{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:55:42Z","timestamp":1774454142256,"version":"3.50.1"},"reference-count":317,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"DKU Professional Discretionary Fund","award":["26AKUG0088"],"award-info":[{"award-number":["26AKUG0088"]}]},{"name":"DKU Professional Discretionary Fund","award":["00AKUG0343"],"award-info":[{"award-number":["00AKUG0343"]}]},{"name":"Guangdong Pearl River Talents Recruitment Program","award":["2019ZT08X603"],"award-info":[{"award-number":["2019ZT08X603"]}]},{"name":"Guangdong Pearl Rivers Talent Plan","award":["2019JC01X235"],"award-info":[{"award-number":["2019JC01X235"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62576213"],"award-info":[{"award-number":["62576213"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62406075"],"award-info":[{"award-number":["62406075"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Sciences and Engineering Research Council (NSERC) of Canada","award":["RGPIN-2021-02970"],"award-info":[{"award-number":["RGPIN-2021-02970"]}]},{"name":"Natural Sciences and Engineering Research Council (NSERC) of Canada","award":["DGECR-202100187"],"award-info":[{"award-number":["DGECR-202100187"]}]},{"name":"National Key Research and Development Program of China","award":["2023YFC3604802"],"award-info":[{"award-number":["2023YFC3604802"]}]},{"name":"Shanghai Key Technology Research and Development Program","award":["25511107200"],"award-info":[{"award-number":["25511107200"]}]},{"DOI":"10.13039\/501100004489","name":"Mitacs Project","doi-asserted-by":"publisher","award":["IT44479"],"award-info":[{"award-number":["IT44479"]}],"id":[{"id":"10.13039\/501100004489","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004489","name":"Mitacs Project","doi-asserted-by":"publisher","award":["QJLI GR037230"],"award-info":[{"award-number":["QJLI GR037230"]}],"id":[{"id":"10.13039\/501100004489","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/comst.2026.3669216","type":"journal-article","created":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T20:59:08Z","timestamp":1772485148000},"page":"5049-5080","source":"Crossref","is-referenced-by-count":6,"title":["Edge-Cloud Collaborative Computing on Distributed Intelligence and Model Optimization: A Survey"],"prefix":"10.1109","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2819-0200","authenticated-orcid":false,"given":"Jing","family":"Liu","sequence":"first","affiliation":[{"name":"Division of Natural and Applied Sciences, Duke Kunshan University, Kunshan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9086-5467","authenticated-orcid":false,"given":"Yao","family":"Du","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9956-2200","authenticated-orcid":false,"given":"Kun","family":"Yang","sequence":"additional","affiliation":[{"name":"Ant Group and the College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1587-163X","authenticated-orcid":false,"given":"Jiaqi","family":"Wu","sequence":"additional","affiliation":[{"name":"Department of Automation, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4953-2660","authenticated-orcid":false,"given":"Yan","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Data Science and Engineering, East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4952-699X","authenticated-orcid":false,"given":"Xiping","family":"Hu","sequence":"additional","affiliation":[{"name":"Academy of Artificial Intelligence, SMBU, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9040-847X","authenticated-orcid":false,"given":"Zehua","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1312-0146","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Electronic and Information Engineering, Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8356-1329","authenticated-orcid":false,"given":"Peng","family":"Sun","sequence":"additional","affiliation":[{"name":"Division of Natural and Applied Sciences, Duke Kunshan University, Kunshan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3851-9938","authenticated-orcid":false,"given":"Azzedine","family":"Boukerche","sequence":"additional","affiliation":[{"name":"Paradise Research Laboratory, EECS, University of Ottawa, Ottawa, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3529-2640","authenticated-orcid":false,"given":"Victor C. M.","family":"Leung","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, The University of British Columbia, Vancouver, BC, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0001.2300054"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3393230"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2022.3179207"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3405075"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2023.111942"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103676"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-36889-9_16"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.107538"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2025.3550599"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3265425"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3178211"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3264901"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3366252"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3318180"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103648"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103430"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3460061"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737385"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3465480.3466928"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid57682.2023.00051"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/EPECE63428.2024.00042"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3235064"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110352"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3387275"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437794"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3126076"},{"key":"ref27","article-title":"Slicing-based AI service provisioning on network edge","author":"Li","year":"2021","journal-title":"arXiv:2105.07052"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-40677-5_5"},{"key":"ref29","article-title":"Autonomy and intelligence in the computing continuum: Challenges, enablers, and future directions for orchestration","author":"Kokkonen","year":"2022","journal-title":"arXiv:2205.01423"},{"key":"ref30","article-title":"MPC-enabled privacy-preserving neural network training against malicious attack","author":"Liu","year":"2020","journal-title":"arXiv:2007.12557"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-48340-1_59"},{"key":"ref32","article-title":"Mobile edge intelligence for large language models: A contemporary survey","author":"Qu","year":"2024","journal-title":"arXiv:2407.18921"},{"key":"ref33","first-page":"19","article-title":"IoT content object security with OSCORE and NDN: A first experimental comparison","volume-title":"Proc. IFIP Netw. Conf. (Networking)","author":"G\u00fcndogan"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3457858"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN59985.2024.10572147"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3243929"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2920341"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3284387"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3073066"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3084396"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2025.3527641"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3338153"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3239579"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3582270"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3353265"},{"key":"ref47","article-title":"Edge, fog, and cloud computing: An overview on challenges and applications","author":"Vo","year":"2022","journal-title":"arXiv:2211.01863"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7476201"},{"key":"ref49","article-title":"Edge computing: A comprehensive survey of current initiatives and a roadmap for a sustainable edge computing development","author":"Hamm","year":"2019","journal-title":"arXiv:1912.08530"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-30278-8_34"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2979361"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.14445\/23497157\/ijres-v10i3p111"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/EDGE.2018.00014"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3529087"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.01.006"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.3007905"},{"key":"ref57","article-title":"Scalable, distributed AI frameworks: Leveraging cloud computing for enhanced deep learning performance and efficiency","author":"Mungoli","year":"2023","journal-title":"arXiv:2304.13738"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467078"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3060875"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3482978"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106401"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2025.3583966"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2020.05.009"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10436905"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3376977"},{"key":"ref66","article-title":"Hybrid SD: Edge-cloud collaborative inference for stable diffusion models","author":"Yan","year":"2024","journal-title":"arXiv:2408.06646"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3365879"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/467"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3290818"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111402"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.204"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621254"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.01202"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2023.3301718"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123859"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2023.3273272"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/e-Science62913.2024.10678725"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120350"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3332668"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3451715"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3223944"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3359040"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3374462"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i9.16991"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148636"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i7.32818"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3293164"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2023.3345154"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3123165"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3570361.3592529"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3399650"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120502"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.12.137"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6143"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-45170-6_5"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586176"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3327795"},{"key":"ref98","article-title":"From cloud to edge: Rethinking generative AI for low-resource design challenges","author":"Vuruma","year":"2024","journal-title":"arXiv:2402.12702"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.14778\/3570690.3570692"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3460078"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3268404"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2024.3360438"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.124909"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2024.3382952"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2024.3447123"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.04.046"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2024.3442880"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3372614"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103922"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3292368"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC61673.2024.10733614"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2024.102853"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3454057"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3327495"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.02.024"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2024.2328116"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2024.3413751"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3314460"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3376636"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8042"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/CAC63892.2024.10865632"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-2966-1_2"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS51746.2020.00017"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.014.2300319"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3530482"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3591744"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3370985"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3332308"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.10.012"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109758"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3237938"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3315339"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3360978"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.11.013"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3349177"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS53615.2022.9668356"},{"key":"ref137","article-title":"Edge computing service deployment and task offloading based on multi-task high-dimensional multi-objective optimization","author":"Guo","year":"2023","journal-title":"arXiv:2312.04101"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2024.3381646"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2024EAP1011"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/3341325.3342001"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3292591"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3365899"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3461149"},{"key":"ref144","article-title":"A comprehensive and accurate energy model for arm\u2019s cortex-M0 processor","author":"Georgiou","year":"2021","journal-title":"arXiv:2104.01055"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3357218"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-024-00658-0"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3330419"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3340"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3052082"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3219261"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/ICFEC51620.2021.00019"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3153847"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3507372"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2023.3326977"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.03.007"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3421967"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps45667.2019.9024424"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN60899.2024.10650388"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3333291"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2024.3377441"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3342438"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2024.105963"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS61880.2024.10620670"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3325674"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103643"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2024.3435850"},{"key":"ref167","first-page":"1379","article-title":"Efficient differentially private secure aggregation for federated learning via hardness of learning with errors","volume-title":"Proc. USENIX Secur.","author":"Stevens"},{"key":"ref168","article-title":"Concentrated differentially private and utility preserving federated learning","author":"Hu","year":"2020","journal-title":"arXiv:2003.13761"},{"key":"ref169","article-title":"CaPC learning: Confidential and private collaborative learning","author":"Choquette-Choo","year":"2021","journal-title":"arXiv:2102.05188"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406322"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3326970"},{"key":"ref172","article-title":"SMPC task decomposition: A theory for accelerating secure multi-party computation task","author":"Feng","year":"2023","journal-title":"arXiv:2303.00343"},{"key":"ref173","article-title":"Privacy-preserving security inference towards cloud-edge collaborative using differential privacy","author":"Wang","year":"2022","journal-title":"arXiv:2212.06428"},{"key":"ref174","article-title":"PrivaScissors: Enhance the privacy of collaborative inference through the lens of mutual information","author":"Duan","year":"2023","journal-title":"arXiv:2306.07973"},{"key":"ref175","article-title":"A privacy-preserving outsourced data model in cloud environment","author":"Gupta","year":"2022","journal-title":"arXiv:2211.13542"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0016"},{"key":"ref177","article-title":"Privacy-preserving data in IoT-based cloud systems: A comprehensive survey with AI integration","author":"Dhinakaran","year":"2024","journal-title":"arXiv:2401.00794"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.5121\/ijcsit.2023.15302"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3300845"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3368206"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3399219"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3295438"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/3453169"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.003.2300053"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015432"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3025993"},{"key":"ref187","article-title":"AI-driven confidential computing across edge-to-cloud continuum","author":"Zobaed","year":"2023","journal-title":"arXiv:2301.00928"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld.2018.00039"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3419716"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2019.2907133"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69893-5_14"},{"key":"ref192","article-title":"Decentralized blockchain-based model for edge computing","author":"Al-Rakhami","year":"2021","journal-title":"arXiv:2106.15050"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-024-02117-3"},{"key":"ref194","article-title":"Secure aggregation is not all you need: Mitigating privacy attacks with noise tolerance in federated learning","author":"Gilbert","year":"2022","journal-title":"arXiv:2211.06324"},{"key":"ref195","article-title":"Asynchronous federated learning with differential privacy for edge intelligence","author":"Li","year":"2019","journal-title":"arXiv:1912.07902"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3146448"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647793"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834594"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00045"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3014246"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1145\/3712000"},{"key":"ref202","article-title":"Towards quantifying the carbon emissions of differentially private machine learning","author":"Naidu","year":"2021","journal-title":"arXiv:2107.06946"},{"key":"ref203","first-page":"27555","article-title":"Differentially private empirical risk minimization under the fairness lens","volume-title":"Proc. NeurIPS","volume":"34","author":"Tran"},{"key":"ref204","article-title":"EdgeLeakage: Membership information leakage in distributed edge intelligence systems","author":"Chen","year":"2024","journal-title":"arXiv:2404.16851"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3393639"},{"key":"ref206","article-title":"KubeEdge-Sedna v0.3: Towards next-generation automatically customized AI engineering scheme","author":"Zheng","year":"2023","journal-title":"arXiv:2304.05985"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3017742"},{"key":"ref208","article-title":"Blockchain-based RBAC model with separation of duties constraint in cloud environment","author":"Ri","year":"2022","journal-title":"arXiv:2203.00351"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3158253"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488872"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2022.3214119"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT62411.2024.10946488"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2025.100955"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1485"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2022.3206407"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2020.2993259"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.109929"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1145\/3501296"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/CIC52973.2021.00013"},{"key":"ref220","article-title":"A survey on federated learning for the healthcare metaverse: Concepts, applications, challenges, and future directions","author":"Bashir","year":"2023","journal-title":"arXiv:2304.00524"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3042320"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25659-2_12"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148937"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3300"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1117\/12.3034773"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3476142"},{"key":"ref227","article-title":"Scaling performance of serverless edge networking","author":"Michalke","year":"2023","journal-title":"arXiv:2310.09137"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-23220-6_8"},{"key":"ref229","article-title":"The efficiency misnomer","author":"Dehghani","year":"2021","journal-title":"arXiv:2110.12894"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1145\/3440689"},{"key":"ref231","article-title":"On the impact of black-box deployment strategies for edge AI on latency and model performance","author":"Singh","year":"2024","journal-title":"arXiv:2403.17154"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.04.004"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS62655.2024.00132"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.05.056"},{"key":"ref235","first-page":"1","article-title":"Parsimonious edge computing to reduce microservice resource usage","volume-title":"Proc. 33th Int. Teletraffic Congr. (ITC-33)","author":"Simon"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68154-8_36"},{"key":"ref237","article-title":"Network resource management for cyber-physical production systems based on quality of experience","author":"Vid\u00e1cs","year":"2023","journal-title":"arXiv:2311.06008"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3179698"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2980271"},{"key":"ref240","article-title":"Privacy protectability: An information-theoretical approach","author":"Shi","year":"2023","journal-title":"arXiv:2305.15697"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32813-9_3"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-54053-0_12"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.125.2200294"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1145\/3589806.3600032"},{"key":"ref245","article-title":"Continuous evaluation of the performance of cloud infrastructure for scientific applications","author":"Mohammadi","year":"2018","journal-title":"arXiv:1812.05257"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/SEC54971.2022.00019"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1145\/3444692"},{"key":"ref248","article-title":"OpenPerf: A benchmarking framework for the sustainable development of the open-source ecosystem","author":"Bi","year":"2023","journal-title":"arXiv:2311.15212"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-18576-3_2"},{"key":"ref250","article-title":"Benchmarking function hook latency in cloud-native environments","author":"Kahlhofer","year":"2023","journal-title":"arXiv:2310.12702"},{"key":"ref251","article-title":"Armada: A robust latency-sensitive edge cloud in heterogeneous edge-dense environments","author":"Huang","year":"2021"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796939"},{"key":"ref253","article-title":"A survey on scheduling techniques in the edge cloud: Issues, challenges and future directions","author":"Asghar","year":"2022","journal-title":"arXiv:2202.07799"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110771"},{"key":"ref255","article-title":"Watt for what: Rethinking deep learning\u2019s energy-performance relationship","author":"Gowda","year":"2023","journal-title":"arXiv:2310.06522"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2022.3220399"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/ICFEC50348.2020.00016"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3007787"},{"key":"ref259","article-title":"A framework for energy-aware evaluation of distributed data processing platforms in edge-cloud environment","author":"Ullah","year":"2022","journal-title":"arXiv:2201.01972"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/DAC56929.2023.10247821"},{"key":"ref261","article-title":"Pushing large language models to the 6G edge: Vision, challenges, and opportunities","author":"Lin","year":"2023","journal-title":"arXiv:2309.16739"},{"key":"ref262","article-title":"At the edge of a seamless cloud experience","author":"Rac","year":"2021","journal-title":"arXiv:2111.06157"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1145\/3526059.3533618"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet59005.2023.10490045"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2024.03.005"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3229444"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800543"},{"key":"ref268","article-title":"Cost-effective machine learning inference offload for edge computing","author":"Makaya","year":"2020","journal-title":"arXiv:2012.04063"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.102013"},{"key":"ref270","article-title":"A case for a programmable edge storage middleware","author":"Frascaria","year":"2021","journal-title":"arXiv:2111.14720"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC59175.2023.10253868"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3319671"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2300046"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3088910"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.3390\/informatics7040043"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2018.00891"},{"key":"ref277","article-title":"Neuromorphic hardware for sustainable AI data centers","author":"Vogginger","year":"2024","journal-title":"arXiv:2402.02521"},{"key":"ref278","article-title":"Cybersecurity in the quantum era: Assessing the impact of quantum computing on infrastructure","author":"Baseri","year":"2024","journal-title":"arXiv:2404.10659"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1145\/3716368.3735264"},{"key":"ref280","article-title":"Quantum-edge cloud computing: A future paradigm for IoT applications","author":"Hossain","year":"2024","journal-title":"arXiv:2405.04824"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/QSW59989.2023.00013"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2021.3069952"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS48437.2020.00019"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE59016.2024.10444369"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2024.3437365"},{"key":"ref286","article-title":"Automated machine learning: State-of-the-art and open challenges","author":"Elshawi","year":"2019","journal-title":"arXiv:1906.02287"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1016\/j.iswa.2023.200188"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1038\/s44387-025-00002-0"},{"key":"ref289","first-page":"8671","article-title":"Fast, accurate, and simple models for tabular data via augmented distillation","volume-title":"Proc. NeurIPS","volume":"33","author":"Fakoor"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v39i21.34358"},{"key":"ref291","article-title":"A multivocal literature review on the benefits and limitations of automated machine learning tools","author":"Azevedo","year":"2024","journal-title":"arXiv:2401.11366"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1145\/3589335.3648336"},{"key":"ref293","article-title":"Mining robust default configurations for resource-constrained autoML","author":"Kayali","year":"2022","journal-title":"arXiv:2202.09927"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3546466"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i17.29860"},{"key":"ref296","article-title":"VELO: A vector database-assisted cloud-edge collaborative LLM QoS optimization framework","author":"Yao","year":"2024","journal-title":"arXiv:2406.13399"},{"key":"ref297","article-title":"NetGPT: A native-AI network architecture beyond provisioning personalized generative services","author":"Chen","year":"2023","journal-title":"arXiv:2307.06148"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2970550"},{"key":"ref299","first-page":"25081","article-title":"EmbodiedGPT: Vision-language pre-training via embodied chain of thought","volume-title":"Proc. NeurIPS","volume":"36","author":"Mu"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2019.8793600"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1109\/IRC59093.2023.00059"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1109\/ASP-DAC52403.2022.9712531"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1145\/3546790.3546806"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2020.603796"},{"key":"ref305","article-title":"NeuCASL: From logic design to system simulation of neuromorphic engines","author":"Dang","year":"2022","journal-title":"arXiv:2208.03500"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1142\/S1793351X20500063"},{"key":"ref307","article-title":"Quantum cloud computing: A review, open problems, and future directions","author":"Nguyen","year":"2024","journal-title":"arXiv:2404.11420"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN53733.2021.9686111"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.004.2200482"},{"key":"ref310","article-title":"Toward experience-driven traffic management and orchestration in digital-twin-enabled 6G networks","author":"Tariq","year":"2022","journal-title":"arXiv:2201.04259"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2200508"},{"key":"ref312","article-title":"How crucial is it for 6G networks to be autonomous?","author":"Adem","year":"2021","journal-title":"arXiv:2106.06949"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3017079"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3117927"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10229049"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00016"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165744"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9739\/11321210\/11417814.pdf?arnumber=11417814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:41:29Z","timestamp":1773348089000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11417814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":317,"URL":"https:\/\/doi.org\/10.1109\/comst.2026.3669216","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}