Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Ai-based mobile edge computing for iot: Applications, challenges, and future scope

A Singh, SC Satapathy, A Roy, A Gutub - Arabian Journal for Science and …, 2022 - Springer
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …

DQN-based mobile edge computing for smart Internet of vehicle

L Zhang, W Zhou, J **a, C Gao, F Zhu, C Fan… - EURASIP journal on …, 2022 - Springer
In this paper, we investigate a multiuser mobile edge computing (MEC)-aided smart Internet
of vehicle (IoV) network, where one edge server can help accomplish the intensive …

Human‐centered attention‐aware networks for action recognition

S Liu, Y Li, W Fu - International Journal of Intelligent Systems, 2022 - Wiley Online Library
Action recognition in video is a research hot spot in the field of computer vision. Learning
important clues in video context has significant effect to promote the interaction prediction …

Federated learning‐based trajectory prediction model with privacy preserving for intelligent vehicle

M Han, K Xu, S Ma, A Li, H Jiang - International journal of …, 2022 - Wiley Online Library
The existing trajectory prediction is mainly for specific road sections, which is poor to adapt
to complex and changing traffic scenarios. Meanwhile, decentralized trajectory data is hard …

Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U‐net based on multiple spaces

Y Wei, J Ma, Z Wang, B **ao… - International Journal of …, 2022 - Wiley Online Library
With the popularity of image editing tools, the originality and information security of images
are facing serious threats. The most common threat is splicing forgery that copies a part of …

Security of federated learning for cloud‐edge intelligence collaborative computing

J Yang, J Zheng, Z Zhang, QI Chen… - … Journal of Intelligent …, 2022 - Wiley Online Library
Federated Learning (FL) is one of the key technologies to solve privacy protection for cloud‐
edge intelligent collaborative computing, and its security and privacy issues have attracted …

Similarity-based integrity protection for deep learning systems

R Hou, S Ai, Q Chen, H Yan, T Huang, K Chen - Information Sciences, 2022 - Elsevier
Deep learning technologies have achieved remarkable success in various tasks, ranging
from computer vision, object detection to natural language processing. Unfortunately, state …

Privacy preserving federated learning for full heterogeneity

K Chen, X Zhang, X Zhou, B Mi, Y **ao, L Zhou, Z Wu… - ISA transactions, 2023 - Elsevier
Federated learning is a novel distribute machine learning paradigm to support cooperative
model training among multiple participant clients, where each client keeps its private data …

A federated semi‐supervised learning approach for network traffic classification

Z **, Z Liang, M He, Y Peng, H Xue… - International Journal of …, 2023 - Wiley Online Library
The classification of network traffic, which involves classifying and identifying the type of
network traffic, is the most fundamental step to network service improvement and modern …