Secure Artificial Intelligence in Mobile Edge Computing
in Special Issue Posted on March 6, 2020Information for the Special Issue
Submission Deadline: | Mon 31 Aug 2020 |
Journal Impact Factor : | 2.816 |
Journal Name : | Computer Communications |
Journal Publisher: |
![]() |
Website for the Special Issue: | https://www.journals.elsevier.com/computer-communications/call-for-papers/special-issue-on-secure-artificial-intelligence-in-mobile |
Journal & Submission Website: | https://www.journals.elsevier.com/computer-communications |
Special Issue Call for Papers:
As a key 5G enabler technology, mobile edge computing (MEC) has emerged in recent years as a new computing paradigm that provides end-users with low latency in their access to applications deployed at the edge of the cloud. Many artificial intelligence (AI) applications powered by machine learning demand low latency, e.g., smart assistant, driverless cars, smart manufacturing, etc. The integration of mobile edge computing and AI unlocks unlimited possibilities in people’s daily lives.
In the mobile edge computing environment, computing resources are provisioned and managed in a decentralized manner. Accordingly, artificial intelligence applications are deployed in a decentralized manner. However, unlike the centralized cloud computing environment, there is a lack of security techniques and mechanisms specifically designed for the devices and servers operating in the mobile edge computing environment. This further complicates many of the security issues in artificial intelligence applications, e.g., data privacy attacks, adversarial attacks, confidentiality attacks, etc.
In this special issue, we look for significant findings in tackling new security issues that challenge artificial intelligence in the mobile edge computing environment. Specifically, we solicit novel contributions on secure artificial intelligence from a variety of perspectives, e.g., architecture, data, algorithms, etc.
Potential topics include but are not limited to the following:
- Advanced AI algorithms for MEC security
- AI-powered privacy protection in MEC
- Intelligent data preprocess, communications and integration in MEC
- Attacks vs. Countermeasures in MEC applications
- AI-based MEC architecture design
- AI-based energy efficient networking techniques for MEC
- Smart sensor networks and IoT applications
- AI-based network resource allocation and optimization in MEC
- The design of AI-enabled hardware aspects in MEC
- Distributed and decentralized signal processing via AI algorithms
- Trust, reliability and dependability in MEC
- Encryption, Signature and Forensics for MEC applications
Important Dates:
Deadline of Submissions: 31 August 2020
Notification of First Round: 31 November 2020
Submission of revision: 1st March 2021
Acceptance: 1st May 2021
Guest Editors
- ● Prof. Lianyong Qi (Managing Guest Editor), Qufu Normal University, China.
- ● Prof. Qiang Ni, Lancaster University, UK.
- ● Prof. Shui Yu, University of Technology Sydney, Australia.
- ● A/Prof. Gautam Srivastava, Brandon University, Canada.
Submission Guidelines
Please visit https://www.evise.com/profile/#/COMCOM/login to submit your manuscript. To ensure that all manuscripts are correctly identified for inclusion into the special issue, please select “SI: SecAI-MEC” when you reach the Article Type step in the submission process. For further information, please contact the guest editors.
Other Special Issues on this journal
![]() |
|
Deep Reinforcement Learning for Future Wireless Network VirtualizationComputer Communications |
Tue 15 Jun 2021 |
![]() |
|
Network Management in Beyond 5G/6G NetworksComputer Communications |
Sun 20 Jun 2021 |
![]() |
|
Security and Privacy in Space-Ground Integrated NetworkComputer Communications |
Wed 01 Dec 2021 |
Closed Special Issues
![]() |
|
Intelligent Network Communication and Management for Smart LivingComputer Communications |
Sun 31 Jan 2021 |
![]() |
|
Data Driven Discovery of Cyber Physical SystemsComputer Communications |
Thu 31 Dec 2020 |
![]() |
|
Machine Learning approaches in IoT scenariosComputer Communications |
Wed 02 Dec 2020 |
![]() |
|
Emerging Services in the Next-Generation Web: Human Meets Artificial IntelligenceComputer Communications |
Sun 01 Nov 2020 |
![]() |
|
Survivability of Mobile and Wireless Communication NetworksComputer Communications |
Fri 30 Oct 2020 |
![]() |
|
Security and Privacy in Internet of Medical Things: Problems and SolutionsComputer Communications |
Thu 15 Oct 2020 |
![]() |
|
Industrial communication networks in smart factory 4.0Computer Communications |
Sun 30 Aug 2020 |
![]() |
|
Intelligent Green Communication Networks for 5G and BeyondComputer Communications |
Tue 30 Jun 2020 |
![]() |
|
Scalable and Secure Platforms for UAV networksComputer Communications |
Tue 30 Jun 2020 |
![]() |
|
Optimization of Cross-layer Collaborative Resource Allocation for Mobile Edge Computing, Caching and CommunicationComputer Communications |
Sun 31 May 2020 |
![]() |
|
Intelligent Resource Management in Mobile Edge Computing for IIoT applicationsComputer Communications |
Thu 30 Apr 2020 |
![]() |
|
Internet of Things and Augmented Reality in the age of 5GComputer Communications |
Mon 30 Mar 2020 |
![]() |
|
Intelligent Edge: When Machine Learning Meets Edge ComputingComputer Communications |
Sun 15 Mar 2020 |
![]() |
|
Enabling Cognitive Smart Cities: Security and Privacy in IoT applications (CSCIoT)Computer Communications |
Sun 15 Mar 2020 |
![]() |
|
Advanced Computing and Communication Technologies for Internet of DronesComputer Communications |
Mon 02 Dec 2019 |
![]() |
|
Software-defined disaster area UAV communication networks for extreme surveillanceComputer Communications |
Sat 30 Nov 2019 |
![]() |
|
Learning-based Mobile Services in 5G NetworkComputer Communications |
Tue 15 Oct 2019 |
![]() |
|
Mobile Information Centric NetworkingComputer Communications |
Tue 01 Oct 2019 |
![]() |
|
Deep learning for Intelligent IoT: Opportunities, Challenges and SolutionsComputer Communications |
Mon 30 Sep 2019 |
![]() |
|
Data Distribution in Industrial and Pervasive InternetComputer Communications |
Sun 15 Sep 2019 |
![]() |
|
5G Radio Access Network Design and OptimizationComputer Communications |
Sun 01 Sep 2019 |
![]() |
|
Unmanned Aerial Vehicles for Smart Everything (U2S): Applications, Protocols, and ChallengesComputer Communications |
Mon 15 Jul 2019 |
![]() |
|
Special Issue on Cloud-based Media Computing and CommunicationsComputer Communications |
Sun 15 Oct 2017 |
![]() |
|
Special Issue on Energy-aware Design for Sustainable 5G NetworksComputer Communications |
Fri 01 Sep 2017 |
![]() |
|
Mobile Video in the 5G/IoT EraComputer Communications |
Tue 28 Feb 2017 |
![]() |
|
Trends and Advances for Data Mining and Classification on Internet of Things (IoT) systemsComputer Communications |
Wed 01 Feb 2017 |
![]() |
|
Mobile Traffic AnalyticsComputer Communications |
Fri 16 Oct 2015 |