EUCloudEdgeIoT Research Outputs Repository edit edit source

This page provides a comprehensive list of research outputs generated by Horizon 2020 and Horizon Europe Research and Innovation projects in the domains of Cloud, Edge and IoT, under the EUCloudEdgeIoT umbrella.

The publications listed below have been categorised, can be filtered and a full text search is available at the top of the listing.

The categories are:

  1. Cloud, Edge, and Continuum Computing
  2. Hardware Architecture and High-Performance Computing (HPC)
  3. Cybersecurity, Privacy, and Trust
  4. Artificial Intelligence and Machine Learning Systems
  5. Networking, 5G/6G, and Communications
  6. Software Engineering, Testing, and DevOps
  7. IoT, Robotics, and Autonomous Swarms
  8. Data Science, Analytics, and Data Processing
EU ProjectHas CategoryHas TitleHas TypeHas YearHas DOI
AerOSCloud, Edge, and Continuum ComputingSemantics for Resource Selection in Next Generation Internet of Things SystemsBook chapters2,024https://doi.org/10.1007/978-3-031-58502-9 19
AerOSCloud, Edge, and Continuum ComputingApproaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial ScenarioBook chapters2,025https://doi.org/10.1007/978-3-031-78572-6 2
CloudSkinCloud, Edge, and Continuum Computing$$\text {T}^{2}$$GS: Comprehensive Reconstruction of Dynamic Surgical Scenes with Gaussian SplattingBook chapters2,025https://doi.org/10.1007/978-3-032-05114-1 57
CloudSkinCloud, Edge, and Continuum ComputingSicherheitsmechanismen des Cloud-Computings zur Verwendung in KorrekturverfahrenBook chapters2,025https://doi.org/10.1007/978-3-658-45180-6 14
CloudSkinCloud, Edge, and Continuum ComputingLeveraging Expert Knowledge for Real-Time Online Adaptation of Intraoperative Liver RegistrationBook chapters2,024https://doi.org/10.1007/978-3-031-75291-9 11
EDGELESSCloud, Edge, and Continuum ComputingMarginal Cost of Computation as a Collaborative Strategy for Resource Management at the EdgeBook chapters2,025https://doi.org/10.1007/978-3-031-81226-2 3
NebulOusCloud, Edge, and Continuum ComputingAn Implemented Architecture for a Meta Operating System Managing Distributed Applications Across Heterogeneous ResourcesBook chapters2,025https://doi.org/10.1007/978-3-031-87778-0 36
P2CODECybersecurity, Privacy, and TrustAnonymous Authenticated Key ExchangeBook chapters2,025https://doi.org/10.1007/978-3-031-95761-1 18
P2CODECybersecurity, Privacy, and TrustApproaching Interoperability and Data-Related Processing Issues in a Human-Centric Industrial ScenarioBook chapters2,025https://doi.org/10.1007/978-3-031-78572-6 2
Vitamin-VHardware Architecture and High-Performance Computing (HPC)Runtime Energy Monitoring for RISC-V Soft-CoresBook chapters2,025https://doi.org/10.1007/978-3-031-96099-4 27
Vitamin-VHardware Architecture and High-Performance Computing (HPC)Challenges and Opportunities for RISC-V Architectures towards Genomics-basedWorkloadsBook chapters2,023https://doi.org/10.1007/978-3-031-40843-4 34
AC3Networking, 5G/6G, and CommunicationsXAI-enabled fine granular vertical resources autoscalerConference proceedings2,023https://doi.org/10.1109/NetSoft57336.2023.10175438
AC3Networking, 5G/6G, and CommunicationsDynamic deployment prediction and configuration in hybrid cloud / edge computing environments using influence-based learningConference proceedings2,023https://doi.org/10.1109/EECSI59885.2023.10295768
ACESCybersecurity, Privacy, and TrustFreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated LearningConference proceedings2,024https://doi.org/10.48550/arxiv.2312.04432
ACESCybersecurity, Privacy, and TrustFLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor AttacksConference proceedings2,023https://doi.org/10.48550/arxiv.2310.02113
ACESCybersecurity, Privacy, and TrustUsing Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge (Extended Version)Conference proceedings2,023https://doi.org/10.1145/3576915.3623111
ACESCybersecurity, Privacy, and TrustPoTR: Accurate and Efficient Proof of Timely-Retrievability for Storage SystemsConference proceedings2,024https://doi.org/10.1109/PRDC59308.2023.00023
AerOSCloud, Edge, and Continuum ComputingHow many FIDO protocols are needed? Analysing the technology, security and complianceConference proceedings https://doi.org/10.1145/3654661
AerOSCloud, Edge, and Continuum ComputingNetwork Slice Mobility for 6G Networks by Exploiting User and Network PredictionConference proceedings https://doi.org/10.1109/ICC45041.2023.10279739
AerOSCloud, Edge, and Continuum ComputingSide-Channel Analysis of OpenVINO-based Neural Network ModelsConference proceedings https://doi.org/10.48550/ARXIV.2407.16467
AerOSCloud, Edge, and Continuum ComputingImmutability and non-repudiation in the exchange of key messages within the EU IoT-Edge-Cloud ContinuumConference proceedings https://doi.org/10.1145/3664476.3669918