|
|
|
Wenbin Li, Hakim Hacid, Ebtesam Almazrouei and Merouane Debbah
The union of Edge Computing (EC) and Artificial Intelligence (AI) has brought forward the Edge AI concept to provide intelligent solutions close to the end-user environment, for privacy preservation, low latency to real-time performance, and resource opt...
ver más
|
|
|
|
|
|
|
Fan Huang , Nan Yang, Huaming Chen , Wei Bao and Dong Yuan
With the widespread use of end devices, online multi-label learning has become popular as the data generated by users using the Internet of Things devices have become huge and rapidly updated. However, in many scenarios, the user data are often generated...
ver más
|
|
|
|
|
|
|
Dongsik Jo and Jin-Ho Chung
In distributed learning for data requiring privacy preservation, such as medical data, the distribution of secret information is an important problem. In this paper, we propose a framework for secret codes in application to distributed systems. Then, we ...
ver más
|
|
|
|
|
|
|
Diogo Teixeira, Silvestre Malta and Pedro Pinto
An intrusion detection system (IDS) is an important tool to prevent potential threats to systems and data. Anomaly-based IDSs may deploy machine learning algorithms to classify events either as normal or anomalous and trigger the adequate response. When ...
ver más
|
|
|
|
|
|
|
Yan Zeng, Jiyang Wu, Jilin Zhang, Yongjian Ren and Yunquan Zhang
Deep learning, with increasingly large datasets and complex neural networks, is widely used in computer vision and natural language processing. A resulting trend is to split and train large-scale neural network models across multiple devices in parallel,...
ver más
|
|
|
|
|
|
|
Eugenio Muscinelli, Swapnil Sadashiv Shinde and Daniele Tarchi
The main goal of this paper is to survey the influential research of distributed learning technologies playing a key role in the 6G world. Upcoming 6G technology is expected to create an intelligent, highly scalable, dynamic, and programable wireless com...
ver más
|
|
|
|
|
|
|
Mehreen Tahir and Muhammad Intizar Ali
Federated Learning (FL) is a state-of-the-art technique used to build machine learning (ML) models based on distributed data sets. It enables In-Edge AI, preserves data locality, protects user data, and allows ownership. These characteristics of FL make ...
ver más
|
|
|
|
|
|
|
Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon and Sajjan Shiva
The distributed denial of service (DDoS) attack is one of the most pernicious threats in cyberspace. Catastrophic failures over the past two decades have resulted in catastrophic and costly disruption of services across all sectors and critical infrastru...
ver más
|
|
|
|
|
|
|
Sotirios Kontogiannis, Myrto Konstantinidou, Vasileios Tsioukas and Christos Pikridas
In viticulture, downy mildew is one of the most common diseases that, if not adequately treated, can diminish production yield. However, the uncontrolled use of pesticides to alleviate its occurrence can pose significant risks for farmers, consumers, and...
ver más
|
|
|
|
|
|
|
David Naseh, Mahdi Abdollahpour and Daniele Tarchi
This paper explores the practical implementation and performance analysis of distributed learning (DL) frameworks on various client platforms, responding to the dynamic landscape of 6G technology and the pressing need for a fully connected distributed in...
ver más
|
|
|
|
|
|
|
Jing Liu, Xuesong Hai and Keqin Li
Massive amounts of data drive the performance of deep learning models, but in practice, data resources are often highly dispersed and bound by data privacy and security concerns, making it difficult for multiple data sources to share their local data dir...
ver más
|
|
|
|
|
|
|
Binghui Zhao, Liguo Han, Pan Zhang, Qiang Feng and Liyun Ma
In passive seismic exploration, the number and location of underground sources are very random, and there may be few passive sources or an uneven spatial distribution. The random distribution of seismic sources can cause the virtual shot recordings to pr...
ver más
|
|
|
|
|
|
|
Ruikui Ma, Qiuqian Wang, Xiangxi Bu and Xuebin Chen
With the development of the Internet of Things, a huge number of devices are connected to the network, network traffic is exhibiting massive and low latency characteristics. At the same time, it is becoming cheaper and cheaper to launch DDoS attacks, and...
ver más
|
|
|
|
|
|
|
Kashan Ahmed, Ayesha Altaf, Nor Shahida Mohd Jamail, Faiza Iqbal and Rabia Latif
Modern distributed systems that operate concurrently generate interleaved logs. Identifiers (ID) are always associated with active instances or entities in order to track them in logs. Consequently, log messages with similar IDs can be categorized to aid...
ver más
|
|
|
|
|
|
|
Mahmoud Bidry, Abdellah Ouaguid and Mohamed Hanine
Blockchain represents a decentralized and distributed ledger technology, ensuring transparent and secure transaction recording across networks. This innovative technology offers several benefits, including increased security, trust, and transparency, mak...
ver más
|
|
|
|
|
|
|
Ayodeji Falayi, Qianlong Wang, Weixian Liao and Wei Yu
The Internet of Things (IoT) continues to attract attention in the context of computational resource growth. Various disciplines and fields have begun to employ IoT integration technologies in order to enable smart applications. The main difficulty in su...
ver más
|
|
|
|
|
|
|
Shuang Wang, Amin Beheshti, Yufei Wang, Jianchao Lu, Quan Z. Sheng, Stephen Elbourn and Hamid Alinejad-Rokny
Instructors face significant time and effort constraints when grading students? assessments on a large scale. Clustering similar assessments is a unique and effective technique that has the potential to significantly reduce the workload of instructors in...
ver más
|
|
|
|
|
|
|
Praveen Kumar Donta, Ilir Murturi, Victor Casamayor Pujol, Boris Sedlak and Schahram Dustdar
Computing paradigms have evolved significantly in recent decades, moving from large room-sized resources (processors and memory) to incredibly small computing nodes. Recently, the power of computing has attracted almost all current application fields. Cu...
ver más
|
|
|
|
|
|
|
Benjamin Warnke, Stefan Fischer and Sven Groppe
Due to increasing digitization, the amount of data in the Internet of Things (IoT) is constantly increasing. In order to be able to process queries efficiently, strategies must, therefore, be found to reduce the transmitted data as much as possible. SPAR...
ver más
|
|
|
|
|
|
|
George Sisias, Myrto Konstantinidou and Sotirios Kontogiannis
Automated deep learning and data mining algorithms can provide accurate detection, frequency patterns, and predictions of dangerous goods passing through motorways and tunnels. This paper presents a post-processing image detection application and a three...
ver más
|
|
|
|