Edge computing technology enablers: A systematic lecture study

S Douch, MR Abid, K Zine-Dine, D Bouzidi… - IEEE …, 2022 - ieeexplore.ieee.org
With the increasing stringent QoS constraints (eg, latency, bandwidth, jitter) imposed by
novel applications (eg, e-Health, autonomous vehicles, smart cities, etc.), as well as the …

Transformers: A Security Perspective

BS Latibari, N Nazari, MA Chowdhury, KI Gubbi… - IEEE …, 2024 - ieeexplore.ieee.org
The Transformers architecture has recently emerged as a revolutionary paradigm in the field
of deep learning, particularly excelling in Natural Language Processing (NLP) and …

Adversarial attacks on machine learning in embedded and iot platforms

C Westbrook, S Pasricha - arXiv preprint arXiv:2303.02214, 2023 - arxiv.org
Machine learning (ML) algorithms are increasingly being integrated into embedded and IoT
systems that surround us, and they are vulnerable to adversarial attacks. The deployment of …

Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things

N Wang, J Chen, D Wu, W Yang, Y Xiang… - Journal of Information …, 2023 - Elsevier
Abstract The Internet of Things (IoT) concept has increasingly gained popularity among
different industrial and scientific fields by leveraging the development of modern electronic …

Split Edge-Cloud Neural Networks For Better Adversarial Robustness

S Douch, MR Abid, K Zine-Dine, D Bouzidi… - IEEE …, 2024 - ieeexplore.ieee.org
Cloud computing is a critical component in the success of 5G and 6G networks, particularly
given the computation-intensive nature of emerging applications. Despite all it advantages …

Detection of Adversarial Attacks by Observing Deep Features with Structured Data Algorithms

T Puccetti, A Ceccarelli, T Zoppi… - Proceedings of the 38th …, 2023 - dl.acm.org
Deep Neural Networks (DNNs) are highly vulnerable to adversarial attacks, which introduce
human-imperceptible perturbations on the input to fool a DNN model. Detecting such attacks …

A Robust NFT Assisted Knowledge Distillation Framework for Edge Computing

N Wang, A Sajjanhar, Y Xiang, L Gao - International Conference on …, 2022 - Springer
With the development and improvement in chip manufacturing and network communication,
Internet of Things (IoT) have been addressing more and more popularity around these days …

EnsGuard: A Novel Acceleration Framework for Adversarial Ensemble Learning

X Wang, Y Wang, Y Su, S Zhang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
To defend against various adversarial attacks, it is essential to develop a robust and high
computing efficiency defence framework. Adversarial ensemble learning is the most effective …

Early Exists Federated Learning (EEFL): Brining Training to the Edge

S Douch, MR Abid, K Zine-Dine… - … Computing in Data …, 2024 - ieeexplore.ieee.org
With the proliferation of IoT devices, the core network is experiencing overwhelming
congestion. Edge Com-puting emerges as a valuable and promising solution to relocate …

对抗训练驱动的恶意代码检测增强方法

Y Liu, J Li, Z Ou, X Gao, X Liu, W Meng… - Tongxin Xuebao/Journal …, 2022 - orbit.dtu.dk
为了解决恶意代码检测器对于对抗性输入检测能力的不足, 提出了一种对抗训练驱动的恶意代码
检测增强方法. 首先, 通过反编译工具对应用程序进行预处理, 提取应用程序接口(API) 调用特征 …