LEADER 05473nam 22007335 450 001 9910686776603321 005 20251225205304.0 010 $a9783031289903$b(electronic bk.) 010 $z9783031289897 024 7 $a10.1007/978-3-031-28990-3 035 $a(MiAaPQ)EBC7231667 035 $a(Au-PeEL)EBL7231667 035 $a(OCoLC)1375293631 035 $a(DE-He213)978-3-031-28990-3 035 $a(PPN)269094393 035 $a(CKB)26388094200041 035 $a(EXLCZ)9926388094200041 100 $a20230330d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEdge Computing and IoT: Systems, Management and Security $eThird EAI International Conference, ICECI 2022, Virtual Event, December 13-14, 2022, Proceedings /$fedited by Zhu Xiao, Ping Zhao, Xingxia Dai, Jinmei Shu 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (327 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v478 311 08$aPrint version: Xiao, Zhu Edge Computing and IoT: Systems, Management and Security Cham : Springer,c2023 9783031289897 327 $aModels and methods for data management in IoT -- Forecasting the Temperature of BEV Battery Pack based on Field Testing Data -- The Data Exchange Protocol over Multi-chain BlockchainUsing Zero-knowledge Proof -- A Hybrid Task Offloading and Service Cache Scheme for Vehicular Edge Computing -- On Enhancing Transmission Performance for IoV Based on Improved Greedy Algorithm -- Precise Segmentation on Poly-Yolo, YoloV5 and FCN -- Adaptive approaches to manage energy consumption and security of systems -- Research on DAG Based Consensus Mechanism for Adjustable Load Metering Data -- A Detection and Information Processing Model based on an Automatic Mechanism for Tax Payment Control in Developing Countries -- IEC-FOF: An Industrial Electricity Consumption Forecasting and Optimization Framework -- Demons Hidden in the Light: Unrestricted Adversarial Illumination Attacks -- Edge Intelligence Based Garbage Classification Detection Method -- Mobile computing in wireless networks -- Evaluation of Higher Education System -- Defense Mechanisms against Audio Adversarial Attacks: Recent Advances and Future Directions -- An Empirical Study of Worldwide Plastic Waste Mitigation -- Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence -- Highly Accurate Dynamic Gesture Recognition Method Based on Edge Intelligence -- Distributed computing in IOT -- Edge Intelligence Based Garbage Classification Detection Method -- Adversarial Example Attacks in Internet of Things (IoT) -- Training Node Screening in Decentralized Trusted Federated Learning -- Exploration and Practice of Course Homework Metaverse Based on Extended Reality under Edge Computing -- Federated Learning Based User Scheduling for Real-Time Multimedia Tasks in EdgeDevices -- A Co-caching Strategy for Edges Based on Federated Learning and Regional Prevalence -- LSTM-DAM: Malicious Network Traffic Prediction for Cloud Manufacturing System. 330 $aThis book constitutes the refereed post-conference proceedings of the Third International Conference on Edge Computing and IoT, ICECI 2022, held in December 13-14, 2022 in Changsha, China. Due to COVID-19 pandemic the conference was held virtually. The explosion of the big data generated by ubiquitous edge devices motivates the emergence of applying machine learning systems for edge computing and Internet of Things (IoT) services. Machine learning techniques are delivering a promising solution to the industry for building IoT systems and to make innovation at a rapid pace. The 22 full papers of ICECI 2022 were selected from 76 submissions and present results and ideas in the area of edge computing and IoT. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v478 606 $aComputer networks 606 $aArtificial intelligence 606 $aApplication software 606 $aSocial sciences$xData processing 606 $aComputers 606 $aComputer Communication Networks 606 $aArtificial Intelligence 606 $aComputer and Information Systems Applications 606 $aComputer Application in Social and Behavioral Sciences 606 $aComputing Milieux 615 0$aComputer networks. 615 0$aArtificial intelligence. 615 0$aApplication software. 615 0$aSocial sciences$xData processing. 615 0$aComputers. 615 14$aComputer Communication Networks. 615 24$aArtificial Intelligence. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Application in Social and Behavioral Sciences. 615 24$aComputing Milieux. 676 $a005.758 676 $a005.758 700 $aXiao$b Zhu$01350297 701 $aZhao$b Ping$01350298 701 $aDai$b Xingxia$01350299 701 $aShu$b Jinmei$01350300 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910686776603321 996 $aEdge Computing and IoT: Systems, Management and Security$93309827 997 $aUNINA