Artificial Intelligence and Edge Computing-Enabled Web Spam Detection for Next Generation IoT Applications

被引:13
作者
Makkar, Aaisha [1 ]
Ghosh, Uttam [2 ]
Sharma, Pradip Kumar [3 ]
机构
[1] Seoul Natl Univ Sci & Technol, Dept Comp Sci & Engn, Seoul 01811, South Korea
[2] Vanderbilt Univ, Dept Elect Engn & Comp Sci, Nashville, TN 37235 USA
[3] Univ Aberdeen, Dept Comp Sci, Aberdeen AB24 3FX, Scotland
关键词
Cloud computing; Internet; Servers; Edge computing; Image edge detection; Internet of Things; Deep learning; Collaborative; deep learning; edge computing; artificial intelligence; CLOUD; MANAGEMENT; INTERNET;
D O I
10.1109/JSEN.2021.3066492
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
For next generation IoT applications, edge devices provides most of the computing resources close to the proximity of the end users. These devices having built-in intelligence using various AI techniques can take independent decisions in the environment where these are deployed. Motivated from these concerns, We suggest a cognitive intrusion security system to maintain the credibility of search engine results, which eliminates the advertising images from penetrating the image database of the web browser. The proposed framework provides edge intelligence for web data filteration and detects the web spam by considering three different layers, i.e., data collection services, edge computing services, and cloud services. The target is to detect the malicious images. Firstly, the features of an image such as mean, image gradient, entropy are fetched and then the retrieved data is processed in the proposed framework. Deep learning algorithms are used for the validation of the proposed system. By evaluating it on real-time collected dataset, it resulted in an accuracy of 98.77%.
引用
收藏
页码:25352 / 25361
页数:10
相关论文
共 36 条
[1]   Application Centric Virtual Machine Placements to Minimize Bandwidth Utilization in Datacenters [J].
Abdullah, Muhammad ;
Khana, Saad Ahmad ;
Alenez, Mamdouh ;
Almustafa, Khaled ;
Iqbal, Waheed .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2020, 26 (01) :13-25
[2]   Towards Improving the Intrusion Detection through ELM (Extreme Learning Machine) [J].
Ahmad, Iftikhar ;
Alsemmeari, Rayan Atteah .
CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 65 (02) :1097-1111
[3]  
[Anonymous], 2015, CISCO VISUAL NETWORK
[4]  
Becherer M, 2020, COMPUT SYST SCI ENG, V35, P81
[5]  
Chun BG, 2011, EUROSYS 11: PROCEEDINGS OF THE EUROSYS 2011 CONFERENCE, P301
[6]  
F1, 2020, REP STAT
[7]  
F2, 2020, REP GOOGL
[8]  
F5, 2020, REP KASP
[9]   Towards Wearable Cognitive Assistance [J].
Ha, Kiryong ;
Chen, Zhuo ;
Hu, Wenlu ;
Richter, Wolfgang ;
Pillai, Padmanabhan ;
Satyanarayanan, Mahadev .
MOBISYS'14: PROCEEDINGS OF THE 12TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2014, :68-81
[10]  
Hossain B, 2019, INTELL AUTOM SOFT CO, V25, P105