2022 IEEE 21st International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS) 2022
DOI: 10.1109/iucc-cit-dsci-smartcns57392.2022.00046
|View full text |Cite
|
Sign up to set email alerts
|

Towards Fast Edge Detection Approach for Industrial Products

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…Despite of massive innovations that have been done by the tech giant companies, the network infrastructure still faces performance, security, and privacy challenges in their quest to have 100% efficient systems [204] - [206]. Across the globe smart cities have been developed integrating diverse devices with specific functionality, for example the Internet of Things (IoT), and Sensor devices are AI powered [207] to even work smarter than humans. Maintaining such massive technology since they directly interact with people, collecting information about them, processing and even making decisions based on the data, protecting such information; ensuring that it is not prone to attacks or cannot be used for unintended purpose can be challenging [208] - [210].…”
Section: Real-world Scenarios and Their Challengesmentioning
confidence: 99%
“…Despite of massive innovations that have been done by the tech giant companies, the network infrastructure still faces performance, security, and privacy challenges in their quest to have 100% efficient systems [204] - [206]. Across the globe smart cities have been developed integrating diverse devices with specific functionality, for example the Internet of Things (IoT), and Sensor devices are AI powered [207] to even work smarter than humans. Maintaining such massive technology since they directly interact with people, collecting information about them, processing and even making decisions based on the data, protecting such information; ensuring that it is not prone to attacks or cannot be used for unintended purpose can be challenging [208] - [210].…”
Section: Real-world Scenarios and Their Challengesmentioning
confidence: 99%
“…Addressing these challenges requires a comprehensive approach involving collaboration among stakeholders, including device manufacturers, researchers, policymakers, and users. Continuous research, development, and standardization efforts are necessary to enhance the security techniques for WBANs and ensure the privacy and integrity of the network and its data [189]- [193].…”
Section: Dynamic Nature Of Wbansmentioning
confidence: 99%
“…An ideal outcome would be for organizations to either utilize solutions already existing or develop their own solutions for cyber-attack detection where the need for human intervention is minimized. The authors in [123] posit that in the last decade, various ML (Machine Learning) techniques [124] have been implemented to detect system and network intrusion to improve detection rates and to keep their knowledge base comprehensive and up to date. Nevertheless, various techniques have been adopted in issues of threat detection, and with improvements in cyber systems, adaptability is the key characteristic of cyber systems [125].…”
Section: Artificial Intelligence Based Techniquesmentioning
confidence: 99%