Computation offloading method using stochastic games for software-defined-network-based multiagent mobile edge computing

G Wu, H Wang, H Zhang, Y Zhao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In the scenario of Industry 4.0, mobile smart devices (SDs) on production lines have to
process massive amounts of data. These computing tasks sometimes far exceed the …

Joint differential game and double deep q–networks for suppressing malware spread in industrial internet of things

S Shen, L Xie, Y Zhang, G Wu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT), which has the capability of perception, monitoring,
communication and decision-making, has already exposed more security problems that are …

Privacy-preserving offloading scheme in multi-access mobile edge computing based on MADRL

G Wu, X Chen, Z Gao, H Zhang, S Yu, S Shen - Journal of Parallel and …, 2024 - Elsevier
With the development of industrialization and intelligence, the Industrial Internet of Things
(IIoT) has gradually become the direction for traditional industries to transform into modern …

A survey of iot privacy security: Architecture, technology, challenges, and trends

P Sun, S Shen, Y Wan, Z Wu, Z Fang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is used in homes and hospitals and deployed outdoors to control
and report environmental changes, prevent fires, and perform many more beneficial …

Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks

S Shen, C Cai, Z Li, Y Shen, G Wu, S Yu - Applied Soft Computing, 2024 - Elsevier
How to process and classify zero-day attacks due to their huge damage to social Internet of
Things (SIoT) systems has become a hot research issue. To solve this issue, we propose a …

Enhanced Harris hawks optimization-based fuzzy k-nearest neighbor algorithm for diagnosis of Alzheimer's disease

Q Zhang, J Sheng, Q Zhang, L Wang, Z Yang… - Computers in Biology …, 2023 - Elsevier
In order to stop deterioration and give patients with Alzheimer's disease (AD) early therapy, it
is crucial to correctly diagnose AD and its early stage, mild cognitive impairment (MCI). A …

An effective method for the protection of user health topic privacy for health information services

Z Wu, H Liu, J Xie, G Xu, G Li, C Lu - World Wide Web, 2023 - Springer
With the rapid development of emerging network technologies such as cloud computing, the
background server-side of public health information services is widely deployed on the …

Combining lyapunov optimization with actor-critic networks for privacy-aware IIoT computation offloading

G Wu, X Chen, Y Shen, Z Xu, H Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Opportunistic computation offloading is an effective way to improve the computing
performance of Industrial Internet of Things (IIoT) devices. However, as more and more …

Deep q-network-based open-set intrusion detection solution for industrial internet of things

S Yu, R Zhai, Y Shen, G Wu, H Zhang… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) has brought a lot of convenience for the industrial world to
digitization, automation, and intelligence, but it inevitably introduces inherent cyber security …

Hybrid control for malware propagation in rechargeable wusn and wasn: From knowledge-driven to data-driven

Y Yang, G Liu, Z Liang, H Chen, L Zhu… - Chaos, Solitons & Fractals, 2023 - Elsevier
Rechargeable wireless underground sensor network (WUSN) and wireless aboveground
sensor network (WASN) provide information transfer services for acquiring aboveground …