2020
DOI: 10.1007/s42514-020-00052-7
|View full text |Cite
|
Sign up to set email alerts
|

To cloud or not to cloud: an on-line scheduler for dynamic privacy-protection of deep learning workload on edge devices

Abstract: Recently deep learning applications are thriving on edge and mobile computing scenarios, due to the concerns of latency constraints, data security and privacy, and other considerations. However, because of the limitation of power delivery, battery lifetime and computation resource, offering real-time neural network inference ability has to resort to the specialized energy-efficient architecture, and sometimes the coordination between the edge devices and the powerful cloud or fog facilities. This work investig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 34 publications
(35 reference statements)
0
4
0
Order By: Relevance
“…) end for (5) for each f i ∈ F do (6) Calculate pairwise feature pairs and judge whether the features cooccur. ( 7) NumPairs(〈f i , f j 〉) � n ij + 0, if there is no cooccurrence relationship n ij + 1, if features f i and f j are cooccurring 􏼨 (8) end for (9) for each 〈f i , f j 〉 from NumPairs do (10) analyzed in intrusion detection, it is difficult to judge whether it is a port scan. However, when multiple data packets are serialized and the LSTM network is used for judgment, it can be more accurately judged that these data packets are from port scanning attacks, with the reason that the LSTM network can learn context information and serialized features.…”
Section: Feature Fusion and Alignmentmentioning
confidence: 99%
See 3 more Smart Citations
“…) end for (5) for each f i ∈ F do (6) Calculate pairwise feature pairs and judge whether the features cooccur. ( 7) NumPairs(〈f i , f j 〉) � n ij + 0, if there is no cooccurrence relationship n ij + 1, if features f i and f j are cooccurring 􏼨 (8) end for (9) for each 〈f i , f j 〉 from NumPairs do (10) analyzed in intrusion detection, it is difficult to judge whether it is a port scan. However, when multiple data packets are serialized and the LSTM network is used for judgment, it can be more accurately judged that these data packets are from port scanning attacks, with the reason that the LSTM network can learn context information and serialized features.…”
Section: Feature Fusion and Alignmentmentioning
confidence: 99%
“…(3) for each 〈f i , f j 〉 ∈ M do (4) F KG � FeaturesOfKG.append(f i , f j ) (5) F KG � AlignmentBySort(F KG ) (6) end for (7) Fuse the features extracted from the two views of KG and SA. (8) U � F KG ⋃ F SA (9) for each f i ∈ F do (10) Weight calculation by relationship between the number of host connections and a specific flag feature of the connection rejection error (e.g., REJ). Obviously, this processing can maintain contextual semantic information, and the BiLSTM is a coarse-grained intrusion detection model.…”
Section: Convolutional Layer Convolutional Neural Networkmentioning
confidence: 99%
See 2 more Smart Citations