Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/117177
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | Department of Electrical and Electronic Engineering | en_US |
| dc.creator | Li, T | en_US |
| dc.creator | Hu, H | en_US |
| dc.creator | Gabbouj, M | en_US |
| dc.creator | Ye, Q | en_US |
| dc.creator | Yang, X | en_US |
| dc.creator | Li, J | en_US |
| dc.creator | Li, L | en_US |
| dc.date.accessioned | 2026-02-05T09:20:36Z | - |
| dc.date.available | 2026-02-05T09:20:36Z | - |
| dc.identifier.issn | 1551-6857 | en_US |
| dc.identifier.uri | http://hdl.handle.net/10397/117177 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Association for Computing Machinery | en_US |
| dc.rights | ©2025 Copyright held by the owner/author(s). Publication rights licensed to ACM. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in ACM Transactions on Multimedia Computing, Communications, and Applications, https://doi.org/10.1145/3700792. | en_US |
| dc.subject | Data attacks | en_US |
| dc.subject | Data processing | en_US |
| dc.subject | Decision-making | en_US |
| dc.subject | Edge computing | en_US |
| dc.subject | Edge intelligence | en_US |
| dc.subject | Image-centric applications | en_US |
| dc.subject | Internet-of-Things | en_US |
| dc.subject | User privacy | en_US |
| dc.title | A survey on securing image-centric edge intelligence | en_US |
| dc.type | Journal/Magazine Article | en_US |
| dc.identifier.volume | 21 | en_US |
| dc.identifier.issue | 8 | en_US |
| dc.identifier.doi | 10.1145/3700792 | en_US |
| dcterms.abstract | Facing enormous data generated at the network edge, edge intelligence (EI) emerges as the fusion of edge computing and AI, revolutionizing edge data processing and intelligent decision-making. Nonetheless, this emergent mode presents a complex array of security challenges, particularly prominent in image-centric applications due to the sheer volume of visual data and its direct connection to user privacy. These challenges include safeguarding model/image privacy and ensuring model integrity against various security threats, such as model poisoning. Essentially, those threats originate from data attacks, suggesting data protection as a promising solution. Although data protection measures are well-established in other domains, image-centric EI necessitates focused research. This survey examines the security issues inherent to image-centric EI and outlines the protection efforts, providing a comprehensive overview of the landscape. We begin by introducing EI, detailing its operational mechanics and associated security issues. We then explore the technologies facilitating security enhancement (e.g., differential privacy) and EI (e.g., compact networks and distributed learning frameworks). Next, we categorize security strategies by their application in data preparation, training, and inference, with a focus on image-based contexts. Despite these efforts on security, our investigation identifies research gaps. We also outline promising research directions to bridge these gaps, bolstering security frameworks in image-centric EI applications. | en_US |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | ACM transactions on multimedia computing communications and applications, Aug. 2025, v. 21, no. 8, 221 | en_US |
| dcterms.isPartOf | ACM transactions on multimedia computing communications and applications | en_US |
| dcterms.issued | 2025-08 | - |
| dc.identifier.scopus | 2-s2.0-105018471750 | - |
| dc.identifier.eissn | 1551-6865 | en_US |
| dc.identifier.artn | 221 | en_US |
| dc.description.validate | 202602 bcch | en_US |
| dc.description.oa | Accepted Manuscript | en_US |
| dc.identifier.SubFormID | G000814/2025-11 | - |
| dc.description.fundingSource | RGC | en_US |
| dc.description.fundingSource | Others | en_US |
| dc.description.fundingText | This work was supported by the National Natural Science Foundation of China (Grant Nos.: 92270123 and 62072390), the Research Grants Council, Hong Kong SAR, China (Grant Nos.: 15203120 and 15226221), and the Scientific and Technological Research Program of Chongqing Municipal Education Commission (KJZD-K202300601). | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.description.oaCategory | Green (AAM) | en_US |
| Appears in Collections: | Journal/Magazine Article | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Li_Survey_Securing_Image-centric.pdf | Pre-Published version | 1.29 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



