2023
DOI: 10.1007/s00521-023-08651-5
|View full text |Cite
|
Sign up to set email alerts
|

An intelligent trusted edge data production method for distributed Internet of things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 42 publications
0
1
0
Order By: Relevance
“…It can be regarded as a distributed ledger, with each node in the network locally storing a copy of the same ledger, containing an unalterable series of data operation records. The emergence of new applications like the IoT has led to the generation of substantial data by smart devices, driving the advancement of artificial intelligence methods in wireless networks and related applications [3,4]. Federated learning (FL), as a prominent distributed machine learning framework, enables the training of data analysis models using data from various sources without revealing user data, thereby mitigating certain security risks associated with data sharing [5].…”
Section: Introductionmentioning
confidence: 99%
“…It can be regarded as a distributed ledger, with each node in the network locally storing a copy of the same ledger, containing an unalterable series of data operation records. The emergence of new applications like the IoT has led to the generation of substantial data by smart devices, driving the advancement of artificial intelligence methods in wireless networks and related applications [3,4]. Federated learning (FL), as a prominent distributed machine learning framework, enables the training of data analysis models using data from various sources without revealing user data, thereby mitigating certain security risks associated with data sharing [5].…”
Section: Introductionmentioning
confidence: 99%
“…Intelligent creation of trusted edge data for distributed IoT; • Adaptive configuration of IoT applications in fog infrastructure; • Utilization of cryptographic schemes for secure edge processing, including server deployment in multi-user edge processing; • Intelligent management of resources in fog computing using RL, including multi-user placement of IoT services with QoS consideration [52][53][54][55][56][57][58][59][60][61][62].…”
mentioning
confidence: 99%