2021
DOI: 10.1007/s10586-021-03401-5
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing quality of experience in mobile edge computing using deep learning based data offloading and cyberattack detection technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 26 publications
0
14
0
Order By: Relevance
“…Aerial imagery classification of scenes classifies the aerial images, captured using drones, to sub-areas, by masking several ground matters and types of land covers, to numerous semantic forms. In many real-time implications such as urban planning, computer cartography, and the management of remote sensing sources, aerial image classifier plays a significant role [11,12]. This approach is highly efficient in most domains, especially in educational and industrial settings, than the standard processes [13].…”
Section: Figure 1: Types Of Industrial Versionsmentioning
confidence: 99%
“…Aerial imagery classification of scenes classifies the aerial images, captured using drones, to sub-areas, by masking several ground matters and types of land covers, to numerous semantic forms. In many real-time implications such as urban planning, computer cartography, and the management of remote sensing sources, aerial image classifier plays a significant role [11,12]. This approach is highly efficient in most domains, especially in educational and industrial settings, than the standard processes [13].…”
Section: Figure 1: Types Of Industrial Versionsmentioning
confidence: 99%
“…The experiment results inferred that the presented technique can enhance the scalability and detection efficiency. Cheng et al [18][19][20] presented a temporal convolution network with global attention model to develop an in-vehicle network IDS named TCAN-IDS. The feature extraction method extracts the spatial-temporal details.…”
Section: Related Workmentioning
confidence: 99%
“…AI technology has the capability of detecting the variance in methods and channels of attack. This is the major problem confronted by security solutions when it comes to dealing with IoT attacks: attackers introduce slight modifications from the preceding attack which makes the security solution incapable of identifying the threat [11,12]. Researchers and developers utilize AI technology to prevent other risks to the IoT environment by examining system traffic [13,14].…”
Section: Introductionmentioning
confidence: 99%