Edge computing with artificial intelligence: A machine learning perspective

H Hua, Y Li, T Wang, N Dong, W Li, J Cao - ACM Computing Surveys, 2023 - dl.acm.org
Recent years have witnessed the widespread popularity of Internet of things (IoT). By
providing sufficient data for model training and inference, IoT has promoted the development …

Convergence of edge computing and deep learning: A comprehensive survey

X Wang, Y Han, VCM Leung, D Niyato… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Ubiquitous sensors and smart devices from factories and communities are generating
massive amounts of data, and ever-increasing computing power is driving the core of …

A survey of multi-access edge computing in 5G and beyond: Fundamentals, technology integration, and state-of-the-art

QV Pham, F Fang, VN Ha, MJ Piran, M Le, LB Le… - IEEE …, 2020 - ieeexplore.ieee.org
Driven by the emergence of new compute-intensive applications and the vision of the
Internet of Things (IoT), it is foreseen that the emerging 5G network will face an …

Edge machine learning for ai-enabled iot devices: A review

M Merenda, C Porcaro, D Iero - Sensors, 2020 - mdpi.com
In a few years, the world will be populated by billions of connected devices that will be
placed in our homes, cities, vehicles, and industries. Devices with limited resources will …

[PDF][PDF] Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization.

R Alkanhel, ESM El-kenawy… - … , Materials & Continua, 2023 - researchgate.net
Applications of internet-of-things (IoT) are increasingly being used in many facets of our
daily life, which results in an enormous volume of data. Cloud computing and fog computing …

Building an efficient intrusion detection system based on feature selection and ensemble classifier

Y Zhou, G Cheng, S Jiang, M Dai - Computer networks, 2020 - Elsevier
Intrusion detection system (IDS) is one of extensively used techniques in a network topology
to safeguard the integrity and availability of sensitive assets in the protected systems …

Differential privacy techniques for cyber physical systems: A survey

MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …

A mini-review of machine learning in big data analytics: Applications, challenges, and prospects

IK Nti, JA Quarcoo, J Aning… - Big Data Mining and …, 2022 - ieeexplore.ieee.org
The availability of digital technology in the hands of every citizenry worldwide makes an
available unprecedented massive amount of data. The capability to process these gigantic …

Edge computing: A survey

WZ Khan, E Ahmed, S Hakak, I Yaqoob… - Future Generation …, 2019 - Elsevier
In recent years, the Edge computing paradigm has gained considerable popularity in
academic and industrial circles. It serves as a key enabler for many future technologies like …

An effective feature selection model using hybrid metaheuristic algorithms for iot intrusion detection

SS Kareem, RR Mostafa, FA Hashim, HM El-Bakry - Sensors, 2022 - mdpi.com
The increasing use of Internet of Things (IoT) applications in various aspects of our lives has
created a huge amount of data. IoT applications often require the presence of many …