[HTML][HTML] A systematic literature review on distributed machine learning in edge computing

CP Filho, E Marques Jr, V Chang, L Dos Santos… - Sensors, 2022 - mdpi.com
Distributed edge intelligence is a disruptive research area that enables the execution of
machine learning and deep learning (ML/DL) algorithms close to where data are generated …

[HTML][HTML] Malicious Traffic Classification via Edge Intelligence in IIoT

M Wang, B Zhang, X Zang, K Wang, X Ma - Mathematics, 2023 - mdpi.com
The proliferation of smart devices in the 5G era of industrial IoT (IIoT) produces significant
traffic data, some of which is encrypted malicious traffic, creating a significant problem for …

An edge intelligence framework for resource constrained community area network

O Oderhohwo, H Mohammed, T Odetola… - 2020 IEEE 63rd …, 2020 - ieeexplore.ieee.org
Edge intelligence, Artificial Intelligence (AI) on the edge can have a significant impact on
modern Community Area Network (CAN). This paper proposes an edge intelligence method …

Terminal security reinforcement method based on graph and potential function

A Xu, L Fei, Q Wang, H Wen, S Wu… - 2021 International …, 2021 - ieeexplore.ieee.org
By taking advantages of graphs and potential functions, a security reinforcement method for
edge computing terminals is proposed in this paper. A risk graph of the terminal security …

PRBN: A pipelined implementation of RBN for CNN training

Z Yang, L Wang, X Zhang, D Ding, C Xie… - Conference on Advanced …, 2020 - Springer
Abstract Recently, training CNNs (Convolutional Neural Networks) on-chip has attracted
much attention. With the development of the CNNs, the proportion of the BN (Batch …

Cooperative Training Video Surveillance Technology under the Edge Computing

D Lian, A Xu, S Chen, X Xu, Y Jiang… - Journal of Physics …, 2020 - iopscience.iop.org
Edge computing offsets the computing power devices to close the terminals, which avoids
delay caused by long-distance transmission and network congestion under the cloud …

FDI Attack Detection Scheme based on Nonlinear Prediction and Deep Learning

A Xu, P Zhang, Q Li, H Wen, J Guo… - 2021 International …, 2021 - ieeexplore.ieee.org
In a smart grid system, an FDI attacker can construct a false data injection attack vector
without changing the measurement residual, and traditional bad data detection methods …

The Optimization of Microgrid Distribution Based on PSO

A Xu, R Zhao, Z Mao, H Wen, Y Jiang… - 2021 International …, 2021 - ieeexplore.ieee.org
It is important to predict microgrid user's behaviour and the power generation quota of the
microgrid for the optimal interaction of power distribution between microgrid generators and …

PRBN: A Pipelined Implementation of RBN for CNN Training

L Luo - … Computer Architecture: 13th Conference, ACA 2020 …, 2020 - books.google.com
Recently, training CNNs (Convolutional Neural Networks) on-chip has attracted much
attention. With the development of the CNNs, the proportion of the BN (Batch Normalization) …

Multi-Label Multi-Classification Implementation with Object Detection for Edge Intelligence

OD Oderhohwo - 2020 - search.proquest.com
The digital age has seen explosion in data generated, and with this rise in data comes the
need for intelligent systems to interpret and make decisions. This has created a wider …