{"id":"https://openalex.org/W3046265696","doi":"https://doi.org/10.1155/2020/8832697","title":"Novel Defense Schemes for Artificial Intelligence Deployed in Edge Computing Environment","display_name":"Novel Defense Schemes for Artificial Intelligence Deployed in Edge Computing Environment","publication_year":2020,"publication_date":"2020-08-03","ids":{"openalex":"https://openalex.org/W3046265696","doi":"https://doi.org/10.1155/2020/8832697","mag":"3046265696"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8832697","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8832697","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2020/8832697.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2020/8832697.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010958450","display_name":"Chengcheng Zhou","orcid":"https://orcid.org/0000-0001-6277-9281"},"institutions":[{"id":"https://openalex.org/I92403157","display_name":"University of Science and Technology Beijing","ror":"https://ror.org/02egmk993","country_code":"CN","type":"education","lineage":["https://openalex.org/I92403157"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chengcheng Zhou","raw_affiliation_strings":["School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China"],"raw_orcid":"https://orcid.org/0000-0001-6277-9281","affiliations":[{"raw_affiliation_string":"School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China","institution_ids":["https://openalex.org/I92403157"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019324040","display_name":"Qian Liu","orcid":"https://orcid.org/0000-0002-8398-1021"},"institutions":[{"id":"https://openalex.org/I4210108204","display_name":"China Electronic Information Industry Development","ror":"https://ror.org/01mbbxx50","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210108204","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian Liu","raw_affiliation_strings":["Institute of Informationization and Software Industry, China Center for Information Industry of Development, Beijing 100036, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Informationization and Software Industry, China Center for Information Industry of Development, Beijing 100036, China","institution_ids":["https://openalex.org/I4210108204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5051916513","display_name":"Ruolei Zeng","orcid":"https://orcid.org/0000-0002-3915-3368"},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ruolei Zeng","raw_affiliation_strings":["Computer Sciences, School of Computer, Data & Information Sciences, University of Wisconsin-Madison, Madison WI 53706, USA"],"raw_orcid":"https://orcid.org/0000-0002-3915-3368","affiliations":[{"raw_affiliation_string":"Computer Sciences, School of Computer, Data & Information Sciences, University of Wisconsin-Madison, Madison WI 53706, USA","institution_ids":["https://openalex.org/I135310074"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010958450","https://openalex.org/A5051916513"],"corresponding_institution_ids":["https://openalex.org/I135310074","https://openalex.org/I92403157"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":1.3599,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.85405437,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8975825309753418},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6629164218902588},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5994340777397156},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.5502892732620239},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5290754437446594},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4817788302898407},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.44558748602867126},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4248635470867157},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4133400321006775},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3756100833415985},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10244214534759521}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8975825309753418},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6629164218902588},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5994340777397156},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.5502892732620239},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5290754437446594},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4817788302898407},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.44558748602867126},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4248635470867157},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4133400321006775},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3756100833415985},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10244214534759521},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8832697","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8832697","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2020/8832697.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f5af7a7ebc5c43818b5331cf1bbb1de0","is_oa":false,"landing_page_url":"https://doaj.org/article/f5af7a7ebc5c43818b5331cf1bbb1de0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8832697","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8832697","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2020/8832697.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3046265696.pdf","grobid_xml":"https://content.openalex.org/works/W3046265696.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W133884053","https://openalex.org/W1958573560","https://openalex.org/W2031934673","https://openalex.org/W2068064136","https://openalex.org/W2103999702","https://openalex.org/W2105973197","https://openalex.org/W2111619626","https://openalex.org/W2613369845","https://openalex.org/W2624989916","https://openalex.org/W2751904527","https://openalex.org/W2760535173","https://openalex.org/W2769903624","https://openalex.org/W2781091734","https://openalex.org/W2786072337","https://openalex.org/W2896938420","https://openalex.org/W2905423756","https://openalex.org/W2919115771","https://openalex.org/W2950865323","https://openalex.org/W3000407226","https://openalex.org/W3016219164","https://openalex.org/W4241399673"],"related_works":["https://openalex.org/W2979760315","https://openalex.org/W4324372666","https://openalex.org/W4225706866","https://openalex.org/W4322761281","https://openalex.org/W4238233472","https://openalex.org/W4313339048","https://openalex.org/W2956163139","https://openalex.org/W4313463218","https://openalex.org/W4386004629","https://openalex.org/W2942586735"],"abstract_inverted_index":{"The":[0,226],"last":[1],"few":[2],"years":[3],"have":[4],"seen":[5],"the":[6,27,35,41,53,60,99,156,161,183,187,191,205,213,218,221,234,237,240,243],"great":[7],"potential":[8],"of":[9,23,29,62,87,101,137,152,190,208,217,223,229,236,242],"artificial":[10],"intelligence":[11],"(AI)":[12],"technology":[13],"to":[14,40,52,72,129,146,178,210],"efficiently":[15],"and":[16,68,89,119,175,180,215,239],"effectively":[17,179,211],"deal":[18],"with":[19,98,204],"an":[20,167],"incredible":[21],"deluge":[22],"data":[24,37,157,219],"generated":[25,159],"by":[26,154],"Internet":[28],"Things":[30],"(IoT)":[31],"devices.":[32],"If":[33],"all":[34],"massive":[36],"is":[38,82,92],"transferred":[39],"cloud":[42],"for":[43],"intelligent":[44],"processing,":[45],"it":[46],"not":[47],"only":[48],"brings":[49],"considerable":[50],"challenges":[51],"network":[54],"bandwidth":[55],"but":[56],"also":[57,105],"cannot":[58],"meet":[59],"needs":[61],"AI":[63,104,113,116,153,192,224],"applications":[64],"that":[65],"require":[66],"fast":[67],"real-time":[69],"response.":[70],"Therefore,":[71],"achieve":[73],"this":[74],"requirement,":[75],"mobile":[76],"or":[77],"multiaccess":[78],"edge":[79,102],"computing":[80],"(MEC)":[81],"receiving":[83],"a":[84,141,148,197],"substantial":[85],"amount":[86],"interest,":[88],"its":[90],"importance":[91],"gradually":[93],"becoming":[94],"more":[95],"prominent.":[96],"However,":[97],"emerging":[100],"intelligence,":[103],"suffers":[106],"from":[107],"several":[108],"tremendous":[109],"security":[110,158,184,214],"threats":[111],"in":[112,133,160,186],"model":[114,117,199],"training,":[115],"inference,":[118],"private":[120],"data.":[121],"This":[122],"paper":[123],"provides":[124],"three":[125,134,231],"novel":[126],"defense":[127,169],"strategies":[128],"tackle":[130],"malicious":[131],"attacks":[132],"aspects.":[135],"First":[136],"all,":[138],"we":[139,165,195],"introduce":[140],"cloud-edge":[142],"collaborative":[143],"antiattack":[144],"scheme":[145],"realize":[147],"reliable":[149],"incremental":[150],"updating":[151],"ensuring":[155],"training":[162],"phase.":[163],"Furthermore,":[164],"propose":[166],"edge-enhanced":[168],"strategy":[170],"based":[171,200],"on":[172,201],"adaptive":[173],"traceability":[174],"punishment":[176],"mechanism":[177],"radically":[181],"solve":[182],"problem":[185],"inference":[188],"stage":[189],"model.":[193],"Finally,":[194],"establish":[196],"system":[198],"chaotic":[202],"encryption":[203],"three-layer":[206],"architecture":[207],"MEC":[209],"guarantee":[212],"privacy":[216],"during":[220],"construction":[222],"models.":[225],"experimental":[227],"results":[228],"these":[230],"countermeasures":[232],"verify":[233],"correctness":[235],"conclusion":[238],"feasibility":[241],"methods.":[244]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
