Complementing IoT services through software defined networking and edge computing: A comprehensive survey

W Rafique, L Qi, I Yaqoob, M Imran… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Millions of sensors continuously produce and transmit data to control real-world
infrastructures using complex networks in the Internet of Things (IoT). However, IoT devices …

A survey on mobile edge computing: The communication perspective

Y Mao, C You, J Zhang, K Huang… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Driven by the visions of Internet of Things and 5G communications, recent years have seen
a paradigm shift in mobile computing, from the centralized mobile cloud computing toward …

Advances and open problems in federated learning

P Kairouz, HB McMahan, B Avent… - … and trends® in …, 2021 - nowpublishers.com
Federated learning (FL) is a machine learning setting where many clients (eg, mobile
devices or whole organizations) collaboratively train a model under the orchestration of a …

Mobile edge computing: A survey

N Abbas, Y Zhang, A Taherkordi… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
Mobile edge computing (MEC) is an emergent architecture where cloud computing services
are extended to the edge of networks leveraging mobile base stations. As a promising edge …

A survey on the edge computing for the Internet of Things

W Yu, F Liang, X He, WG Hatcher, C Lu, J Lin… - IEEE …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) now permeates our daily lives, providing important measurement
and collection tools to inform our every decision. Millions of sensors and devices are …

Scalable, transparent, and post-quantum secure computational integrity

E Ben-Sasson, I Bentov, Y Horesh… - Cryptology ePrint …, 2018 - eprint.iacr.org
Human dignity demands that personal information, like medical and forensic data, be hidden
from the public. But veils of secrecy designed to preserve privacy may also be abused to …

Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Blockchain security: A survey of techniques and research directions

J Leng, M Zhou, JL Zhao, Y Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Blockchain, an emerging paradigm of secure and shareable computing, is a systematic
integration of 1) chain structure for data verification and storage, 2) distributed consensus …

Secure outsourced matrix computation and application to neural networks

X Jiang, M Kim, K Lauter, Y Song - … of the 2018 ACM SIGSAC conference …, 2018 - dl.acm.org
Homomorphic Encryption (HE) is a powerful cryptographic primitive to address privacy and
security issues in outsourcing computation on sensitive data to an untrusted computation …

Cloud security issues and challenges: A survey

A Singh, K Chatterjee - Journal of Network and Computer Applications, 2017 - Elsevier
The cloud computing provides on demand services over the Internet with the help of a large
amount of virtual storage. The main features of cloud computing is that the user does not …