Ultimate Guide to Transforming Your Old Phone into a Home Surveillance System, Server, or Gaming Console

Ultimate Guide to Transforming Your Old Phone into a Home Surveillance System, Server, or Gaming Console

What can you do with an old phone gathering dust in your drawer besides turning it into a planter? The coolest digital eco-friendly project of 2025 is to transform it into a home security guard, personal cloud storage, retro gaming console, or even the brain of a smart home! With zero cost, low barriers, and … Read more

OpenWrt Soft Router: Transforming Ordinary Routers into ‘Smart Brains’ for a Leap in Home Networking!

OpenWrt Soft Router: Transforming Ordinary Routers into 'Smart Brains' for a Leap in Home Networking!

“Why can other people’s networks access the internet scientifically, filter ads, and control devices globally?” The answer may not lie in the speed of the internet itself, but in whether your router is smart enough. This article will guide you step by step on how to upgrade an ordinary home router into a smart soft … Read more

Preventing Smart Home Surveillance: Essential Precautionary Measures

Preventing Smart Home Surveillance: Essential Precautionary Measures

Click the blue text above to follow ↑↑↑↑↑ Recently, CCTV revealed how an ordinary desk lamp can “eavesdrop” and steal confidential and personal privacy without your knowledge, highlighting the pervasive danger of information theft. With ordinary furniture posing such hidden risks, the potential for information leakage from smart furniture directly connected to the internet is … Read more

Jing Chao and Xu Jianwu: A Privacy-Preservation-Aware Delay Optimization Task Offloading Algorithm for Collaborative Edge Computing

Jing Chao and Xu Jianwu: A Privacy-Preservation-Aware Delay Optimization Task Offloading Algorithm for Collaborative Edge Computing

Abstract: Although collaborative edge computing systems enhance the performance of mobile edge computing, users face significant privacy leakage issues during task offloading. To address this problem, we designed a Privacy-Preservation-Aware Delay Optimization task offloading algorithm (PPDO) within the collaborative edge computing system. By considering two types of privacy—location and usage patterns—we established a privacy task … Read more

ICLR 2020 | Simplifying Cryptographic Algorithms: SJTU’s Approach to Privacy in Mid-Level Features Using Complex Neural Networks

ICLR 2020 | Simplifying Cryptographic Algorithms: SJTU's Approach to Privacy in Mid-Level Features Using Complex Neural Networks

Machine Heart Report Machine Heart Editorial Team The top AI conference ICLR 2020 will be held on April 26 in Addis Ababa, Ethiopia. Among the final 2594 submitted papers, 687 were accepted, with an acceptance rate of 26.5%. This article introduces a paper accepted by the team of Zhang Quanshi from Shanghai Jiao Tong University … Read more

What Is Edge Computing? The Next Revolution in IT!

What Is Edge Computing? The Next Revolution in IT!

With the deepening trend of the Internet of Everything, the number of end devices such as smartphones and smart glasses is constantly increasing, causing the growth rate of data to far exceed the growth rate of network bandwidth; at the same time, the emergence of many new applications such as augmented reality and autonomous driving … Read more