LoRA-based Parameter-Efficient LLMs for Continuous Learning in Edge-based Malware Detection Authors: Christian Rondanini, Barbara Carminati, Elena Ferrari, Niccolò Lardo, Ashish Kundu | Published: 2026-02-12 Edge ComputingExperimental ValidationFederated Learning 2026.02.12 2026.02.14 Literature Database
Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and Benchmarking Authors: Sheikh Muhammad Farjad, Sandeep Reddy Patllola, Yonas Kassa, George Grispos, Robin Gandhi | Published: 2025-03-24 Edge ComputingCloud ComputingResource Usage Analysis 2025.03.24 2025.05.27 Literature Database
AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent Authors: Mugheez Asif, Abdul Manan, Abdul Moiz ur Rehman, Mamoona Naveed Asghar, Muhammad Umair | Published: 2024-08-08 Edge ComputingCybersecurityAutomated Intrusion Detection System 2024.08.08 2025.05.27 Literature Database
Privacy-Preserving Hierarchical Model-Distributed Inference Authors: Fatemeh Jafarian Dehkordi, Yasaman Keshtkarjahromi, Hulya Seferoglu | Published: 2024-07-25 | Updated: 2024-09-15 Edge ComputingPrivacy Protection MethodCommunication Efficiency 2024.07.25 2025.05.27 Literature Database
Blockchain Integrated Federated Learning in Edge-Fog-Cloud Systems for IoT based Healthcare Applications A Survey Authors: Shinu M. Rajagopal, Supriya M., Rajkumar Buyya | Published: 2024-06-08 Edge ComputingPrivacy ProtectionBlockchain Technology 2024.06.08 2025.05.27 Literature Database
Privacy-Preserving Edge Federated Learning for Intelligent Mobile-Health Systems Authors: Amin Aminifar, Matin Shokri, Amir Aminifar | Published: 2024-05-09 | Updated: 2024-09-13 Edge ComputingPrivacy Protection MethodCommunication Efficiency 2024.05.09 2025.05.27 Literature Database
Adversarial Robustness of Distilled and Pruned Deep Learning-based Wireless Classifiers Authors: Nayan Moni Baishya, B. R. Manoj | Published: 2024-04-11 Edge ComputingAdversarial ExampleAdversarial Training 2024.04.11 2025.05.27 Literature Database
MAGNETO: Edge AI for Human Activity Recognition — Privacy and Personalization Authors: Jingwei Zuo, George Arvanitakis, Mthandazo Ndhlovu, Hakim Hacid | Published: 2024-02-11 | Updated: 2024-02-14 Edge ComputingPrivacy ProtectionReal-Time Inference 2024.02.11 2025.05.27 Literature Database
Security Challenges for Cloud or Fog Computing-Based AI Applications Authors: Amir Pakmehr, Andreas Aßmuth, Christoph P. Neumann, Gerald Pirkl | Published: 2023-10-30 | Updated: 2023-12-20 Edge ComputingSecurity AnalysisData Leakage 2023.10.30 2025.05.28 Literature Database