EUCloudEdgeIoT Scientific Publications Repository edit edit source

This page provides a comprehensive list of research outputs generated by Horizon 2020 and Horizon Europe Research and Innovation projects in the domains of Cloud, Edge and IoT, under the EUCloudEdgeIoT umbrella.

The publications listed below have been categorised, can be filtered and a full text search is available at the top of the listing.

The categories are:

  1. Cloud, Edge, and Continuum Computing
  2. Hardware Architecture and High-Performance Computing (HPC)
  3. Cybersecurity, Privacy, and Trust
  4. Artificial Intelligence and Machine Learning Systems
  5. Networking, 5G/6G, and Communications
  6. Software Engineering, Testing, and DevOps
  7. IoT, Robotics, and Autonomous Swarms
  8. Data Science, Analytics, and Data Processing
EU ProjectHas TitleHas CategoryHas TypeHas YearHas DOI
AerOSSemantics for Resource Selection in Next Generation Internet of Things SystemsCloud, Edge, and Continuum ComputingBook chapters2024https://doi.org/10.1007/978-3-031-58502-9 19
AerOSApproaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial ScenarioCloud, Edge, and Continuum ComputingBook chapters2025https://doi.org/10.1007/978-3-031-78572-6 2
CloudSkin$$\text {T}^{2}$$GS: Comprehensive Reconstruction of Dynamic Surgical Scenes with Gaussian SplattingCloud, Edge, and Continuum ComputingBook chapters2025https://doi.org/10.1007/978-3-032-05114-1 57
CloudSkinSicherheitsmechanismen des Cloud-Computings zur Verwendung in KorrekturverfahrenCloud, Edge, and Continuum ComputingBook chapters2025https://doi.org/10.1007/978-3-658-45180-6 14
CloudSkinLeveraging Expert Knowledge for Real-Time Online Adaptation of Intraoperative Liver RegistrationCloud, Edge, and Continuum ComputingBook chapters2024https://doi.org/10.1007/978-3-031-75291-9 11
EDGELESSMarginal Cost of Computation as a Collaborative Strategy for Resource Management at the EdgeCloud, Edge, and Continuum ComputingBook chapters2025https://doi.org/10.1007/978-3-031-81226-2 3
NebulOusAn Implemented Architecture for a Meta Operating System Managing Distributed Applications Across Heterogeneous ResourcesCloud, Edge, and Continuum ComputingBook chapters2025https://doi.org/10.1007/978-3-031-87778-0 36
P2CODEAnonymous Authenticated Key ExchangeCybersecurity, Privacy, and TrustBook chapters2025https://doi.org/10.1007/978-3-031-95761-1 18
P2CODEApproaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial ScenarioCybersecurity, Privacy, and TrustBook chapters2025https://doi.org/10.1007/978-3-031-78572-6 2
Vitamin-VRuntime Energy Monitoring for RISC-V Soft-CoresHardware Architecture and High-Performance Computing (HPC)Book chapters2025https://doi.org/10.1007/978-3-031-96099-4 27
Vitamin-VChallenges and Opportunities for RISC-V Architectures towards Genomics-basedWorkloadsHardware Architecture and High-Performance Computing (HPC)Book chapters2023https://doi.org/10.1007/978-3-031-40843-4 34
AC3XAI-enabled fine granular vertical resources autoscalerNetworking, 5G/6G, and CommunicationsConference proceedings2023https://doi.org/10.1109/NetSoft57336.2023.10175438
AC3Dynamic deployment prediction and configuration in hybrid cloud / edge computing environments using influence-based learningNetworking, 5G/6G, and CommunicationsConference proceedings2023https://doi.org/10.1109/EECSI59885.2023.10295768
ACESFreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated LearningCybersecurity, Privacy, and TrustConference proceedings2024https://doi.org/10.48550/arxiv.2312.04432
ACESFLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor AttacksCybersecurity, Privacy, and TrustConference proceedings2023https://doi.org/10.48550/arxiv.2310.02113
ACESUsing Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge (Extended Version)Cybersecurity, Privacy, and TrustConference proceedings2023https://doi.org/10.1145/3576915.3623111
ACESPoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage SystemsCybersecurity, Privacy, and TrustConference proceedings2024https://doi.org/10.1109/PRDC59308.2023.00023
AerOSHow many FIDO protocols are needed? Analysing the technology, security and complianceCloud, Edge, and Continuum ComputingConference proceedings https://doi.org/10.1145/3654661
AerOSNetwork Slice Mobility for 6G Networks by Exploiting User and Network PredictionCloud, Edge, and Continuum ComputingConference proceedings https://doi.org/10.1109/ICC45041.2023.10279739
AerOSSide-Channel Analysis of OpenVINO-based Neural Network ModelsCloud, Edge, and Continuum ComputingConference proceedings https://doi.org/10.48550/ARXIV.2407.16467
AerOSImmutability and non-repudiation in the exchange of key messages within the EU IoT-Edge-Cloud ContinuumCloud, Edge, and Continuum ComputingConference proceedings https://doi.org/10.1145/3664476.3669918