Abstract Internet of Things (IoT) has already proven to be the building block for next- generation Cyber–Physical Systems (CPSs). The considerable amount of data generated by …
A Zhu, H Lu, S Guo, Z Zeng, M Ma, Z Zhou - Future Generation Computer …, 2024 - Elsevier
Smart Robots, as an advanced domain of widespread concern, can be applied in diverse fields to perform compute-intensive Internet of Things (IoT) applications. However, their …
A Zhu, H Lu, S Guo, Z Zeng, Z Zhou - Ad Hoc Networks, 2024 - Elsevier
Multi-access edge computing (MEC) offers prospective opportunities for robots that have various computational tasks to execute in Industry 4.0, smart cities and many other fields …
A Zhu, H Lu, M Ma, Z Zhou, Z Zeng - Drones, 2023 - mdpi.com
With multi-sensors embedded, flexible unmanned aerial vehicles (UAVs) can collect sensory data and provide various services for all walks of life. However, limited computing capability …
In our fast-paced, technology-driven world, multi-robot systems have emerged as crucial solutions to tackle contemporary challenges, from industrial automation to disaster …
M Afrin, J Jin, A Rahman, S Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Incorporating edge and cloud computing with robotics provides extended options for robots to perform real-time sensing and actuation operations in various cyber–physical systems …
In recent years, the combination of unmanned aerial vehicles (UAVs) and wireless sensor networks (WSNs) has gained popularity in livestock management (LM) due to energy …
M Ma, Z Wang, S Guo, H Lu - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Cloud and edge computing paradigms are increasingly being applied to data processing for Internet of Things (IoT) sensors. Meanwhile, unmanned aerial vehicles (UAVs) can assist …
H Yue, J Zhang, J Xia, JH Park… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
In this paper, the adaptive intelligent control problem for a class of nonlinear switched stochastic cyber-physical systems (CPSs) with output constraint under deception attacks is …