Edge computing with artificial intelligence: A machine learning perspective

H Hua, Y Li, T Wang, N Dong, W Li, J Cao - ACM Computing Surveys, 2023 - dl.acm.org
Recent years have witnessed the widespread popularity of Internet of things (IoT). By
providing sufficient data for model training and inference, IoT has promoted the development …

[HTML][HTML] Intrusion detection in internet of things systems: a review on design approaches leveraging multi-access edge computing, machine learning, and datasets

E Gyamfi, A Jurcut - Sensors, 2022 - mdpi.com
The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic
increase of network data and placed a high computation complexity across various …

[HTML][HTML] Optimized machine learning-based intrusion detection system for fog and edge computing environment

OA Alzubi, JA Alzubi, M Alazab, A Alrabea, A Awajan… - Electronics, 2022 - mdpi.com
As a new paradigm, fog computing (FC) has several characteristics that set it apart from the
cloud computing (CC) environment. Fog nodes and edge computing (EC) hosts have limited …

Self-supervised vision transformer-based few-shot learning for facial expression recognition

X Chen, X Zheng, K Sun, W Liu, Y Zhang - Information Sciences, 2023 - Elsevier
Facial expression recognition (FER) is embedded in many real-world human-computer
interaction tasks, such as online learning, depression recognition and remote diagnosis …

Energy trading scheme based on consortium blockchain and game theory

Y Chen, Y Li, Q Chen, X Wang, T Li, C Tan - Computer Standards & …, 2023 - Elsevier
With the gradual opening of the electricity sales market, distributed energy trading is
becoming an important research topic. However, it is not easy to design practical energy …

[HTML][HTML] A systematic literature review on distributed machine learning in edge computing

CP Filho, E Marques Jr, V Chang, L Dos Santos… - Sensors, 2022 - mdpi.com
Distributed edge intelligence is a disruptive research area that enables the execution of
machine learning and deep learning (ML/DL) algorithms close to where data are generated …

Model architecture level privacy leakage in neural networks

Y Li, H Yan, T Huang, Z Pan, J Lai, X Zhang… - Science China …, 2024 - Springer
Privacy leakage is one of the most critical issues in machine learning and has attracted
growing interest for tasks such as demonstrating potential threats in model attacks and …

Enhancing intrusion detection with feature selection and neural network

C Wu, W Li - International Journal of Intelligent Systems, 2021 - Wiley Online Library
Intrusion detection systems are widely implemented to protect computer networks from
threats. To identify unknown attacks, many machine learning algorithms like neural networks …

Daas: Dew computing as a service for intelligent intrusion detection in edge-of-things ecosystem

P Singh, A Kaur, GS Aujla, RS Batth… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Edge of Things (EoT) enables the seamless transfer of services, storage, and data
processing from the cloud layer to edge devices in a large-scale distributed Internet of …

Intrusion detection in Edge-of-Things computing

AS Almogren - Journal of Parallel and Distributed Computing, 2020 - Elsevier
Abstract Edge-of-Things (EoT) is a new evolving computing model driven by the Internet of
Things (IoT). It enables data processing, storage, and service to be shifted from the Cloud to …