A trusted and collaborative framework for deep learning in IoT
暂无分享,去创建一个
Hong Zhong | Qingyang Zhang | Lu Liu | Weisong Shi | Qingyang Zhang | Weisong Shi | Hong Zhong | Lu Liu
[1] Sakir Sezer,et al. NOTRINO: A NOvel Hybrid TRust Management Scheme for INternet-of-Vehicles , 2021, IEEE Transactions on Vehicular Technology.
[2] Sorin Grigorescu,et al. A Survey of Deep Learning Techniques for Autonomous Driving , 2020, J. Field Robotics.
[3] Weisong Shi,et al. Computing Systems for Autonomous Driving: State of the Art and Challenges , 2021, IEEE Internet of Things Journal.
[4] Yan Xu,et al. Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT , 2021, IEEE Transactions on Industrial Electronics.
[5] Eyal de Lara,et al. Cloudpath: a multi-tier cloud computing framework , 2017, SEC.
[6] Geyong Min,et al. Computation Offloading in Multi-Access Edge Computing Using a Deep Sequential Model Based on Reinforcement Learning , 2019, IEEE Communications Magazine.
[7] Mianxiong Dong,et al. Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing , 2018, IEEE Network.
[8] Quan Zhang,et al. Firework: Data Processing and Sharing for Hybrid Cloud-Edge Analytics , 2018, IEEE Transactions on Parallel and Distributed Systems.
[9] Jie Xu,et al. Dynamic Authentication for Cross-Realm SOA-Based Business Processes , 2012, IEEE Transactions on Services Computing.
[10] Frederik Vercauteren,et al. FPGA-Based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data , 2019, 2019 IEEE International Symposium on High Performance Computer Architecture (HPCA).
[11] Carlos V. Rozas,et al. Intel® Software Guard Extensions (Intel® SGX) Support for Dynamic Memory Management Inside an Enclave , 2016, HASP 2016.
[12] Xiaopei Wu,et al. Edge Video Analytics for Public Safety: A Review , 2019, Proceedings of the IEEE.
[13] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[14] Jason P. Jue,et al. All One Needs to Know about Fog Computing and Related Edge Computing Paradigms , 2019 .
[15] Yun Yang,et al. A Game-Theoretical Approach for Mitigating Edge DDoS Attack , 2022, IEEE Transactions on Dependable and Secure Computing.
[16] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[17] Bo Li,et al. Auditing Cache Data Integrity in the Edge Computing Environment , 2021, IEEE Transactions on Parallel and Distributed Systems.
[18] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[19] Gueyoung Jung,et al. FocusStack: Orchestrating Edge Clouds Using Location-Based Focus of Attention , 2016, 2016 IEEE/ACM Symposium on Edge Computing (SEC).
[20] Hong Zhong,et al. How Edge Computing and Initial Congestion Window Affect Latency of Web-Based Services: Early Experiences with Baidu? , 2018, 2018 IEEE/ACM Symposium on Edge Computing (SEC).
[21] Etienne Perot,et al. End-to-End Deep Reinforcement Learning for Lane Keeping Assist , 2016, ArXiv.
[22] Albert Y. Zomaya,et al. Fast Adaptive Task Offloading in Edge Computing Based on Meta Reinforcement Learning , 2021, IEEE Transactions on Parallel and Distributed Systems.
[23] Valerio Schiavoni,et al. SGX-Aware Container Orchestration for Heterogeneous Clusters , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).
[24] Paramvir Bahl,et al. Real-Time Video Analytics: The Killer App for Edge Computing , 2017, Computer.
[25] Yun Yang,et al. CoopEdge: A Decentralized Blockchain-based Platform for Cooperative Edge Computing , 2021, WWW.
[26] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[27] Xiaopei Wu,et al. OpenVDAP: An Open Vehicular Data Analytics Platform for CAVs , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).
[28] Lin Wang,et al. MobileEdge: Enhancing On-Board Vehicle Computing Units Using Mobile Edges for CAVs , 2019, 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS).
[29] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[30] Valerio Schiavoni,et al. SecureStreams: A Reactive Middleware Framework for Secure Data Stream Processing , 2017, DEBS.
[31] Abdelmadjid Bouabdallah,et al. Trusted Execution Environment: What It is, and What It is Not , 2015, TrustCom 2015.
[32] Quan Zhang,et al. Distributed Collaborative Execution on the Edges and Its Application to AMBER Alerts , 2018, IEEE Internet of Things Journal.
[33] Hong Zhong,et al. Demo Abstract: EVAPS: Edge Video Analysis for Public Safety , 2016, 2016 IEEE/ACM Symposium on Edge Computing (SEC).
[34] Ying-Chang Liang,et al. Applications of Deep Reinforcement Learning in Communications and Networking: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[35] Mohsen Guizani,et al. Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[36] Yubin Xia,et al. Occlum: Secure and Efficient Multitasking Inside a Single Enclave of Intel SGX , 2020, ASPLOS.
[37] David Bernstein,et al. Containers and Cloud: From LXC to Docker to Kubernetes , 2014, IEEE Cloud Computing.
[38] Long Lu,et al. StreamBox-TZ: Secure Stream Analytics at the Edge with TrustZone , 2018, USENIX ATC.