Edge Computing and IoT: Systems, Management and Security Third EAI International Conference, ICECI 2022, Virtual Event, December 13-14, 2022, Proceedings
by
 
Xiao, Zhu. editor.

Title
Edge Computing and IoT: Systems, Management and Security Third EAI International Conference, ICECI 2022, Virtual Event, December 13-14, 2022, Proceedings

Author
Xiao, Zhu. editor.

ISBN
9783031289903

Edition
1st ed. 2023.

Physical Description
XI, 322 p. 158 illus., 120 illus. in color. online resource.

Series
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 478

Contents
Models and methods for data management in IoT -- Forecasting the Temperature of BEV Battery Pack based on Field Testing Data -- The Data Exchange Protocol over Multi-chain BlockchainUsing Zero-knowledge Proof -- A Hybrid Task Offloading and Service Cache Scheme for Vehicular Edge Computing -- On Enhancing Transmission Performance for IoV Based on Improved Greedy Algorithm -- Precise Segmentation on Poly-Yolo, YoloV5 and FCN -- Adaptive approaches to manage energy consumption and security of systems -- Research on DAG Based Consensus Mechanism for Adjustable Load Metering Data -- A Detection and Information Processing Model based on an Automatic Mechanism for Tax Payment Control in Developing Countries -- IEC-FOF: An Industrial Electricity Consumption Forecasting and Optimization Framework -- Demons Hidden in the Light: Unrestricted Adversarial Illumination Attacks -- Edge Intelligence Based Garbage Classification Detection Method -- Mobile computing in wireless networks -- Evaluation of Higher Education System -- Defense Mechanisms against Audio Adversarial Attacks: Recent Advances and Future Directions -- An Empirical Study of Worldwide Plastic Waste Mitigation -- Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence -- Highly Accurate Dynamic Gesture Recognition Method Based on Edge Intelligence -- Distributed computing in IOT -- Edge Intelligence Based Garbage Classification Detection Method -- Adversarial Example Attacks in Internet of Things (IoT) -- Training Node Screening in Decentralized Trusted Federated Learning -- Exploration and Practice of Course Homework Metaverse Based on Extended Reality under Edge Computing -- Federated Learning Based User Scheduling for Real-Time Multimedia Tasks in EdgeDevices -- A Co-caching Strategy for Edges Based on Federated Learning and Regional Prevalence -- LSTM-DAM: Malicious Network Traffic Prediction for Cloud Manufacturing System.

Added Author
Xiao, Zhu.
 
Zhao, Ping.
 
Dai, Xingxia.
 
Shu, Jinmei.

Added Corporate Author
SpringerLink (Online service)

Electronic Access
https://doi.org/10.1007/978-3-031-28990-3


LibraryMaterial TypeItem BarcodeShelf Number[[missing key: search.ChildField.HOLDING]]Status
Online LibraryE-Book520391-1001XX(520391.1)Elektronik Kütüphane