Arzovs, A.; Judvaitis, J.; Nesenbergs, K.; Selavo, L. Distributed Learning in the IoT–Edge–Cloud Continuum. Machine Learning and Knowledge Extraction, 6(1), 283-315. pp. MDPI, 2024.
Bibtex citāts:
Bibtex citāts:
@article{15969_2024,
author = {Arzovs and A.; Judvaitis and J.; Nesenbergs and K.; Selavo and L},
title = {Distributed Learning in the IoT–Edge–Cloud Continuum},
journal = {Machine Learning and Knowledge Extraction},
volume = {6},
issue = {1},
pages = {283-315.},
publisher = {MDPI},
year = {2024}
}
author = {Arzovs and A.; Judvaitis and J.; Nesenbergs and K.; Selavo and L},
title = {Distributed Learning in the IoT–Edge–Cloud Continuum},
journal = {Machine Learning and Knowledge Extraction},
volume = {6},
issue = {1},
pages = {283-315.},
publisher = {MDPI},
year = {2024}
}
Anotācija: The goal of the IoT–Edge–Cloud Continuum approach is to distribute computation and data loads across multiple types of devices taking advantage of the different strengths of each, such as proximity to the data source, data access, or computing power, while mitigating potential weaknesses. Most current machine learning operations are currently concentrated on remote high-performance computing devices, such as the cloud, which leads to challenges related to latency, privacy, and other inefficiencies. Distributed learning approaches can address these issues by enabling the distribution of machine learning operations throughout the IoT–Edge–Cloud Continuum by incorporating Edge and even IoT layers into machine learning operations more directly. Approaches like transfer learning could help to transfer the knowledge from more performant IoT–Edge–Cloud Continuum layers to more resource-constrained devices, e.g., IoT. The implementation of these methods in machine learning operations, including the related data handling security and privacy approaches, is challenging and actively being researched. In this article the distributed learning and transfer learning domains are researched, focusing on security, robustness, and privacy aspects, and their potential usage in the IoT–Edge–Cloud Continuum, including research on tools to use for implementing these methods. To achieve this, we have reviewed 145 sources and described the relevant methods as well as their relevant attack vectors and provided suggestions on mitigation.
Žurnāla kvartile: Q1