The evolution of distributed systems for graph neural networks and their origin in graph processing and deep learning: A survey

J Vatter, R Mayer, HA Jacobsen - ACM Computing Surveys, 2023 - dl.acm.org
Graph neural networks (GNNs) are an emerging research field. This specialized deep
neural network architecture is capable of processing graph structured data and bridges the …

Towards edge computing in intelligent manufacturing: Past, present and future

G Nain, KK Pattanaik, GK Sharma - Journal of Manufacturing Systems, 2022 - Elsevier
Abstract Industry 4.0 (I4. 0) is the fourth industrial revolution and a synonym for intelligent
manufacturing. It drives the convergence of several cutting-edge technologies to provoke …

FDSA-STG: Fully dynamic self-attention spatio-temporal graph networks for intelligent traffic flow prediction

Y Duan, N Chen, S Shen, P Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the development of transportation and the ever-improving of vehicular technology,
Artificial Intelligence (AI) has been popularized in Intelligent Transportation Systems (ITS) …

Statistical analysis of remote health monitoring based IoT security models & deployments from a pragmatic perspective

K Ashok, S Gopikrishnan - IEEE Access, 2023 - ieeexplore.ieee.org
Remote health monitoring-based Internet of Things (IoT) network security is a multi-domain
task, that involves identification of network attack, evaluation of mitigation strategies, design …

Joint resource allocation and multi-part collaborative task offloading in MEC systems

H Zhang, Y Yang, B Shang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates the multi-part collaborative task offloading with multiple servers in
mobile edge computing (MEC) systems by considering server overload and long-term …

Detection and prevention of DDoS attacks on edge computing of IoT devices through reinforcement learning

A Kumar, D Singh - International Journal of Information Technology, 2024 - Springer
The limited resource and computation capacity of an IoT device always being a target vector
for intruders to use to steal sensitive data from the device. Computational problems were …

A blockchain-based authentication scheme and secure architecture for IoT-enabled maritime transportation systems

P Zhang, Y Wang, GS Aujla, A Jindal… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Although modern Maritime Transportation Systems (MTS) have been extensively benefited
from Internet of Things (IoT) technology, but still the risks and challenges in safety and …

RKD-VNE: Virtual network embedding algorithm assisted by resource knowledge description and deep reinforcement learning in IIoT scenario

P Zhang, P Gan, N Kumar, CH Hsu, S Shen… - Future Generation …, 2022 - Elsevier
In the era of Industry 4.0, the Industrial Internet of Things (IIoT) is developing rapidly, various
IIoT applications pose new challenges to the existing network architecture. On the one hand …

[HTML][HTML] A Microservice and Serverless Architecture for Secure IoT System

R Ouyang, J Wang, H Xu, S Chen, X Xiong, A Tolba… - Sensors, 2023 - mdpi.com
In cross-border transactions, the transmission and processing of logistics information directly
affect the trading experience and efficiency. The use of Internet of Things (IoT) technology …

Deep reinforcement learning algorithm for latency-oriented iiot resource orchestration

P Zhang, Y Zhang, N Kumar… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Due to geographical factors and resource constraints, the traditional Internet architecture
cannot meet the needs of the space–air–ground-integrated network (SAGIN) resource layout …