1. Holst A.Volume of data/information created, captured, copied, and consumed worldwide from 2010 to 2025.Statista, June, 2021. 2. Bernstein D.Containers and Cloud: From LXC to Docker to Kubernetes. IEEE Cloud Computing, vol. 1, no. 3, pp. 81-84, 2014. 3. Ren K., Wang C., andWang Q.Security Challenges for the Public Cloud. IEEE Internet computing, vol. 16, no. 1, pp. 69-73, 2012. 4. Smeliansky R.Hierarchical Edge Computing. In2018 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC), IEEE, pp. 1-11, 2018. 5. Zeyu H., Geming X., Zhaohang W., andSen Y.Survey on Edge Computing Security. In2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE), IEEE, pp. 96-105, 2020. 6. Carvalho G., Cabral B., Pereira V., andBernardino J.Edge Computing: Current Trends, Research Challenges and Future Directions. Computing, vol. 103, no. 5, pp. 993-1023, 2021. 7. Chen, J. and Ran, X.Deep Learning with Edge Computing: A Review. Proceedings of the IEEE, vol. 107, no. 8, pp. 1655-1674, 2019. 8. Singh S., Sulthana R., Shewale T., Chamola V., Benslimane A., andSikdar B.Machine-Learning-Assisted Security and Privacy Provisioning for Edge Computing: A Survey. IEEE Internet of Things Journal, vol. 9, no. 1, pp. 236-260, 2021. 9. Zhang J., Chen B., Zhao Y., Cheng X., andHu F.Data Security and Privacy-preserving in Edge Computing Paradigm: Survey and Open Issues. IEEE access, vol. 6, pp.18209-18237, 2018. 10. Phung, V.H. and Rhee, E.J.A High-accuracy Model Average Ensemble of Convolutional Neural Networks for Classification of Cloud Image Patches on Small Datasets. Applied Sciences, vol. 9, no. 21, pp. 4500, 2019. 11. Insight A.What Are Edge Computing Applications in Industries? Retrieved from Analytics Insight: https://www.analyticsinsight.net/do-you-know-edge-computing-applications-across-industries/, accessed by February 2022. 12. Gupta L.Trends and Goals in Edge Computing. Retrieved from Edubeas: https://www.edubeas.com/2021/08/17/new-trends-and-goals-in-edge-computing, accessed by February 2022. 13. Reina G. Wiatt, C. C.Manufacturing and Edge Computing. Retrieved from Science Finance Magzine: https://sfmagazine.com/post-entry/april-2021-manufacturing-and-edge-computing/, accessed by February 2022. 14. Carvalho G., Cabral B., Pereira V., andBernardino J.Computation Offloading in Edge Computing Environments using Artificial Intelligence Techniques. Engineering Applications of Artificial Intelligence, vol. 95, pp. 103840, 2020. 15. Ampadu, H. AI Pool.Retrieved from Random Forest Understanding, https://ai-pool.com/a/s/random-forests-understanding. accessed by February 2022. 16. Yamashita R., Nishio M., Do R.K.G., and Togashi, K. Convolutional Neural Networks: An Overview and Application in Radiology. Insights into imaging, vol. 9, no. 4, pp. 611-629, 2018. 17. Lin L., Liao X., Jin H., andLi P.Computation Offloading toward Edge Computing. Proceedings of the IEEE, vol. 107, no. 8, pp.1584-1607, 2019. 18. De Lima Pinto, E.M., Lachowski, R., Pellenz, M.E., Penna, M.C., and Souza, R.D. A Machine Learning Approach for Detecting Spoofing Attacks in Wireless Sensor Networks. In2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), IEEE, pp. 752-758, 2018. 19. Reddy P.B.P., Reddy, M.P.K., Reddy, G.V.M., and Mehata, K.M. Fake Data Analysis and Detection Using Ensembled Hybrid Algorithm. In2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), IEEE, pp. 890-897, 2019. 20. Feng, Z. and Hua, C.Machine Learning-based Rf Jamming Detection in Wireless Networks. In2018 third international conference on security of smart cities, industrial control system and communications (SSIC), IEEE, pp. 1-6, 2018. 21. Gao J., Lanchantin J., Soffa M.L., andQi Y.Black-box Generation of Adversarial Text Sequences to Evade Deep Learning Classifiers. In2018 IEEE Security and Privacy Workshops (SPW), IEEE, pp. 50-56, 2018. 22. Xue, X. and Lu, J.A Compact Brain Storm Algorithm For Matching Ontologies. IEEE Access, vol. 8, pp.43898-43907, 2020. 23. Wang J., Shao Y., Wang Y., Ge Y., andYu R.Physical Layer Authentication based on Nonlinear Kalman Filter for V2X Communication. IEEE Access, vol. 8, pp. 163746-163757, 2020. |