Salmane Douch - IEEE Xplore Author Profile

Scheduled Maintenance: On Tuesday, May 20, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET (6:00-10:00 PM UTC). During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

Showing 1-4 of 4 results

Filter Results

Show

Results

The increasing utilization and demand for intelligent tasks at the end-user level, such as autonomous vehicles, virtual assistants, telesurgery, etc., has elevated the risk of various attacks targeting intelligent models used in these applications. One of the most prominent types of attacks is the backdoor attack. In backdoor attacks, adversaries clandestinely inject poisoned data using a trigger ...Show More
With the proliferation of IoT devices, the core network is experiencing overwhelming congestion. Edge Com-puting emerges as a valuable and promising solution to relocate computing and intelligence from the cloud to the edge, where end-user devices are located. Consequently, reducing the increasing privacy concerns about hosting data in the cloud. However, this transition presents numerous challeng...Show More
Cloud computing is a critical component in the success of 5G and 6G networks, particularly given the computation-intensive nature of emerging applications. Despite all it advantages, cloud computing faces limitations in meeting the strict latency and bandwidth requirements of applications such as eHealth and automotive systems. To overcome these limitations, edge computing has emerged as a novel p...Show More
With the increasing stringent QoS constraints (e.g., latency, bandwidth, jitter) imposed by novel applications (e.g., e-Health, autonomous vehicles, smart cities, etc.), as well as the rapidly increasing number of connected IoT (Internet of Things) devices, the core network is becoming increasingly congested. To cope with those constraints, Edge Computing (EC) is emerging as an innovative computin...Show More