Edge Computing

Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and Benchmarking

Authors: Sheikh Muhammad Farjad, Sandeep Reddy Patllola, Yonas Kassa, George Grispos, Robin Gandhi | Published: 2025-03-24
Edge Computing
Cloud Computing
Resource Usage Analysis

AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent

Authors: Mugheez Asif, Abdul Manan, Abdul Moiz ur Rehman, Mamoona Naveed Asghar, Muhammad Umair | Published: 2024-08-08
Edge Computing
Cybersecurity
Automated Intrusion Detection System

Privacy-Preserving Hierarchical Model-Distributed Inference

Authors: Fatemeh Jafarian Dehkordi, Yasaman Keshtkarjahromi, Hulya Seferoglu | Published: 2024-07-25 | Updated: 2024-09-15
Edge Computing
Privacy Protection Method
Communication Efficiency

Blockchain Integrated Federated Learning in Edge-Fog-Cloud Systems for IoT based Healthcare Applications A Survey

Authors: Shinu M. Rajagopal, Supriya M., Rajkumar Buyya | Published: 2024-06-08
Edge Computing
Privacy Protection
Blockchain Technology

Privacy-Preserving Edge Federated Learning for Intelligent Mobile-Health Systems

Authors: Amin Aminifar, Matin Shokri, Amir Aminifar | Published: 2024-05-09 | Updated: 2024-09-13
Edge Computing
Privacy Protection Method
Communication Efficiency

Adversarial Robustness of Distilled and Pruned Deep Learning-based Wireless Classifiers

Authors: Nayan Moni Baishya, B. R. Manoj | Published: 2024-04-11
Edge Computing
Adversarial Example
Adversarial Training

MAGNETO: Edge AI for Human Activity Recognition — Privacy and Personalization

Authors: Jingwei Zuo, George Arvanitakis, Mthandazo Ndhlovu, Hakim Hacid | Published: 2024-02-11 | Updated: 2024-02-14
Edge Computing
Privacy Protection
Real-Time Inference

Security Challenges for Cloud or Fog Computing-Based AI Applications

Authors: Amir Pakmehr, Andreas Aßmuth, Christoph P. Neumann, Gerald Pirkl | Published: 2023-10-30 | Updated: 2023-12-20
Edge Computing
Security Analysis
Data Leakage