一条卷发 发表于 2025-3-26 22:55:16
Dynamic Task Allocation and Scheduling for Energy Saving in Edge Nodes for IoT ApplicationsFibrin 发表于 2025-3-27 04:52:17
Internet of Things. Advances in Information and Communication Technology6th IFIP Internation场所 发表于 2025-3-27 08:15:48
http://reply.papertrans.cn/48/4726/472531/472531_33.pngCanyon 发表于 2025-3-27 13:16:17
http://reply.papertrans.cn/48/4726/472531/472531_34.pngbeta-cells 发表于 2025-3-27 16:05:15
http://reply.papertrans.cn/48/4726/472531/472531_35.png哄骗 发表于 2025-3-27 18:58:20
http://reply.papertrans.cn/48/4726/472531/472531_36.pngBadger 发表于 2025-3-28 00:06:23
http://reply.papertrans.cn/48/4726/472531/472531_37.pngFLIC 发表于 2025-3-28 05:27:36
Layer-Wise Filter Thresholding Based CNN Pruning for Efficient IoT Edge Implementationsed method utilizes threshold-based pruning to optimize pre-trained CNN models, enabling inference on resource-constrained IoT and edge devices. The pruning thresholds for each layer are iteratively adjusted using a range-based threshold pruning technique. The pre-trained network evaluates the accura优雅 发表于 2025-3-28 09:57:52
Shrew Distributed Denial-of-Service (DDoS) Attack in IoT Applications: A Surveypreventing DDoS attacks, specifically focusing on Shrew DDoS or low-rate DDoS attacks. We explore the use of machine learning for DDoS detection and prevention and introduce a new potential technique that simplifies the process of detecting and preventing DDoS attacks originating from multiple infec神圣不可 发表于 2025-3-28 11:13:52
Honeypot Detection and Classification Using Xgboost Algorithm for Hyper Tuning System Performanceng of parameters, which is the unique addition along with classification. Nowadays, blockchain technologies are the grooming technologies. In the current trend, the attackers are implementing a new strategy that is much more proactive. The attackers attempt to dupe the victims by sending seemingly v