Local differential privacy and its applications: A comprehensive survey

M Yang, T Guo, T Zhu, I Tjuawinata, J Zhao… - Computer Standards & …, 2023 - Elsevier
With the rapid development of low-cost consumer electronics and pervasive adoption of next
generation wireless communication technologies, a tremendous amount of data has been …

Edge intelligence: Architectures, challenges, and applications

D Xu, T Li, Y Li, X Su, S Tarkoma, T Jiang… - arXiv preprint arXiv …, 2020 - arxiv.org
Edge intelligence refers to a set of connected systems and devices for data collection,
caching, processing, and analysis in locations close to where data is captured based on …

Edge intelligence: Empowering intelligence to the edge of network

D Xu, T Li, Y Li, X Su, S Tarkoma, T Jiang… - Proceedings of the …, 2021 - ieeexplore.ieee.org
Edge intelligence refers to a set of connected systems and devices for data collection,
caching, processing, and analysis proximity to where data are captured based on artificial …

The security and privacy of mobile edge computing: An artificial intelligence perspective

C Wang, Z Yuan, P Zhou, Z Xu, R Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Mobile-edge computing (MEC) is a new computing paradigm that enables cloud computing
and information technology (IT) services to be delivered at the network's edge. By shifting …

[PDF][PDF] A survey on edge intelligence

D Xu, T Li, Y Li, X Su, S Tarkoma… - arXiv preprint arXiv …, 2020 - academia.edu
Edge intelligence refers to a set of connected systems and devices for data collection,
caching, processing, and analysis in locations close to where data is captured based on …

EdgeCNN: Convolutional neural network classification model with small inputs for edge computing

S Yang, Z Gong, K Ye, Y Wei, Z Huang… - arXiv preprint arXiv …, 2019 - arxiv.org
With the development of Internet of Things (IoT), data is increasingly appearing on the edge
of the network. Processing tasks on the edge of the network can effectively solve the …

A comprehensive study of IoT security risks in building a secure smart city

A Bhargava, G Salunkhe, S Bhargava… - … Cities Roadmap: IoT …, 2021 - Wiley Online Library
Summary The Internet of Things (IoT) is capable of assimilating a variety of heterogeneous
systems, by facilitating seamless access and communication amongst an expansive range …

Web based maintenance work support by neural networks–Detection and wear estimation of components in wind energy turbines

W Zeitler, M Quandt, H Stern, M Freitag - Procedia CIRP, 2023 - Elsevier
Mobile assistance systems in demanding wind turbine maintenance processes can help to
reduce the work time of individual tasks. One such task is the measurement of carbon …

Motif difference field: An effective image-based time series classification and applications in machine malfunction detection

Y Zhang, F Gan, X Chen - 2020 IEEE 4th Conference on …, 2020 - ieeexplore.ieee.org
Time series motifs are widely used in time series analysis. The time series motifs are used
for the discovery of order structures and patterns in time series. The motif difference field …

ArchNet: A data hiding design for distributed machine learning systems

K Chang, W Jiang, J Zhan, Z Gong, W Pan - Journal of systems architecture, 2021 - Elsevier
Integrating idle embedded devices into cloud computing is a promising approach to support
Distributed Machine Learning (DML). In this paper, we approach to address the data hiding …