Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey
暂无分享,去创建一个
Wentao Liu | Zhanyang Xu | Jiawei Lu | Jingwang Huang | Chenyi Yang | Haozhe Tan | Zhanyang Xu | Wentao Liu | Chenyi Yang | Jingwang Huang | Jiawei Lu | Haozhe Tan
[1] Quan Zhang,et al. Distributed Collaborative Execution on the Edges and Its Application to AMBER Alerts , 2018, IEEE Internet of Things Journal.
[2] Landon P. Cox,et al. The Emerging Landscape of Edge Computing , 2020, GetMobile Mob. Comput. Commun..
[3] Liu Huan,et al. Research on secure transmission and storage of energy IoT information based on Blockchain , 2020 .
[4] Shilin Wen,et al. Blockchain-Enabled Data Collection and Sharing for Industrial IoT With Deep Reinforcement Learning , 2019, IEEE Transactions on Industrial Informatics.
[5] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[6] Muhammad Imran,et al. Perception layer security in Internet of Things , 2019, Future Gener. Comput. Syst..
[7] N. G. J. Dias,et al. A Survey on Blockchain Technology Concepts, Applications, and Issues , 2020, SN Computer Science.
[8] Youakim Badr,et al. Internet of Medical Things: A Review of Recent Contributions Dealing With Cyber-Physical Systems in Medicine , 2018, IEEE Internet of Things Journal.
[9] Massimo Ruo Roch,et al. Edge Computing: A Survey On the Hardware Requirements in the Internet of Things World , 2019, Future Internet.
[10] Jun Wu,et al. Making Knowledge Tradable in Edge-AI Enabled IoT: A Consortium Blockchain-Based Efficient and Incentive Approach , 2019, IEEE Transactions on Industrial Informatics.
[11] Dongxi Liu,et al. Local Differential Privacy for Deep Learning , 2019, IEEE Internet of Things Journal.
[12] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[13] Xiaoyu Xia,et al. Cost-Effective App Data Distribution in Edge Computing , 2021, IEEE Transactions on Parallel and Distributed Systems.
[14] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[15] Reza M. Parizi,et al. AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things , 2020, Neural Computing and Applications.
[16] Xihua Liu,et al. Privacy-aware offloading for training tasks of generative adversarial network in edge computing , 2020, Inf. Sci..
[17] Liang Xiao,et al. IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.
[18] Fei Dai,et al. Trust-Oriented IoT Service Placement for Smart Cities in Edge Computing , 2020, IEEE Internet of Things Journal.
[19] Jian Pei,et al. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks , 2011, Knowledge and Information Systems.
[20] Lianyong Qi,et al. Amplified locality‐sensitive hashing‐based recommender systems with privacy protection , 2020 .
[21] Lianyong Qi,et al. Keywords-Driven and Popularity-Aware Paper Recommendation Based on Undirected Paper Citation Graph , 2020, Complex..
[22] Weisong Shi,et al. The Promise of Edge Computing , 2016, Computer.
[23] Xuyun Zhang,et al. Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment , 2020, Comput. Commun..
[24] Jeffrey Xu Yu,et al. Target-Aware Holistic Influence Maximization in Spatial Social Networks , 2022, IEEE Transactions on Knowledge and Data Engineering.
[25] Xing Zhang,et al. Adaptive Computation Offloading With Edge for 5G-Envisioned Internet of Connected Vehicles , 2020, IEEE Transactions on Intelligent Transportation Systems.
[26] Xuyun Zhang,et al. Diversified service recommendation with high accuracy and efficiency , 2020, Knowl. Based Syst..
[27] Muhammad Imran,et al. Deep learning and big data technologies for IoT security , 2020, Comput. Commun..
[28] Xuyun Zhang,et al. BeCome: Blockchain-Enabled Computation Offloading for IoT in Mobile Edge Computing , 2020, IEEE Transactions on Industrial Informatics.
[29] Ying Chen,et al. Energy Efficient Dynamic Offloading in Mobile Edge Computing for Internet of Things , 2019, IEEE Transactions on Cloud Computing.
[30] Wang Yifan,et al. Edge Computing: State-of-the-Art and Future Directions , 2019 .
[31] Geyong Min,et al. Deploying Edge Computing Nodes for Large-Scale IoT: A Diversity Aware Approach , 2018, IEEE Internet of Things Journal.
[32] Weixian Liao,et al. Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly , 2019, IEEE Access.
[33] Abhishek Chandra,et al. Nebula: Distributed Edge Cloud for Data Intensive Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[34] Xiaohui Liang,et al. Energy Theft Detection With Energy Privacy Preservation in the Smart Grid , 2019, IEEE Internet of Things Journal.
[35] Lin Li,et al. How textual quality of online reviews affect classification performance: a case of deep learning sentiment analysis , 2018, Neural Computing and Applications.
[36] Guangming Cui,et al. A Game-Theoretical Approach for User Allocation in Edge Computing Environment , 2020, IEEE Transactions on Parallel and Distributed Systems.
[37] Jie Zhang,et al. A Blockchain-Powered Crowdsourcing Method With Privacy Preservation in Mobile Environment , 2019, IEEE Transactions on Computational Social Systems.
[38] Muhammad Imran,et al. Securing IoTs in distributed blockchain: Analysis, requirements and open issues , 2019, Future Gener. Comput. Syst..
[39] Liu Fang,et al. Edge Computing: Platforms, Applications and Challenges , 2018 .
[40] R Kalaivani,et al. Additive Gaussian Noise Based Data Perturbation in Multi-Level Trust Privacy Preserving Data Mining , 2014 .
[41] Patrick Crowley,et al. Named data networking , 2014, CCRV.
[42] Feng Xia,et al. Community-diversified influence maximization in social networks , 2020, Inf. Syst..
[43] Atay Ozgovde,et al. How Can Edge Computing Benefit From Software-Defined Networking: A Survey, Use Cases, and Future Directions , 2017, IEEE Communications Surveys & Tutorials.
[44] Petros Spachos,et al. Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey , 2020, J. Netw. Comput. Appl..
[45] Jiguo Yu,et al. Edge Computing Security: State of the Art and Challenges , 2019, Proceedings of the IEEE.
[46] Zibin Zheng,et al. Cooperative and Distributed Computation Offloading for Blockchain-Empowered Industrial Internet of Things , 2019, IEEE Internet of Things Journal.