EUCloudEdgeIoT Research Outputs Repository

This page provides a comprehensive list of research outputs generated by Horizon 2020 and Horizon Europe Research and Innovation projects in the domains of Cloud, Edge and IoT, under the EUCloudEdgeIoT umbrella.

EU ProjectHas DOIHas CategoryHas TitleHas AuthorsHas TypeHas Year
AerOShttps://doi.org/10.1007/978-3-031-58502-9 19Cloud, Edge, and Continuum ComputingSemantics for Resource Selection in Next Generation Internet of Things SystemsKatarzyna Wasielewska-Michniewska, Marcin Paprzycki, Maria GanzhaBook chapters2,024
AerOShttps://doi.org/10.1007/978-3-031-78572-6 2Cloud, Edge, and Continuum ComputingApproaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial ScenarioDanish Abbas Syed, Walter Quadrini, Nima Rahmani Choubeh, Marta Pinzone, Sergio GusmeroliBook chapters2,025
CloudSkinhttps://doi.org/10.1007/978-3-032-05114-1 57Cloud, Edge, and Continuum Computing$$\text {T}^{2}$$GS: Comprehensive Reconstruction of Dynamic Surgical Scenes with Gaussian SplattingJinjing Xu, Chenyang Li, Peng Liu, Micha Pfeiffer, Liwen Liu, Reuben Docea, Martin Wagner, Stefanie SpeidelBook chapters2,025
CloudSkinhttps://doi.org/10.1007/978-3-658-45180-6 14Cloud, Edge, and Continuum ComputingSicherheitsmechanismen des Cloud-Computings zur Verwendung in KorrekturverfahrenRobert Krahn, Christof FetzerBook chapters2,025
CloudSkinhttps://doi.org/10.1007/978-3-031-75291-9 11Cloud, Edge, and Continuum ComputingLeveraging Expert Knowledge for Real-Time Online Adaptation of Intraoperative Liver RegistrationPeng Liu, Sebastian Bodenstedt, Fiona Kolbinger, Carina Riediger, J rgen Weitz, Stefanie Speidel, Micha PfeifferBook chapters2,024
EDGELESShttps://doi.org/10.1007/978-3-031-81226-2 3Cloud, Edge, and Continuum ComputingMarginal Cost of Computation as a Collaborative Strategy for Resource Management at the EdgeEmanuele Carlini; Patrizio Dazzi; Luca Ferrucci; Jacopo Massa; Matteo MordacchiniBook chapters2,025
NebulOushttps://doi.org/10.1007/978-3-031-87778-0 36Cloud, Edge, and Continuum ComputingAn Implemented Architecture for a Meta Operating System Managing Distributed Applications Across Heterogeneous ResourcesGeir Horn, Yiannis Verginadis, Giannis Ledakis, Nikos Papageorgopoulos, Simeon VeloudisBook chapters2,025
P2CODEhttps://doi.org/10.1007/978-3-031-95761-1 18Cybersecurity, Privacy, and TrustAnonymous Authenticated Key ExchangeJos Ignacio Escribano Pablos, Mar a Isabel Gonz lez Vasco, ngel P rez del Pozo, Claudio SorienteBook chapters2,025
P2CODEhttps://doi.org/10.1007/978-3-031-78572-6 2Cybersecurity, Privacy, and TrustApproaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial ScenarioDanish Abbas Syed, Walter Quadrini, Nima Rahmani Choubeh, Marta Pinzone, Sergio GusmeroliBook chapters2,025
Vitamin-Vhttps://doi.org/10.1007/978-3-031-96099-4 27Hardware Architecture and High-Performance Computing (HPC)Runtime Energy Monitoring for RISC-V Soft-CoresAlberto Scionti, Paolo Savio, Francesco Lubrano, Giuseppe Caragnano, Olivier Terzo, Marco Ferretti, Florin Apopei, Juri Bellucci, Ennio Spano, Luca CarriereBook chapters2,025
Vitamin-Vhttps://doi.org/10.1007/978-3-031-40843-4 34Hardware Architecture and High-Performance Computing (HPC)Challenges and Opportunities for RISC-V Architectures towards Genomics-basedWorkloadsG. Gomez, A. Call, X. Teruel, L. Alonso, I. Moran, M. A. Perez, D. Torrents, J. L.. BerralBook chapters2,023
AC3https://doi.org/10.1109/NetSoft57336.2023.10175438Networking, 5G/6G, and CommunicationsXAI-enabled fine granular vertical resources autoscalerMekki, Mohamed; Brik, Bouziane; Ksentini, Adlen; Verikoukis, ChristosConference proceedings2,023
AC3https://doi.org/10.1109/EECSI59885.2023.10295768Networking, 5G/6G, and CommunicationsDynamic deployment prediction and configuration in hybrid cloud / edge computing environments using influence-based learningChrysostomos Symvoulidis , Athanasios Kiourtis, Argyro Mavrogioroug, Jean-Didier Totow Tom-Ata, George Manias, Dimosthenis KyriazisConference proceedings2,023
ACEShttps://doi.org/10.48550/arxiv.2312.04432Cybersecurity, Privacy, and TrustFreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated LearningFereidooni, Hossein; Pegoraro, Alessandro; Rieger, Phillip; Dmitrienko, Alexandra; Sadeghi, Ahmad-RezaConference proceedings2,024
ACEShttps://doi.org/10.48550/arxiv.2310.02113Cybersecurity, Privacy, and TrustFLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor AttacksJorge Castillo; Phillip Rieger; Hossein Fereidooni; Qian Chen; Ahmad SadeghiConference proceedings2,023
ACEShttps://doi.org/10.1145/3576915.3623111Cybersecurity, Privacy, and TrustUsing Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge (Extended Version)Correia, Cl udio; Correia, Miguel; Rodrigues, Lu sConference proceedings2,023
ACEShttps://doi.org/10.1109/PRDC59308.2023.00023Cybersecurity, Privacy, and TrustPoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage SystemsCl udio Correia, Rita Prates, Miguel Correia, Lu s RodriguesConference proceedings2,024
AerOShttps://doi.org/10.1145/3654661Cloud, Edge, and Continuum ComputingHow many FIDO protocols are needed? Analysing the technology, security and complianceAnna Angelogianni, Ilias Politis, Christos XenakisConference proceedings 
AerOShttps://doi.org/10.1109/ICC45041.2023.10279739Cloud, Edge, and Continuum ComputingNetwork Slice Mobility for 6G Networks by Exploiting User and Network PredictionH. Yu, Z. Ming, C. Wang, and T. TalebConference proceedings 
AerOShttps://doi.org/10.48550/ARXIV.2407.16467Cloud, Edge, and Continuum ComputingSide-Channel Analysis of OpenVINO-based Neural Network ModelsDirmanto Jap, Jakub Breier, Zdenko Lehock , Shivam Bhasin, Xiaolu HouConference proceedings 
AerOShttps://doi.org/10.1145/3664476.3669918Cloud, Edge, and Continuum ComputingImmutability and non-repudiation in the exchange of key messages within the EU IoT-Edge-Cloud ContinuumSalvador Cu at, Ra l Reinosa, Ignacio Lacalle, Carlos E. PalauConference proceedings