Machine learning at the network edge: A survey

MGS Murshed, C Murphy, D Hou, N Khan… - ACM Computing …, 2021 - dl.acm.org
Resource-constrained IoT devices, such as sensors and actuators, have become ubiquitous
in recent years. This has led to the generation of large quantities of data in real-time, which …

Toward a privacy-preserving face recognition system: A survey of leakages and solutions

L Laishram, M Shaheryar, JT Lee, SK Jung - ACM Computing Surveys, 2024 - dl.acm.org
Recent advancements in face recognition (FR) technology in surveillance systems make it
possible to monitor a person as they move around. FR gathers a lot of information …

Always be dreaming: A new approach for data-free class-incremental learning

J Smith, YC Hsu, J Balloch, Y Shen… - Proceedings of the …, 2021 - openaccess.thecvf.com
Modern computer vision applications suffer from catastrophic forgetting when incrementally
learning new concepts over time. The most successful approaches to alleviate this forgetting …

A design space for privacy choices: Towards meaningful privacy control in the internet of things

Y Feng, Y Yao, N Sadeh - Proceedings of the 2021 CHI Conference on …, 2021 - dl.acm.org
“Notice and choice” is the predominant approach for data privacy protection today. There is
considerable user-centered research on providing effective privacy notices but not enough …

A taxonomy of AI techniques for 6G communication networks

K Sheth, K Patel, H Shah, S Tanwar, R Gupta… - Computer …, 2020 - Elsevier
With 6G flagship program launched by the University of Oulu, Finland, for full future
adaptation of 6G by 2030, many institutes worldwide have started to explore various issues …

" I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks

M Tabassum, T Kosinski, HR Lipford - Fifteenth symposium on usable …, 2019 - usenix.org
Smart homes are more connected than ever before, with a variety of commercial devices
available. The use of these devices introduces new security and privacy risks in the home …

Deepcache: Principled cache for mobile deep vision

M Xu, M Zhu, Y Liu, FX Lin, X Liu - Proceedings of the 24th annual …, 2018 - dl.acm.org
We present DeepCache, a principled cache design for deep learning inference in
continuous mobile vision. DeepCache benefits model execution efficiency by exploiting …

COVID‐19 pandemic: a review of smart cities initiatives to face new outbreaks

DG Costa, JPJ Peixoto - IET Smart Cities, 2020 - Wiley Online Library
While the world still struggles against the devastating effects of the COVID‐19 pandemic,
governments and organisations are discussing how new technologies can be exploited to …

Can we use arbitrary objects to attack lidar perception in autonomous driving?

Y Zhu, C Miao, T Zheng, F Hajiaghajani, L Su… - Proceedings of the 2021 …, 2021 - dl.acm.org
As an effective way to acquire accurate information about the driving environment, LiDAR
perception has been widely adopted in autonomous driving. The state-of-the-art LiDAR …

[HTML][HTML] User-centric privacy preserving models for a new era of the Internet of Things

JE Rivadeneira, JS Silva, R Colomo-Palacios… - Journal of Network and …, 2023 - Elsevier
New concepts based on the Internet of Things propose the integration of the human factor as
a key component of novel interconnected ecosystems, to offer them new services and …