2021
DOI: 10.48550/arxiv.2105.01798
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Pervasive AI for IoT Applications: Resource-efficient Distributed Artificial Intelligence

Emna Baccour,
Naram Mhaisen,
Alaa Awad Abdellatif
et al.

Abstract: Artificial intelligence (AI) has witnessed a substantial breakthrough in a variety of Internet of Things (IoT) applications and services, spanning from recommendation systems and speech processing applications to robotics control and military surveillance. This is driven by the easier access to sensory data and the enormous scale of pervasive/ubiquitous devices that generate zettabytes (ZB) of real-time data streams. Designing accurate models using such data streams, to predict future insights and revolutioniz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
2

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 185 publications
0
5
0
Order By: Relevance
“…With the growing interest in monitoring systems, both in academia and industry, it becomes increasingly more important to assess the ethics and consider privacy preserving techniques. Sensors are able to collect sensitive data (e.g., images, GPS coordinates, or vital signs of a subject [90]) invisibly and continuously. Wu et al [35] mentions that one should carefully think about privacy issues from the start of the design process to produce good and safe technology.…”
Section: Ethical Considerationsmentioning
confidence: 99%
See 2 more Smart Citations
“…With the growing interest in monitoring systems, both in academia and industry, it becomes increasingly more important to assess the ethics and consider privacy preserving techniques. Sensors are able to collect sensitive data (e.g., images, GPS coordinates, or vital signs of a subject [90]) invisibly and continuously. Wu et al [35] mentions that one should carefully think about privacy issues from the start of the design process to produce good and safe technology.…”
Section: Ethical Considerationsmentioning
confidence: 99%
“…Moreover, they stress it is important to guarantee the user's privacy when recruiting participants for experiments. One of the methods by which attackers gain sensitive data is by training classifiers to predict private data belonging to a known community [90].…”
Section: Ethical Considerationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The nexus between IoT devices motivates the research community to push the DNN computation in close proximity of data source, in order to reduce the inference latency, minimize the network cost, and avoid bandwidth bottlenecks [14], [15]. Particularly, the trained DNN network is split into segments that are assigned to different helpers.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, machine learning (ML) methods have been applied in the healthcare industry to provide smart health services, optimizing system parameters, monitoring populations, and controlling chronic diseases [6]. In particular, the reinforcement learning (RL) and deep RL (DRL) methods are used in the healthcare industry to maximize energy efficiency, minimize communication latency, and allocate efficient resources [7] [8]. Federated learning (FL) is a recent ML paradigm that allows heterogeneous edge nodes to train data models and perform aggregation centrally, protecting data privacy.…”
Section: Introductionmentioning
confidence: 99%