Zakaria Abou El Houda, Hajar Moudoud, Bouziane Brik, Muhammad Adil
{"title":"A Privacy-Preserving Framework for Efficient Network Intrusion Detection in Consumer Network Using Quantum Federated Learning","authors":"Zakaria Abou El Houda, Hajar Moudoud, Bouziane Brik, Muhammad Adil","doi":"10.1109/tce.2024.3458985","DOIUrl":"https://doi.org/10.1109/tce.2024.3458985","url":null,"abstract":"","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"30 1","pages":""},"PeriodicalIF":4.3,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142189659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huiru Yan, Yan Gu, Haoyang He, Xin Ning, Qingle Wang, Long Cheng
{"title":"DNN-Based Task Partitioning and Offloading in Edge-Cloud Collaboration Within Electric Vehicles","authors":"Huiru Yan, Yan Gu, Haoyang He, Xin Ning, Qingle Wang, Long Cheng","doi":"10.1109/tce.2024.3454270","DOIUrl":"https://doi.org/10.1109/tce.2024.3454270","url":null,"abstract":"","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"23 1","pages":""},"PeriodicalIF":4.3,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142189661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Dynamic Offset Spatial Modulation MIMO for Low-Cost Consumer Electronics Devices","authors":"Yanrui Wang, Yue Xiao, Ming Xiao, Nan Li","doi":"10.1109/tce.2024.3454178","DOIUrl":"https://doi.org/10.1109/tce.2024.3454178","url":null,"abstract":"","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"43 1","pages":""},"PeriodicalIF":4.3,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142189663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guest Editorial of the Special Section on Tactile Internet for Consumer Internet of Things Opportunities and Challenges","authors":"Prabhat Kumar;Alireza Jolfaei;Krishna Kant","doi":"10.1109/TCE.2024.3380085","DOIUrl":"https://doi.org/10.1109/TCE.2024.3380085","url":null,"abstract":"The Tactile Internet (TI) is a logical transition of the Internet, which has progressed from a static, text-based Internet to a multimedia mobile Internet and finally to a Consumer Internet of Things (IoT). The major requirement of any TI applications is low latency, fast transit intervals, high availability, and a high level of security. For instance, latency requirement in Human to Machine (H2M) interactions may vary from < 10 ms up to tens of milliseconds and round-trip latency of 1 ms. This necessitates tactile applications close to end users to minimize delays. Edge Computing (EC) is a resource-rich decentralized platform that offers cloud computing functionalities at cellular base stations near users, saving energy and time on backhaul transmission to cloud servers. In a typical network security architecture of TI, the network administrator establishes network security policies, which segregate network traffic. However, deploying EC at the Internet edge places a strain on network management policies, making them subject to attacks such as Denial-of-Service (DoS), which can harm EC and produce unnecessary network traffic. This type of attack is restricted to EC nodes and has little effect on the backhaul network (such as cloud computing), which is more secure. Therefore, with the growing number of attack vectors, it is essential to develop security solutions for EC to enable computing-based TI applications secure and give application developers more alternatives. The Convergence of Cloud, EC, AI, and blockchain can potentially tackle major shortcomings of TI-driven Consumer IoT, its adoption is still in its infancy, suffering from various issues, such as lack of consensus towards any reference models or best practices.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"70 2","pages":"4965-4967"},"PeriodicalIF":4.3,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10659259","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142099798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhigao Zheng;Shahid Mumtaz;Joel J. P. C. Rodrigues;Bo Ai
{"title":"Guest Editorial of the Special section on Graph-Powered Intelligent Data Processing for Consumer Electronics","authors":"Zhigao Zheng;Shahid Mumtaz;Joel J. P. C. Rodrigues;Bo Ai","doi":"10.1109/TCE.2024.3378723","DOIUrl":"https://doi.org/10.1109/TCE.2024.3378723","url":null,"abstract":"Intelligent data processing harnesses the power of learning, analytics, and automated data insight extraction to guide managers through decision making, which emerged as imperative tools in computer science and information processing. However, the huge amount and complexity of the data acquired pose great challenges for processing and analysis. A graph is made up of nodes - real-life entities, like health care providers (HCPs), Integrated Delivery Networks (IDNs), and products - that can be connected to signify relationships. This model can represent real-world relationships much more clearly than relational databases that have rigid schemas. Leading consumer applications, like LinkedIn and Facebook, utilize graphs to easily identify and visualize complex relationships in a simple interface. This technology is an elegant, powerful way to solve complex data problems.","PeriodicalId":13208,"journal":{"name":"IEEE Transactions on Consumer Electronics","volume":"70 2","pages":"4894-4897"},"PeriodicalIF":4.3,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10659261","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}