Transactions on Emerging Telecommunications Technologies,
Год журнала:
2025,
Номер
36(4)
Опубликована: Апрель 1, 2025
ABSTRACT
More
vertical
service
areas
than
only
data
processing,
storing,
and
communication
are
promised
by
fog‐cloud
computing.
Due
to
its
great
efficiency
scalability,
distributed
deep
learning
(DDL)
across
computing
environments
is
a
widely
used
application
among
them.
With
training
limited
sharing
parameters,
DDL
can
offer
more
privacy
protection
centralized
learning.
Nevertheless,
still
faces
two
significant
security
obstacles
when
it
comes
How
ensure
that
users'
identities
not
stolen
outside
enemies,
prevent
from
being
disclosed
other
internal
participants
in
the
process
of
training.
In
this
manuscript,
Interference
Tolerant
Fast
Convergence
Zeroing
Neural
Network
for
Security
Privacy
Preservation
with
Reptile
Search
Optimization
Algorithm
Fog‐Cloud
Computing
environment
(SPP‐ITFCZNN‐RSOA‐FCC)
proposed.
ITFCZNN
proposed
preservation,
Then
(RSOA)
optimize
ITFCZNN,
Effective
Lightweight
Homomorphic
Cryptographic
(ELHCA)
encrypt
decrypt
local
gradients.
The
SPP‐ITFCZNN‐RSOA‐FCC
system
attains
better
balance,
efficiency,
functionality
existing
efforts.
implemented
using
Python.
performance
metrics
like
accuracy,
resource
overhead,
computation
overhead
considered.
approach
29.16%,
20.14%,
18.93%
high
11.03%,
26.04%,
23.51%
lower
Resource
compared
methods
including
FedSDM:
Federated
dependent
smart
decision
making
component
ECG
at
internet
things
incorporated
Edge‐Fog‐Cloud
(SPP‐FSDM‐FCC),
A
collaborative
offloading
dew‐enabled
vehicular
fog
compute‐intensive
latency‐sensitive
dependence‐aware
tasks:
Q‐learning
method
(SPP‐FDQL‐FCC),
fog‐edge‐enabled
intrusion
identification
scheme
grids
(SPP‐FSVM‐FCC)
respectively.
Transactions on Emerging Telecommunications Technologies,
Год журнала:
2024,
Номер
35(6)
Опубликована: Май 21, 2024
Abstract
Nature‐inspired
algorithms
revolve
around
the
intersection
of
nature‐inspired
and
IoT
within
healthcare
domain.
This
domain
addresses
emerging
trends
potential
synergies
between
computational
approaches
technologies
for
advancing
services.
Our
research
aims
to
fill
gaps
in
addressing
algorithmic
integration
challenges,
real‐world
implementation
issues,
efficacy
IoT‐based
healthcare.
We
provide
insights
into
practical
aspects
limitations
such
applications
through
a
systematic
literature
review.
Specifically,
we
address
need
comprehensive
understanding
healthcare,
identifying
as
lack
standardized
evaluation
metrics
studies
on
challenges
security
considerations.
By
bridging
these
gaps,
our
paper
offers
directions
future
this
domain,
exploring
diverse
landscape
chosen
methodology
is
Systematic
Literature
Review
(SLR)
investigate
related
papers
rigorously.
Categorizing
groups
genetic
algorithms,
particle
swarm
optimization,
cuckoo
ant
colony
other
approaches,
hybrid
methods,
employ
meticulous
classification
based
critical
criteria.
MATLAB
emerges
predominant
programming
language,
constituting
37.9%
cases,
showcasing
prevalent
choice
among
researchers.
emphasizes
adaptability
paramount
parameter,
accounting
18.4%
shedding
light
attributes,
limitations,
development,
review
contribute
dynamic
Computers,
Год журнала:
2025,
Номер
14(3), С. 93 - 93
Опубликована: Март 6, 2025
Machine
learning
(ML)
and
deep
(DL),
subsets
of
artificial
intelligence
(AI),
are
the
core
technologies
that
lead
significant
transformation
innovation
in
various
industries
by
integrating
AI-driven
solutions.
Understanding
ML
DL
is
essential
to
logically
analyse
applicability
identify
their
effectiveness
different
areas
like
healthcare,
finance,
agriculture,
manufacturing,
transportation.
consists
supervised,
unsupervised,
semi-supervised,
reinforcement
techniques.
On
other
hand,
DL,
a
subfield
ML,
comprising
neural
networks
(NNs),
can
deal
with
complicated
datasets
health,
autonomous
systems,
finance
industries.
This
study
presents
holistic
view
technologies,
analysing
algorithms
application’s
capacity
address
real-world
problems.
The
investigates
application
which
techniques
implemented.
Moreover,
highlights
latest
trends
possible
future
avenues
for
research
development
(R&D),
consist
developing
hybrid
models,
generative
AI,
incorporating
technologies.
aims
provide
comprehensive
on
serve
as
reference
guide
researchers,
industry
professionals,
practitioners,
policy
makers.
Scientific Reports,
Год журнала:
2025,
Номер
15(1)
Опубликована: Фев. 3, 2025
In
the
present
scenario,
Internet
of
Things
(IoT)
and
edge
computing
technologies
have
been
developing
rapidly,
foremost
to
development
new
tasks
in
security
privacy.
Personal
information
privacy
leakage
become
main
concerns
IoT
surroundings.
The
promptly
IoT-connected
devices
below
an
integrated
Machine
Learning
(ML)
method
might
threaten
data
confidentiality.
standard
centralized
ML-assisted
methods
challenging
because
they
require
vast
numbers
a
vital
unit.
Due
rising
distribution
many
systems
linked
devices,
decentralized
ML
solutions
required.
Federated
learning
(FL)
was
proposed
as
optimal
solution
discover
these
issues.
Still,
heterogeneity
environments
poses
essential
task
when
executing
FL.
Therefore,
this
paper
develops
Intelligent
Deep
Model
for
Enhancing
Security
(IDFLM-ES)
approach
IoT-enabled
edge-computing
environment.
presented
IDFLM-ES
aims
identify
unwanted
intrusions
certify
safety
To
accomplish
this,
technique
introduces
federated
hybrid
deep
belief
network
(FHDBN)
model
using
FL
on
time
series
produced
by
devices.
Besides,
uses
normalization
golden
jackal
optimization
(GJO)
based
feature
selection
pre-processing
step.
learns
individual
distributed
representation
over
databases
enhance
convergence
quick
learning.
Finally,
dung
beetle
optimizer
(DBO)
is
utilized
choose
effectual
hyperparameter
FHDBN
model.
simulation
value
methodology
verified
benchmark
database.
experimental
validation
portrayed
superior
accuracy
98.24%
compared
other
models.
Scientific Reports,
Год журнала:
2025,
Номер
15(1)
Опубликована: Март 19, 2025
As
the
number
of
service
requests
for
applications
continues
increasing
due
to
various
conditions,
limitations
on
resources
provide
a
barrier
in
providing
with
appropriate
Quality
Service
(QoS)
assurances.
result,
an
efficient
scheduling
mechanism
is
required
determine
order
handling
application
requests,
as
well
use
broadcast
media
and
data
transfer.
In
this
paper
innovative
approach,
incorporating
Crossover
Mutation
(CM)-centered
Marine
Predator
Algorithm
(MPA)
introduced
effective
resource
allocation.
This
strategic
allocation
optimally
schedules
within
Vehicular
Edge
computing
(VEC)
network,
ensuring
most
utilization.
The
proposed
method
begins
by
meticulous
feature
extraction
from
network
model,
attributes
such
mobility
patterns,
transmission
medium,
bandwidth,
storage
capacity,
packet
delivery
ratio.
For
further
analysis
Elephant
Herding
Lion
Optimizer
(EHLO)
algorithm
employed
pinpoint
critical
attributes.
Subsequently
Modified
Fuzzy
C-Means
(MFCM)
used
vehicle
clustering
centred
selected
These
clustered
characteristics
are
then
transferred
stored
cloud
server
infrastructure.
performance
methodology
evaluated
using
MATLAB
software
simulation
method.
study
offers
comprehensive
solution
challenge
Cloud
Networks,
addresses
burgeoning
demands
modern
while
QoS
assurances
signifies
significant
advancement
field
VEC.
Computers, materials & continua/Computers, materials & continua (Print),
Год журнала:
2024,
Номер
79(2), С. 1795 - 1834
Опубликована: Янв. 1, 2024
The
proliferation
of
IoT
devices
requires
innovative
approaches
to
gaining
insights
while
preserving
privacy
and
resources
amid
unprecedented
data
generation.However,
FL
development
for
is
still
in
its
infancy
needs
be
explored
various
areas
understand
the
key
challenges
deployment
real-world
scenarios.The
paper
systematically
reviewed
available
literature
using
PRISMA
guiding
principle.The
study
aims
provide
a
detailed
overview
increasing
use
networks,
including
architecture
challenges.A
systematic
review
approach
used
collect,
categorize
analyze
FL-IoT-based
articles.A
search
was
performed
IEEE,
Elsevier,
Arxiv,
ACM,
WOS
databases
92
articles
were
finally
examined.Inclusion
measures
published
English
with
keywords
"FL"
"IoT".The
methodology
begins
an
recent
advances
IoT,
followed
by
discussion
how
these
two
technologies
can
integrated.To
more
specific,
we
examine
evaluate
capabilities
talking
about
communication
protocols,
frameworks
architecture.We
then
present
comprehensive
analysis
number
applications,
smart
healthcare,
transportation,
cities,
industry,
finance,
agriculture.The
findings
from
this
services
applications
are
also
presented.Finally,
comparative
IID
(independent
identical
data)
non-ID,
traditional
centralized
deep
learning
(DL)
approaches.We
concluded
that
has
better
performance,
especially
terms
protection
resource
utilization.FL
excellent
because
model
training
takes
place
on
individual
or
edge
nodes,
eliminating
need
aggregation,
which
poses
significant
risks.To
facilitate
rapidly
evolving
field,
presented
intended
help
practitioners
researchers
navigate
complex
terrain
IoT.
Heliyon,
Год журнала:
2024,
Номер
10(17), С. e37163 - e37163
Опубликована: Авг. 29, 2024
As
facial
modification
technology
advances
rapidly,
it
poses
a
challenge
to
methods
used
detect
fake
faces.
The
advent
of
deep
learning
and
AI-based
technologies
has
led
the
creation
counterfeit
photographs
that
are
more
difficult
discern
apart
from
real
ones.
Existing
Deep
detection
systems
excel
at
spotting
content
with
low
visual
quality
easily
recognized
by
artifacts.
study
employed
unique
active
forensic
strategy
Compact
Ensemble-based
discriminators
architecture
using
Conditional
Generative
Adversarial
Networks
(CED-DCGAN),
for
identifying
real-time
fakes
in
video
conferencing.
DCGAN
focuses
on
video-deep
features
since
creating
convincing
improving
rapidly.
first
step
towards
recognizing
DCGAN-generated
images,
split
images
into
frames
containing
essential
elements
then
use
bandwidth
train
an
ensemble-based
discriminator
as
classifier.
Spectra
anomalies
produced
up-sampling
processes,
standard
procedures
GAN
making
large
amounts
data
films.
Ensemble
(CED)
concentrates
most
distinguishing
feature
between
natural
synthetic
giving
generators
robust
training
signal.
empirical
results
publicly
available
datasets
show,
suggested
algorithms
outperform
state-of-the-art
proposed
CED-DCGAN
technique
successfully
detects
high-fidelity
conferencing
generalizes
well
when
comparing
other
techniques.
Python
tool
is
implementing
this
accuracy
obtained
work
98.23
%.