Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/117177
PIRA download icon_1.1View/Download Full Text
Title: A survey on securing image-centric edge intelligence
Authors: Li, T
Hu, H 
Gabbouj, M
Ye, Q 
Yang, X
Li, J
Li, L
Issue Date: Aug-2025
Source: ACM transactions on multimedia computing communications and applications, Aug. 2025, v. 21, no. 8, 221
Abstract: Facing enormous data generated at the network edge, edge intelligence (EI) emerges as the fusion of edge computing and AI, revolutionizing edge data processing and intelligent decision-making. Nonetheless, this emergent mode presents a complex array of security challenges, particularly prominent in image-centric applications due to the sheer volume of visual data and its direct connection to user privacy. These challenges include safeguarding model/image privacy and ensuring model integrity against various security threats, such as model poisoning. Essentially, those threats originate from data attacks, suggesting data protection as a promising solution. Although data protection measures are well-established in other domains, image-centric EI necessitates focused research. This survey examines the security issues inherent to image-centric EI and outlines the protection efforts, providing a comprehensive overview of the landscape. We begin by introducing EI, detailing its operational mechanics and associated security issues. We then explore the technologies facilitating security enhancement (e.g., differential privacy) and EI (e.g., compact networks and distributed learning frameworks). Next, we categorize security strategies by their application in data preparation, training, and inference, with a focus on image-based contexts. Despite these efforts on security, our investigation identifies research gaps. We also outline promising research directions to bridge these gaps, bolstering security frameworks in image-centric EI applications.
Keywords: Data attacks
Data processing
Decision-making
Edge computing
Edge intelligence
Image-centric applications
Internet-of-Things
User privacy
Publisher: Association for Computing Machinery
Journal: ACM transactions on multimedia computing communications and applications 
ISSN: 1551-6857
EISSN: 1551-6865
DOI: 10.1145/3700792
Rights: ©2025 Copyright held by the owner/author(s). Publication rights licensed to ACM. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in ACM Transactions on Multimedia Computing, Communications, and Applications, https://doi.org/10.1145/3700792.
Appears in Collections:Journal/Magazine Article

Files in This Item:
File Description SizeFormat 
Li_Survey_Securing_Image-centric.pdfPre-Published version1.29 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show full item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.