Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/117177
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Electrical and Electronic Engineeringen_US
dc.creatorLi, Ten_US
dc.creatorHu, Hen_US
dc.creatorGabbouj, Men_US
dc.creatorYe, Qen_US
dc.creatorYang, Xen_US
dc.creatorLi, Jen_US
dc.creatorLi, Len_US
dc.date.accessioned2026-02-05T09:20:36Z-
dc.date.available2026-02-05T09:20:36Z-
dc.identifier.issn1551-6857en_US
dc.identifier.urihttp://hdl.handle.net/10397/117177-
dc.language.isoenen_US
dc.publisherAssociation for Computing Machineryen_US
dc.rights©2025 Copyright held by the owner/author(s). Publication rights licensed to ACM. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in ACM Transactions on Multimedia Computing, Communications, and Applications, https://doi.org/10.1145/3700792.en_US
dc.subjectData attacksen_US
dc.subjectData processingen_US
dc.subjectDecision-makingen_US
dc.subjectEdge computingen_US
dc.subjectEdge intelligenceen_US
dc.subjectImage-centric applicationsen_US
dc.subjectInternet-of-Thingsen_US
dc.subjectUser privacyen_US
dc.titleA survey on securing image-centric edge intelligenceen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.volume21en_US
dc.identifier.issue8en_US
dc.identifier.doi10.1145/3700792en_US
dcterms.abstractFacing enormous data generated at the network edge, edge intelligence (EI) emerges as the fusion of edge computing and AI, revolutionizing edge data processing and intelligent decision-making. Nonetheless, this emergent mode presents a complex array of security challenges, particularly prominent in image-centric applications due to the sheer volume of visual data and its direct connection to user privacy. These challenges include safeguarding model/image privacy and ensuring model integrity against various security threats, such as model poisoning. Essentially, those threats originate from data attacks, suggesting data protection as a promising solution. Although data protection measures are well-established in other domains, image-centric EI necessitates focused research. This survey examines the security issues inherent to image-centric EI and outlines the protection efforts, providing a comprehensive overview of the landscape. We begin by introducing EI, detailing its operational mechanics and associated security issues. We then explore the technologies facilitating security enhancement (e.g., differential privacy) and EI (e.g., compact networks and distributed learning frameworks). Next, we categorize security strategies by their application in data preparation, training, and inference, with a focus on image-based contexts. Despite these efforts on security, our investigation identifies research gaps. We also outline promising research directions to bridge these gaps, bolstering security frameworks in image-centric EI applications.en_US
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationACM transactions on multimedia computing communications and applications, Aug. 2025, v. 21, no. 8, 221en_US
dcterms.isPartOfACM transactions on multimedia computing communications and applicationsen_US
dcterms.issued2025-08-
dc.identifier.scopus2-s2.0-105018471750-
dc.identifier.eissn1551-6865en_US
dc.identifier.artn221en_US
dc.description.validate202602 bcchen_US
dc.description.oaAccepted Manuscripten_US
dc.identifier.SubFormIDG000814/2025-11-
dc.description.fundingSourceRGCen_US
dc.description.fundingSourceOthersen_US
dc.description.fundingTextThis work was supported by the National Natural Science Foundation of China (Grant Nos.: 92270123 and 62072390), the Research Grants Council, Hong Kong SAR, China (Grant Nos.: 15203120 and 15226221), and the Scientific and Technological Research Program of Chongqing Municipal Education Commission (KJZD-K202300601).en_US
dc.description.pubStatusPublisheden_US
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Li_Survey_Securing_Image-centric.pdfPre-Published version1.29 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.