Research Outputs
EUCloudEdgeIoT Research Outputs Repository edit edit source
This page provides a comprehensive list of research outputs generated by Horizon 2020 and Horizon Europe Research and Innovation projects in the domains of Cloud, Edge and IoT, under the EUCloudEdgeIoT umbrella.
The publications listed below have been categorised, can be filtered and a full text search is available at the top of the listing.
The categories are:
- Cloud, Edge, and Continuum Computing
- Hardware Architecture and High-Performance Computing (HPC)
- Cybersecurity, Privacy, and Trust
- Artificial Intelligence and Machine Learning Systems
- Networking, 5G/6G, and Communications
- Software Engineering, Testing, and DevOps
- IoT, Robotics, and Autonomous Swarms
- Data Science, Analytics, and Data Processing
| EU Project | Has Category | Has Title | Has Type | Has Year | Has DOI |
|---|---|---|---|---|---|
| AerOS | Cloud, Edge, and Continuum Computing | Semantics for Resource Selection in Next Generation Internet of Things Systems | Book chapters | 2,024 | https://doi.org/10.1007/978-3-031-58502-9 19 |
| AerOS | Cloud, Edge, and Continuum Computing | Approaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial Scenario | Book chapters | 2,025 | https://doi.org/10.1007/978-3-031-78572-6 2 |
| CloudSkin | Cloud, Edge, and Continuum Computing | $$\text {T}^{2}$$GS: Comprehensive Reconstruction of Dynamic Surgical Scenes with Gaussian Splatting | Book chapters | 2,025 | https://doi.org/10.1007/978-3-032-05114-1 57 |
| CloudSkin | Cloud, Edge, and Continuum Computing | Sicherheitsmechanismen des Cloud-Computings zur Verwendung in Korrekturverfahren | Book chapters | 2,025 | https://doi.org/10.1007/978-3-658-45180-6 14 |
| CloudSkin | Cloud, Edge, and Continuum Computing | Leveraging Expert Knowledge for Real-Time Online Adaptation of Intraoperative Liver Registration | Book chapters | 2,024 | https://doi.org/10.1007/978-3-031-75291-9 11 |
| EDGELESS | Cloud, Edge, and Continuum Computing | Marginal Cost of Computation as a Collaborative Strategy for Resource Management at the Edge | Book chapters | 2,025 | https://doi.org/10.1007/978-3-031-81226-2 3 |
| NebulOus | Cloud, Edge, and Continuum Computing | An Implemented Architecture for a Meta Operating System Managing Distributed Applications Across Heterogeneous Resources | Book chapters | 2,025 | https://doi.org/10.1007/978-3-031-87778-0 36 |
| P2CODE | Cybersecurity, Privacy, and Trust | Anonymous Authenticated Key Exchange | Book chapters | 2,025 | https://doi.org/10.1007/978-3-031-95761-1 18 |
| P2CODE | Cybersecurity, Privacy, and Trust | Approaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial Scenario | Book chapters | 2,025 | https://doi.org/10.1007/978-3-031-78572-6 2 |
| Vitamin-V | Hardware Architecture and High-Performance Computing (HPC) | Runtime Energy Monitoring for RISC-V Soft-Cores | Book chapters | 2,025 | https://doi.org/10.1007/978-3-031-96099-4 27 |
| Vitamin-V | Hardware Architecture and High-Performance Computing (HPC) | Challenges and Opportunities for RISC-V Architectures towards Genomics-basedWorkloads | Book chapters | 2,023 | https://doi.org/10.1007/978-3-031-40843-4 34 |
| AC3 | Networking, 5G/6G, and Communications | XAI-enabled fine granular vertical resources autoscaler | Conference proceedings | 2,023 | https://doi.org/10.1109/NetSoft57336.2023.10175438 |
| AC3 | Networking, 5G/6G, and Communications | Dynamic deployment prediction and configuration in hybrid cloud / edge computing environments using influence-based learning | Conference proceedings | 2,023 | https://doi.org/10.1109/EECSI59885.2023.10295768 |
| ACES | Cybersecurity, Privacy, and Trust | FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning | Conference proceedings | 2,024 | https://doi.org/10.48550/arxiv.2312.04432 |
| ACES | Cybersecurity, Privacy, and Trust | FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks | Conference proceedings | 2,023 | https://doi.org/10.48550/arxiv.2310.02113 |
| ACES | Cybersecurity, Privacy, and Trust | Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge (Extended Version) | Conference proceedings | 2,023 | https://doi.org/10.1145/3576915.3623111 |
| ACES | Cybersecurity, Privacy, and Trust | PoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage Systems | Conference proceedings | 2,024 | https://doi.org/10.1109/PRDC59308.2023.00023 |
| AerOS | Cloud, Edge, and Continuum Computing | How many FIDO protocols are needed? Analysing the technology, security and compliance | Conference proceedings | https://doi.org/10.1145/3654661 | |
| AerOS | Cloud, Edge, and Continuum Computing | Network Slice Mobility for 6G Networks by Exploiting User and Network Prediction | Conference proceedings | https://doi.org/10.1109/ICC45041.2023.10279739 | |
| AerOS | Cloud, Edge, and Continuum Computing | Side-Channel Analysis of OpenVINO-based Neural Network Models | Conference proceedings | https://doi.org/10.48550/ARXIV.2407.16467 | |
| AerOS | Cloud, Edge, and Continuum Computing | Immutability and non-repudiation in the exchange of key messages within the EU IoT-Edge-Cloud Continuum | Conference proceedings | https://doi.org/10.1145/3664476.3669918 |