EUCloudEdgeIoT Research Outputs Repository

This page provides a comprehensive list of research outputs generated by Horizon 2020 and Horizon Europe Research and Innovation projects in the domains of Cloud, Edge and IoT, under the EUCloudEdgeIoT umbrella.

EU ProjectHas CategoryHas TitleHas AuthorsHas TypeHas YearHas DOI
AerOSCloud, Edge, and Continuum ComputingSemantics for Resource Selection in Next Generation Internet of Things SystemsKatarzyna Wasielewska-Michniewska, Marcin Paprzycki, Maria GanzhaBook chapters2,024https://doi.org/10.1007/978-3-031-58502-9 19
AerOSCloud, Edge, and Continuum ComputingApproaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial ScenarioDanish Abbas Syed, Walter Quadrini, Nima Rahmani Choubeh, Marta Pinzone, Sergio GusmeroliBook chapters2,025https://doi.org/10.1007/978-3-031-78572-6 2
CloudSkinCloud, Edge, and Continuum Computing$$\text {T}^{2}$$GS: Comprehensive Reconstruction of Dynamic Surgical Scenes with Gaussian SplattingJinjing Xu, Chenyang Li, Peng Liu, Micha Pfeiffer, Liwen Liu, Reuben Docea, Martin Wagner, Stefanie SpeidelBook chapters2,025https://doi.org/10.1007/978-3-032-05114-1 57
CloudSkinCloud, Edge, and Continuum ComputingSicherheitsmechanismen des Cloud-Computings zur Verwendung in KorrekturverfahrenRobert Krahn, Christof FetzerBook chapters2,025https://doi.org/10.1007/978-3-658-45180-6 14
CloudSkinCloud, Edge, and Continuum ComputingLeveraging Expert Knowledge for Real-Time Online Adaptation of Intraoperative Liver RegistrationPeng Liu, Sebastian Bodenstedt, Fiona Kolbinger, Carina Riediger, J rgen Weitz, Stefanie Speidel, Micha PfeifferBook chapters2,024https://doi.org/10.1007/978-3-031-75291-9 11
EDGELESSCloud, Edge, and Continuum ComputingMarginal Cost of Computation as a Collaborative Strategy for Resource Management at the EdgeEmanuele Carlini; Patrizio Dazzi; Luca Ferrucci; Jacopo Massa; Matteo MordacchiniBook chapters2,025https://doi.org/10.1007/978-3-031-81226-2 3
NebulOusCloud, Edge, and Continuum ComputingAn Implemented Architecture for a Meta Operating System Managing Distributed Applications Across Heterogeneous ResourcesGeir Horn, Yiannis Verginadis, Giannis Ledakis, Nikos Papageorgopoulos, Simeon VeloudisBook chapters2,025https://doi.org/10.1007/978-3-031-87778-0 36
P2CODECybersecurity, Privacy, and TrustAnonymous Authenticated Key ExchangeJos Ignacio Escribano Pablos, Mar a Isabel Gonz lez Vasco, ngel P rez del Pozo, Claudio SorienteBook chapters2,025https://doi.org/10.1007/978-3-031-95761-1 18
P2CODECybersecurity, Privacy, and TrustApproaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial ScenarioDanish Abbas Syed, Walter Quadrini, Nima Rahmani Choubeh, Marta Pinzone, Sergio GusmeroliBook chapters2,025https://doi.org/10.1007/978-3-031-78572-6 2
Vitamin-VHardware Architecture and High-Performance Computing (HPC)Runtime Energy Monitoring for RISC-V Soft-CoresAlberto Scionti, Paolo Savio, Francesco Lubrano, Giuseppe Caragnano, Olivier Terzo, Marco Ferretti, Florin Apopei, Juri Bellucci, Ennio Spano, Luca CarriereBook chapters2,025https://doi.org/10.1007/978-3-031-96099-4 27
Vitamin-VHardware Architecture and High-Performance Computing (HPC)Challenges and Opportunities for RISC-V Architectures towards Genomics-basedWorkloadsG. Gomez, A. Call, X. Teruel, L. Alonso, I. Moran, M. A. Perez, D. Torrents, J. L.. BerralBook chapters2,023https://doi.org/10.1007/978-3-031-40843-4 34
AC3Networking, 5G/6G, and CommunicationsXAI-enabled fine granular vertical resources autoscalerMekki, Mohamed; Brik, Bouziane; Ksentini, Adlen; Verikoukis, ChristosConference proceedings2,023https://doi.org/10.1109/NetSoft57336.2023.10175438
AC3Networking, 5G/6G, and CommunicationsDynamic deployment prediction and configuration in hybrid cloud / edge computing environments using influence-based learningChrysostomos Symvoulidis , Athanasios Kiourtis, Argyro Mavrogioroug, Jean-Didier Totow Tom-Ata, George Manias, Dimosthenis KyriazisConference proceedings2,023https://doi.org/10.1109/EECSI59885.2023.10295768
ACESCybersecurity, Privacy, and TrustFreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated LearningFereidooni, Hossein; Pegoraro, Alessandro; Rieger, Phillip; Dmitrienko, Alexandra; Sadeghi, Ahmad-RezaConference proceedings2,024https://doi.org/10.48550/arxiv.2312.04432
ACESCybersecurity, Privacy, and TrustFLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor AttacksJorge Castillo; Phillip Rieger; Hossein Fereidooni; Qian Chen; Ahmad SadeghiConference proceedings2,023https://doi.org/10.48550/arxiv.2310.02113
ACESCybersecurity, Privacy, and TrustUsing Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge (Extended Version)Correia, Cl udio; Correia, Miguel; Rodrigues, Lu sConference proceedings2,023https://doi.org/10.1145/3576915.3623111
ACESCybersecurity, Privacy, and TrustPoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage SystemsCl udio Correia, Rita Prates, Miguel Correia, Lu s RodriguesConference proceedings2,024https://doi.org/10.1109/PRDC59308.2023.00023
AerOSCloud, Edge, and Continuum ComputingHow many FIDO protocols are needed? Analysing the technology, security and complianceAnna Angelogianni, Ilias Politis, Christos XenakisConference proceedings https://doi.org/10.1145/3654661
AerOSCloud, Edge, and Continuum ComputingNetwork Slice Mobility for 6G Networks by Exploiting User and Network PredictionH. Yu, Z. Ming, C. Wang, and T. TalebConference proceedings https://doi.org/10.1109/ICC45041.2023.10279739
AerOSCloud, Edge, and Continuum ComputingSide-Channel Analysis of OpenVINO-based Neural Network ModelsDirmanto Jap, Jakub Breier, Zdenko Lehock , Shivam Bhasin, Xiaolu HouConference proceedings https://doi.org/10.48550/ARXIV.2407.16467
AerOSCloud, Edge, and Continuum ComputingImmutability and non-repudiation in the exchange of key messages within the EU IoT-Edge-Cloud ContinuumSalvador Cu at, Ra l Reinosa, Ignacio Lacalle, Carlos E. PalauConference proceedings https://doi.org/10.1145/3664476.3669918