Cognitive Computing with a Big Data System in a Secure Internet of Things

This editorial aims to summarize the contents of the ten papers included in the Special Issue entitled “Cognitive Computing with a Big Data System in a Secure Internet of Things”. Cognitive computing is transdisciplinary, involving principles, methods, and technologies from several domains. IoT applications enable information exchange and interactions of physical and digital objects. IoT systems are expected to be smart and secure, and to be designed with reliability, resilience against attacks, operational efﬁciency, energy efﬁciency, and resource utilization efﬁciency. Cognitive computing embedded data technologies are used to process and analyze large amounts of data collected through secure IoT systems to help human experts perform decision-making. This Special Issue collected innovative solutions in this research area.

This editorial aims to summarize the contents of the ten papers included in the Special Issue entitled "Cognitive Computing with a Big Data System in a Secure Internet of Things".
Cognitive computing is transdisciplinary, involving principles, methods, and technologies from several domains. IoT applications enable information exchange and interactions of physical and digital objects. IoT systems are expected to be smart and secure, and to be designed with reliability, resilience against attacks, operational efficiency, energy efficiency, and resource utilization efficiency. Cognitive computing embedded data technologies are used to process and analyze large amounts of data collected through secure IoT systems to help human experts perform decision-making. This Special Issue collected innovative solutions in this research area.
Two of the key topics of recent advances in cyber security research are data hiding and digital watermarking. New technologies with strategies to use them have emerged. Article [1] focuses on homomorphic public key encryption in a reversible data hiding scheme. The cover image is segmented, and the reference pixel and target pixels are selfembedded into other parts of the image. The data hider embeds the encrypted additional data into the target pixels by means of homomorphic addition in ciphertexts, while the reference pixel remains unchanged.
Internet of Things and big data applications have increased in recent years, and security monitoring is one of the most difficult challenges in this field. FFTD in article [2] is a Fast Face Tracking-by-Detection algorithm that uses the Kernelized Correlation Filter as the basic tracker, multitask CNNs to detect the face, and a new tracking update strategy to update the filter mode.
Cyberattacks use domain names to maintain a connection with clients and generate new domain names to avoid the blacklist mechanism. To address this, article [3] proposes a DGA domain name classification method based on LSTM with an attention mechanism.
A knowledge graph conflict resolution method incorporating deep learning is proposed in article [4] that resolves fact conflicts with high precision by combining time attributes, semantic embedding representations, and graph structure features.
ECG signals are necessary for the analysis and diagnosis of heart diseases. The application value of ECG signals is, however, susceptible to contamination by a variety of disturbances. In order to reduce noise in ECG signals, paper [5] suggests a denoising technique that combines wavelet energy with a sub-band smoothing filter.
Concurrent access in IoT software development is a challenging task. Paper [6] proposes a refactoring framework for fine-grained read-write locking and an automatic refactoring tool to help developers convert built-in monitors into fine-grained Re-entrant Read Write Locks, tested by 1072 built-in monitors.
Article [7] presents a new face recognition approach for security applications based on Goldstein branching and face radial curve elastic matching to address the problem of the long recognition time and high equipment cost of intelligent security robots. It has a greater rate of facial identification and is resistant to lighting changes and noises.
Paper [8] focused on learning representations of abstract concepts. The proposed method, Regulated Activation Network (RAN), has an evolving topology and learns representations of abstract concepts by exploiting the geometrical view of concepts, without supervision. It was evaluated with eight UCI benchmarks and five Machine Learning models to establish its credibility.
Short text is widely seen in applications including Internet of Things. The Entitybased Concept Knowledge-Aware (ECKA) method is a multi-level short text semantic representation model that extracts semantic features from words, entities, and concepts with different knowledge levels, as explained in article [9].
An efficient BGV-type homomorphic encryption scheme is proposed in article [10] for secure computing in IoT systems. It reduces storage space and ciphertext evaluation time by allowing constant switch keys and repeated multiplication operations between two sublayers.
In summary, these ten contributions published in this Special Issue indicate the research trends of cognitive computing with big data communicated through a secure Internet of Things.

Conflicts of Interest:
The authors declare no conflict of interest.