EUCloudEdgeIoT Scientific Publications Repository
EUCloudEdgeIoT Scientific Publications Repository edit edit source
This page provides a comprehensive list of research outputs generated by Horizon 2020 and Horizon Europe Research and Innovation projects in the domains of Cloud, Edge and IoT, under the EUCloudEdgeIoT umbrella.
The publications listed below have been categorised, can be filtered and a full text search is available at the top of the listing.
The categories are:
- Cloud, Edge, and Continuum Computing
- Hardware Architecture and High-Performance Computing (HPC)
- Cybersecurity, Privacy, and Trust
- Artificial Intelligence and Machine Learning Systems
- Networking, 5G/6G, and Communications
- Software Engineering, Testing, and DevOps
- IoT, Robotics, and Autonomous Swarms
- Data Science, Analytics, and Data Processing
| EU Project | Has Title | Has Category | Has Type | Has Year | Has DOI |
|---|---|---|---|---|---|
| AerOS | Semantics for Resource Selection in Next Generation Internet of Things Systems | Cloud, Edge, and Continuum Computing | Book chapters | 2024 | https://doi.org/10.1007/978-3-031-58502-9 19 |
| AerOS | Approaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial Scenario | Cloud, Edge, and Continuum Computing | Book chapters | 2025 | https://doi.org/10.1007/978-3-031-78572-6 2 |
| CloudSkin | $$\text {T}^{2}$$GS: Comprehensive Reconstruction of Dynamic Surgical Scenes with Gaussian Splatting | Cloud, Edge, and Continuum Computing | Book chapters | 2025 | https://doi.org/10.1007/978-3-032-05114-1 57 |
| CloudSkin | Sicherheitsmechanismen des Cloud-Computings zur Verwendung in Korrekturverfahren | Cloud, Edge, and Continuum Computing | Book chapters | 2025 | https://doi.org/10.1007/978-3-658-45180-6 14 |
| CloudSkin | Leveraging Expert Knowledge for Real-Time Online Adaptation of Intraoperative Liver Registration | Cloud, Edge, and Continuum Computing | Book chapters | 2024 | https://doi.org/10.1007/978-3-031-75291-9 11 |
| EDGELESS | Marginal Cost of Computation as a Collaborative Strategy for Resource Management at the Edge | Cloud, Edge, and Continuum Computing | Book chapters | 2025 | https://doi.org/10.1007/978-3-031-81226-2 3 |
| NebulOus | An Implemented Architecture for a Meta Operating System Managing Distributed Applications Across Heterogeneous Resources | Cloud, Edge, and Continuum Computing | Book chapters | 2025 | https://doi.org/10.1007/978-3-031-87778-0 36 |
| P2CODE | Anonymous Authenticated Key Exchange | Cybersecurity, Privacy, and Trust | Book chapters | 2025 | https://doi.org/10.1007/978-3-031-95761-1 18 |
| P2CODE | Approaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial Scenario | Cybersecurity, Privacy, and Trust | Book chapters | 2025 | https://doi.org/10.1007/978-3-031-78572-6 2 |
| Vitamin-V | Runtime Energy Monitoring for RISC-V Soft-Cores | Hardware Architecture and High-Performance Computing (HPC) | Book chapters | 2025 | https://doi.org/10.1007/978-3-031-96099-4 27 |
| Vitamin-V | Challenges and Opportunities for RISC-V Architectures towards Genomics-basedWorkloads | Hardware Architecture and High-Performance Computing (HPC) | Book chapters | 2023 | https://doi.org/10.1007/978-3-031-40843-4 34 |
| AC3 | XAI-enabled fine granular vertical resources autoscaler | Networking, 5G/6G, and Communications | Conference proceedings | 2023 | https://doi.org/10.1109/NetSoft57336.2023.10175438 |
| AC3 | Dynamic deployment prediction and configuration in hybrid cloud / edge computing environments using influence-based learning | Networking, 5G/6G, and Communications | Conference proceedings | 2023 | https://doi.org/10.1109/EECSI59885.2023.10295768 |
| ACES | FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning | Cybersecurity, Privacy, and Trust | Conference proceedings | 2024 | https://doi.org/10.48550/arxiv.2312.04432 |
| ACES | FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks | Cybersecurity, Privacy, and Trust | Conference proceedings | 2023 | https://doi.org/10.48550/arxiv.2310.02113 |
| ACES | Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge (Extended Version) | Cybersecurity, Privacy, and Trust | Conference proceedings | 2023 | https://doi.org/10.1145/3576915.3623111 |
| ACES | PoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage Systems | Cybersecurity, Privacy, and Trust | Conference proceedings | 2024 | https://doi.org/10.1109/PRDC59308.2023.00023 |
| AerOS | How many FIDO protocols are needed? Analysing the technology, security and compliance | Cloud, Edge, and Continuum Computing | Conference proceedings | https://doi.org/10.1145/3654661 | |
| AerOS | Network Slice Mobility for 6G Networks by Exploiting User and Network Prediction | Cloud, Edge, and Continuum Computing | Conference proceedings | https://doi.org/10.1109/ICC45041.2023.10279739 | |
| AerOS | Side-Channel Analysis of OpenVINO-based Neural Network Models | Cloud, Edge, and Continuum Computing | Conference proceedings | https://doi.org/10.48550/ARXIV.2407.16467 | |
| AerOS | Immutability and non-repudiation in the exchange of key messages within the EU IoT-Edge-Cloud Continuum | Cloud, Edge, and Continuum Computing | Conference proceedings | https://doi.org/10.1145/3664476.3669918 |