A systematic review on machine learning and deep learning models for electronic information security in mobile networks

C Gupta, I Johri, K Srinivasan, YC Hu, SM Qaisar… - Sensors, 2022 - mdpi.com
Today's advancements in wireless communication technologies have resulted in a
tremendous volume of data being generated. Most of our information is part of a widespread …

Hardware-assisted machine learning in resource-constrained IoT environments for security: review and future prospective

G Kornaros - IEEE Access, 2022 - ieeexplore.ieee.org
As the Internet of Things (IoT) technology advances, billions of multidisciplinary smart
devices act in concert, rarely requiring human intervention, posing significant challenges in …

Applications of machine learning in resource management for RAN-slicing in 5G and beyond networks: A survey

Y Azimi, S Yousefi, H Kalbkhani, T Kunz - IEEE Access, 2022 - ieeexplore.ieee.org
One of the key foundations of 5th Generation (5G) and beyond 5G (B5G) networks is
network slicing, in which the network is partitioned into several separated logical networks …

ST-BFL: A structured transparency empowered cross-silo federated learning on the blockchain framework

U Majeed, LU Khan, A Yousafzai, Z Han, BJ Park… - Ieee …, 2021 - ieeexplore.ieee.org
Federated Learning (FL) relies on on-device training to avoid the migration of devices' data
to a centralized server to address privacy leakage. Moreover, FL is feasible for scenarios …

On the impact of deep neural network calibration on adaptive edge offloading for image classification

RG Pacheco, RS Couto, O Simeone - Journal of Network and Computer …, 2023 - Elsevier
Edge devices can offload deep neural network (DNN) inference to the cloud to overcome
energy or processing constraints. Nevertheless, offloading adds communication delay …

Towards edge computing using early-exit convolutional neural networks

RG Pacheco, K Bochie, MS Gilbert, RS Couto… - Information, 2021 - mdpi.com
In computer vision applications, mobile devices can transfer the inference of Convolutional
Neural Networks (CNNs) to the cloud due to their computational restrictions. Nevertheless …

Network slicing in virtualized 5G Core with VNF sharing

AJ Zharabad, S Yousefi, T Kunz - Journal of Network and Computer …, 2023 - Elsevier
Through multiplexing separate virtual networks on the same network infrastructure, network
slicing will lead to customization, scalability, flexibility, and isolation of services in different …

Predictive data analytics for electricity fraud detection using tuned cnn ensembler in smart grid

N Ayub, U Ali, K Mustafa, SM Mohsin, S Aslam - Forecasting, 2022 - mdpi.com
In the smart grid (SG), user consumption data are increasing very rapidly. Some users
consume electricity legally, while others steal it. Electricity theft causes significant damage to …

SafeCoder: A machine-learning-based encoding system to embed safety identification information into QR codes

H Su, J Niu, X Liu, M Atiquzzaman - Journal of Network and Computer …, 2024 - Elsevier
In social networks, the Internet of Things, mobile computing, electronic commerce, and other
fields, Quick Response (QR) codes have been widely used as the interface between online …

Streaming traffic classification: a hybrid deep learning and big data approach

M Seydali, F Khunjush, J Dogani - Cluster Computing, 2024 - Springer
Massive amounts of real-time streaming network data are generated quickly because of the
exponential growth of applications. Analyzing patterns in generated flow traffic streaming …