4.8 Article

PDM: Privacy-Aware Deployment of Machine-Learning Applications for Industrial Cyber-Physical Cloud Systems

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

A Tensor-Based Multiattributes Visual Feature Recognition Method for Industrial Intelligence

Xiaokang Wang et al.

Summary: The Industrial Internet-of-Things has transformed industrial manufacturing by incorporating production equipment, mobile terminals, and smart devices with networks, and the processing and recognition methods of industrial visual information are crucial for providing industrial intelligence.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Automation & Control Systems

ADTT: A Highly Efficient Distributed Tensor-Train Decomposition Method for IIoT Big Data

Xiaokang Wang et al.

Summary: The industrial Internet of Things (IIoT) is rapidly growing due to the integration of smart sensors, instruments, devices, and software, resulting in improved industrial practices and intelligence. Significant developments in IIoT big data processing and analysis are needed, and the proposed advanced distributed tensor-train (ADTT) decomposition method aims to efficiently process large-scale IIoT data.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Theory & Methods

SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems

Zhiwei Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Automation & Control Systems

Artificial Intelligence for Detection, Estimation, and Compensation of Malicious Attacks in Nonlinear Cyber-Physical Systems and Industrial IoT

Faezeh Farivar et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

Model Predictive Control for Energy-Efficient, Quality-Aware, and Secure Virtual Machine Placement

Mauro Gaggero et al.

IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING (2019)

Article Computer Science, Theory & Methods

A computation offloading method over big data for IoT-enabled cloud-edge computing

Xiaolong Xu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Artificial Intelligence

Lightweight Convolution Neural Networks for Mobile Edge Computing in Transportation Cyber Physical Systems

Junhao Zhou et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2019)

Article Computer Science, Artificial Intelligence

A Trust Computing-based Security Routing Scheme for Cyber Physical Systems

Yuxin Liu et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2019)

Article Computer Science, Information Systems

Attack Detection for Securing Cyber Physical Systems

Weizhong Yan et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Engineering, Electrical & Electronic

Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems

Marilyn Wolf et al.

PROCEEDINGS OF THE IEEE (2018)

Article Computer Science, Hardware & Architecture

An IoT-Oriented data placement method with privacy preservation in cloud environment

Xiaolong Xu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Theory & Methods

Multi-key privacy-preserving deep learning in cloud computing

Ping Li et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Automation & Control Systems

An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems

Xu Jin et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2017)

Review Computer Science, Hardware & Architecture

Security and privacy challenges in mobile cloud computing: Survey and way ahead

Muhammad Baqer Mollah et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Information Systems

Cyber-Physical Systems Security-A Survey

Abdulmalik Humayed et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Theory & Methods

A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing

Zhihua Xia et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

EnReal: An Energy-Aware Resource Allocation Method for Scientific Workflow Executions in Cloud Environment

Xiaolong Xu et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2016)

Article Computer Science, Information Systems

Optimizing data placement in heterogeneous Hadoop clusters

Runqun Xiong et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2015)

Proceedings Paper Computer Science, Hardware & Architecture

An Energy-aware Task Scheduling Algorithm for a Heterogeneous Data Center

Shuo Zhang et al.

2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) (2013)