At the confluence of artificial intelligence and edge computing in iot-based applications: A review and new perspectives

A Bourechak, O Zedadra, MN Kouahla, A Guerrieri… - Sensors, 2023 - mdpi.com
Given its advantages in low latency, fast response, context-aware services, mobility, and
privacy preservation, edge computing has emerged as the key support for intelligent …

[HTML][HTML] Differential privacy in edge computing-based smart city Applications: Security issues, solutions and future directions

A Yao, G Li, X Li, F Jiang, J Xu, X Liu - Array, 2023 - Elsevier
Fast-growing smart city applications, such as smart delivery, smart community, and smart
health, are generating big data that are widely distributed on the internet. IoT (Internet of …

Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining

D Dhinakaran, PMJ Prathap - The Journal of Supercomputing, 2022 - Springer
The confidential data is mainly managed by creating passwords, tokens, and unique
identifiers in an authorized manner. These records must be kept in a safe location away from …

A differential approach for data and classification service-based privacy-preserving machine learning model in cloud environment

R Gupta, AK Singh - New Generation Computing, 2022 - Springer
The massive upsurge in computational and storage has driven the local data and machine
learning applications to the cloud environment. The owners may not fully trust the cloud …

Application layer security for internet communications: A comprehensive review, challenges, and future trends

D Cevallos-Salas, J Estrada-Jiménez… - Computers and Electrical …, 2024 - Elsevier
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …

Data security and privacy in cloud computing: concepts and emerging trends

R Gupta, D Saxena, AK Singh - arxiv preprint arxiv:2108.09508, 2021 - arxiv.org
Millions of users across the world leverages data processing and sharing benefits from
cloud environment. Data security and privacy are inevitable requirement of cloud …

[HTML][HTML] Privacy-Preserving Synthetic Data Generation Method for IoT-Sensor Network IDS Using CTGAN

S Alabdulwahab, YT Kim, Y Son - Sensors, 2024 - mdpi.com
The increased usage of IoT networks brings about new privacy risks, especially when
intrusion detection systems (IDSs) rely on large datasets for machine learning (ML) tasks …

Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues

E Mustafa, J Shuja, F Rehman, A Riaz, M Maray… - Journal of Network and …, 2024 - Elsevier
Abstract Mobile Edge Computing (MEC) is a modern paradigm that involves moving
computing and storage resources closer to the network edge, reducing latency, and …

Differential privacy location protection method based on the Markov model

H Li, Y Wang, F Guo, J Wang… - … and Mobile Computing, 2021 - Wiley Online Library
Location‐based services (LBS) have become an important research area with the rapid
development of mobile Internet technology, GPS positioning technology, and the …

Have the cake and eat it too: Differential Privacy enables privacy and precise analytics

R Subramanian - Journal of Big Data, 2023 - Springer
Existing research in differential privacy, whose applications have exploded across functional
areas in the last few years, describes an intrinsic trade-off between the privacy of a dataset …