Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/117177
| Title: | A survey on securing image-centric edge intelligence | Authors: | Li, T Hu, H Gabbouj, M Ye, Q Yang, X Li, J Li, L |
Issue Date: | Aug-2025 | Source: | ACM transactions on multimedia computing communications and applications, Aug. 2025, v. 21, no. 8, 221 | Abstract: | Facing enormous data generated at the network edge, edge intelligence (EI) emerges as the fusion of edge computing and AI, revolutionizing edge data processing and intelligent decision-making. Nonetheless, this emergent mode presents a complex array of security challenges, particularly prominent in image-centric applications due to the sheer volume of visual data and its direct connection to user privacy. These challenges include safeguarding model/image privacy and ensuring model integrity against various security threats, such as model poisoning. Essentially, those threats originate from data attacks, suggesting data protection as a promising solution. Although data protection measures are well-established in other domains, image-centric EI necessitates focused research. This survey examines the security issues inherent to image-centric EI and outlines the protection efforts, providing a comprehensive overview of the landscape. We begin by introducing EI, detailing its operational mechanics and associated security issues. We then explore the technologies facilitating security enhancement (e.g., differential privacy) and EI (e.g., compact networks and distributed learning frameworks). Next, we categorize security strategies by their application in data preparation, training, and inference, with a focus on image-based contexts. Despite these efforts on security, our investigation identifies research gaps. We also outline promising research directions to bridge these gaps, bolstering security frameworks in image-centric EI applications. | Keywords: | Data attacks Data processing Decision-making Edge computing Edge intelligence Image-centric applications Internet-of-Things User privacy |
Publisher: | Association for Computing Machinery | Journal: | ACM transactions on multimedia computing communications and applications | ISSN: | 1551-6857 | EISSN: | 1551-6865 | DOI: | 10.1145/3700792 | Rights: | ©2025 Copyright held by the owner/author(s). Publication rights licensed to ACM. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in ACM Transactions on Multimedia Computing, Communications, and Applications, https://doi.org/10.1145/3700792. |
| Appears in Collections: | Journal/Magazine Article |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Li_Survey_Securing_Image-centric.pdf | Pre-Published version | 1.29 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



