terminal device
ALPINE: A Lightweight and Adaptive Privacy-Decision Agent Framework for Dynamic Edge Crowdsensing
Cheng, Guanjie, Liu, Siyang, Huang, Junqin, Zhao, Xinkui, Wang, Yin, Zhu, Mengying, Kong, Linghe, Deng, Shuiguang
Mobile edge crowdsensing (MECS) systems continuously generate and transmit user data in dynamic, resource-constrained environments, exposing users to significant privacy threats. In practice, many privacy-preserving mechanisms build on differential privacy (DP). However, static DP mechanisms often fail to adapt to evolving risks, for example, shifts in adversarial capabilities, resource constraints and task requirements, resulting in either excessive noise or inadequate protection. To address this challenge, we propose ALPINE, a lightweight, adaptive framework that empowers terminal devices to autonomously adjust differential privacy levels in real time. ALPINE operates as a closed-loop control system consisting of four modules: dynamic risk perception, privacy decision via twin delayed deep deterministic policy gradient (TD3), local privacy execution and performance verification from edge nodes. Based on environmental risk assessments, we design a reward function that balances privacy gains, data utility and energy cost, guiding the TD3 agent to adaptively tune noise magnitude across diverse risk scenarios and achieve a dynamic equilibrium among privacy, utility and cost. Both the collaborative risk model and pretrained TD3-based agent are designed for low-overhead deployment. Extensive theoretical analysis and real-world simulations demonstrate that ALPINE effectively mitigates inference attacks while preserving utility and cost, making it practical for large-scale edge applications.
- Asia > Middle East > UAE > Dubai Emirate > Dubai (0.05)
- Asia > China > Zhejiang Province > Hangzhou (0.04)
- Asia > China > Shanghai > Shanghai (0.04)
- (4 more...)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Data Science > Data Mining (1.00)
- Information Technology > Communications > Networks (1.00)
- (4 more...)
Soft Everting Prosthetic Hand and Comparison with Existing Body-Powered Terminal Devices
Park, Gayoung, Schäffer, Katalin, Coad, Margaret M.
-- In this paper, we explore the use of a soft gripper, specifically a soft inverting-everting toroidal hydrostat, as a prosthetic hand. We present a design of the gripper integrated into a body-powered elbow-driven system and evaluate its performance compared to similar body-powered terminal devices: the Kwawu 3D-printed hand and the Hosmer hook. Our experiments highlight advantages of the Everting hand, such as low required cable tension for operation (1.6 N for Everting, 30.0 N for Kwawu, 28.1 N for Hosmer), limited restriction on the elbow angle range, and secure grasping capability (peak pulling force required to remove an object: 15.8 N for Everting, 6.9 N for Kwawu, 4.0 N for Hosmer). In our pilot user study, six able-bodied participants performed standardized hand dexterity tests. With the Everting hand compared to the Kwawu hand, users transferred more blocks in one minute and completed three tasks (moving small common objects, simulated feeding with a spoon, and moving large empty cans) faster (p 0.05). With the Everting hand compared to the Hosmer hook, users moved large empty cans faster (p 0.05) and achieved similar performance on all other tasks. Overall, user preference leaned toward the Everting hand for its adaptable grip and ease of use, although its abilities could be improved in tasks requiring high precision such as writing with a pen, and in handling heavier objects such as large heavy cans. For individuals with limb difference that affects their hand function, prosthetic hands have the potential to restore their ability to achieve everyday tasks [1], [2].
- North America > United States > South Carolina (0.04)
- North America > United States > Minnesota (0.04)
- North America > United States > Indiana > St. Joseph County > Notre Dame (0.04)
- (3 more...)
- Research Report > New Finding (1.00)
- Research Report > Experimental Study (1.00)
Beyond Humanoid Prosthetic Hands: Modular Terminal Devices That Improve User Performance
Chappell, Digby, Mulvey, Barry, Perera, Shehara, Bello, Fernando, Kormushev, Petar, Rojas, Nicolas
Despite decades of research and development, myoelectric prosthetic hands lack functionality and are often rejected by users. This lack in functionality can be partially attributed to the widely accepted anthropomorphic design ideology in the field; attempting to replicate human hand form and function despite severe limitations in control and sensing technology. Instead, prosthetic hands can be tailored to perform specific tasks without increasing complexity by shedding the constraints of anthropomorphism. In this paper, we develop and evaluate four open-source modular non-humanoid devices to perform the motion required to replicate human flicking motion and to twist a screwdriver, and the functionality required to pick and place flat objects and to cut paper. Experimental results from these devices demonstrate that, versus a humanoid prosthesis, non-humanoid prosthesis design dramatically improves task performance, reduces user compensatory movement, and reduces task load. Case studies with two end users demonstrate the translational benefits of this research. We found that special attention should be paid to monitoring end-user task load to ensure positive rehabilitation outcomes.
- North America > United States > Massachusetts > Middlesex County > Cambridge (0.04)
- Europe > United Kingdom > England > Cambridgeshire > Cambridge (0.04)
- Europe > Sweden (0.04)
- (3 more...)
A Novel Access Control and Privacy-Enhancing Approach for Models in Edge Computing
With the widespread adoption of edge computing technologies and the increasing prevalence of deep learning models in these environments, the security risks and privacy threats to models and data have grown more acute. Attackers can exploit various techniques to illegally obtain models or misuse data, leading to serious issues such as intellectual property infringement and privacy breaches. Existing model access control technologies primarily rely on traditional encryption and authentication methods; however, these approaches exhibit significant limitations in terms of flexibility and adaptability in dynamic environments. Although there have been advancements in model watermarking techniques for marking model ownership, they remain limited in their ability to proactively protect intellectual property and prevent unauthorized access. To address these challenges, we propose a novel model access control method tailored for edge computing environments. This method leverages image style as a licensing mechanism, embedding style recognition into the model's operational framework to enable intrinsic access control. Consequently, models deployed on edge platforms are designed to correctly infer only on license data with specific style, rendering them ineffective on any other data. By restricting the input data to the edge model, this approach not only prevents attackers from gaining unauthorized access to the model but also enhances the privacy of data on terminal devices. We conducted extensive experiments on benchmark datasets, including MNIST, CIFAR-10, and FACESCRUB, and the results demonstrate that our method effectively prevents unauthorized access to the model while maintaining accuracy. Additionally, the model shows strong resistance against attacks such as forged licenses and fine-tuning. These results underscore the method's usability, security, and robustness.
- Europe > Netherlands > North Holland > Amsterdam (0.04)
- Asia > China > Jiangsu Province > Nanjing (0.04)
MambaLoc: Efficient Camera Localisation via State Space Model
Wang, Jialu, Zhou, Kaichen, Markham, Andrew, Trigoni, Niki
Location information is pivotal for the automation and intelligence of terminal devices and edge-cloud IoT systems, such as autonomous vehicles and augmented reality. However, achieving reliable positioning across diverse IoT applications remains challenging due to significant training costs and the necessity of densely collected data. To tackle these issues, we have innovatively applied the selective state space (SSM) model to visual localization, introducing a new model named MambaLoc. The proposed model demonstrates exceptional training efficiency by capitalizing on the SSM model's strengths in efficient feature extraction, rapid computation, and memory optimization, and it further ensures robustness in sparse data environments due to its parameter sparsity. Additionally, we propose the Global Information Selector (GIS), which leverages selective SSM to implicitly achieve the efficient global feature extraction capabilities of Non-local Neural Networks. This design leverages the computational efficiency of the SSM model alongside the Non-local Neural Networks' capacity to capture long-range dependencies with minimal layers. Consequently, the GIS enables effective global information capture while significantly accelerating convergence. Our extensive experimental validation using public indoor and outdoor datasets first demonstrates our model's effectiveness, followed by evidence of its versatility with various existing localization models. Our code and models are publicly available to support further research and development in this area.
- Europe > United Kingdom > England > Oxfordshire > Oxford (0.14)
- North America > United States > New York > New York County > New York City (0.04)
- North America > United States > Illinois > Cook County > Chicago (0.04)
- Asia > Middle East > Republic of Türkiye > Karaman Province > Karaman (0.04)
Computation Offloading for Multi-server Multi-access Edge Vehicular Networks: A DDQN-based Method
Wang, Siyu, Yang, Bo, Yu, Zhiwen, Cao, Xuelin, Zhang, Yan, Yuen, Chau
Abstract--In this paper, we investigate a multi-user offloading problem in the overlapping domain of a multi-server mobile edge computing system. We divide the original problem into two stages: the offloading decision making stage and the request scheduling stage. To prevent the terminal from going out of service area during offloading, we consider the mobility parameter of the terminal according to the human behaviour model when making the offloading decision, and then introduce a server evaluation mechanism based on both the mobility parameter and the server load to select the optimal offloading server. In order to fully utilise the server resources, we design a double deep Q-network (DDQN)-based reward evaluation algorithm that considers the priority of tasks when scheduling offload requests. The authors of [3] proposed an effective task scheduling algorithm based on dynamic priority, which significantly reduced With the development of Multi-access Edge Computing task completion time and improved QoS. In [4], the authors (MEC) technology, MEC servers are moving closer to the proposed a hybrid task offloading scheme based on deep reinforcement terminal devices (TDs), which can be served more efficiently learning that achieved vehicle-to-edge and vehicleto-vehicle as the transmission latency is greatly reduced [1].
- Europe > Norway > Eastern Norway > Oslo (0.04)
- Asia > Singapore (0.04)
- Asia > China > Shaanxi Province > Xi'an (0.04)
- (5 more...)
A Survey on Collaborative DNN Inference for Edge Intelligence
Ren, Weiqing, Qu, Yuben, Dong, Chao, Jing, Yuqian, Sun, Hao, Wu, Qihui, Guo, Song
With the vigorous development of artificial intelligence (AI), the intelligent applications based on deep neural network (DNN) change people's lifestyles and the production efficiency. However, the huge amount of computation and data generated from the network edge becomes the major bottleneck, and traditional cloud-based computing mode has been unable to meet the requirements of real-time processing tasks. To solve the above problems, by embedding AI model training and inference capabilities into the network edge, edge intelligence (EI) becomes a cutting-edge direction in the field of AI. Furthermore, collaborative DNN inference among the cloud, edge, and end device provides a promising way to boost the EI. Nevertheless, at present, EI oriented collaborative DNN inference is still in its early stage, lacking a systematic classification and discussion of existing research efforts. Thus motivated, we have made a comprehensive investigation on the recent studies about EI oriented collaborative DNN inference. In this paper, we firstly review the background and motivation of EI. Then, we classify four typical collaborative DNN inference paradigms for EI, and analyze the characteristics and key technologies of them. Finally, we summarize the current challenges of collaborative DNN inference, discuss the future development trend and provide the future research direction.
- Telecommunications (1.00)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Networks (1.00)
- Information Technology > Communications > Mobile (1.00)
- Information Technology > Artificial Intelligence > Robots (1.00)
- (4 more...)