: A survey

B Mao, J Liu, Y Wu, N Kato - IEEE communications surveys & …, 2023 - ieeexplore.ieee.org
To meet the stringent service requirements of 6G applications such as immersive cloud
eXtended Reality (XR), holographic communication, and digital twin, there is no doubt that …

A systematic survey of industrial Internet of Things security: Requirements and fog computing opportunities

K Tange, M De Donno, X Fafoutis… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
A key application of the Internet of Things (IoT) paradigm lies within industrial contexts.
Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry …

Analysis of multi-dimensional Industrial IoT (IIoT) data in Edge-Fog-Cloud based architectural frameworks: A survey on current state and research challenges

R Kumar, N Agrawal - Journal of Industrial Information Integration, 2023 - Elsevier
Cloud computing is changing the traditional ways of computing using its different forms and
architectural types such as Edge and Fog computing. These computing frameworks are the …

[HTML][HTML] Upgrading the manufacturing sector via applications of Industrial Internet of Things (IIoT)

M Javaid, A Haleem, RP Singh, S Rab, R Suman - Sensors International, 2021 - Elsevier
Now a day's manufacturing has become more intelligent and data-driven. A smart
production unit can be thought of as a powerful connected industrial system with materials …

Human–computer interaction-based decision support system with applications in data mining

Y Yun, D Ma, M Yang - Future Generation Computer Systems, 2021 - Elsevier
Human–computer interaction (HCI) plays a vital role in modern intelligent systems, such as
brain–machine integration, human action recognition, telemedicine, and somatosensory …

AI-enabled IoT-edge data analytics for connected living

Z Lv, L Qiao, S Verma, Kavita - ACM Transactions on Internet …, 2021 - dl.acm.org
As deep learning, virtual reality, and other technologies become mature, real-time data
processing applications running on intelligent terminals are emerging endlessly; meanwhile …

[HTML][HTML] Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks

X Sáez-de-Cámara, JL Flores, C Arellano, A Urbieta… - Computers & …, 2023 - Elsevier
There is a growing trend of cyberattacks against Internet of Things (IoT) devices; moreover,
the sophistication and motivation of those attacks is increasing. The vast scale of IoT, diverse …

A visually secure image encryption scheme based on semi-tensor product compressed sensing

W Wen, Y Hong, Y Fang, M Li, M Li - Signal Processing, 2020 - Elsevier
In traditional compressed sensing (CS), the measurement matrix always faces problems
such as large data storage, high memory usage and a large amount of data calculation. To …

Edge intelligence for data handling and predictive maintenance in IIOT

T Hafeez, L Xu, G Mcardle - IEEE Access, 2021 - ieeexplore.ieee.org
The use of IoT has become pervasive and IoT devices are common in many domains.
Industrial IoT (IIoT) utilises IoT devices and sensors to monitor machines and environments …

[HTML][HTML] AI augmented Edge and Fog computing: Trends and challenges

S Tuli, F Mirhakimi, S Pallewatta, S Zawad… - Journal of Network and …, 2023 - Elsevier
In recent years, the landscape of computing paradigms has witnessed a gradual yet
remarkable shift from monolithic computing to distributed and decentralized paradigms such …