Two-stage evolutionary search for efficient task offloading in edge computing power networks

Q Chen, C Yang, S Lan, L Zhu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
In this article, we introduce the concept of edge computing power network (EdgeCPN) as a
new paradigm to facilitate elastic integration and flexible scheduling of computing resources …

Towards Efficient and Robust Federated Unlearning in IoT Networks

Y Yuan, BB Wang, C Zhang, Z Xiong… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Owing to its practical configuration to edge computing and privacy preservation capabilities,
federated learning (FL) has been increasingly appealing in Internet of Things (IoT) networks …

Deep reinforcement learning-based computation offloading for mobile edge computing in 6G

H Sun, J Wang, D Yong, M Qin… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The impending 6G network is envisioned to seamlessly interconnect a myriad of consumer
electronics (CEs), facilitating a wide array of applications accessible from any location and at …

LsiA3CS: Deep Reinforcement Learning-Based Cloud-Edge Collaborative Task Scheduling in Large-Scale IIoT

Z Zhang, F Zhang, Z Xiong, K Zhang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Task scheduling in large-scale industrial Internet of Things (IIoT) is characterized by the
presence of diverse resources and the requirement for efficient and synchronized …

Online quality-based privacy-preserving task allocation in mobile crowdsensing

Z Chen, M Xu, C Su - Computer Networks, 2024 - Elsevier
Aimed at the existing problems, such as the improving requirements on privacy, and the low
quality of collected data in mobile crowd sensing, one online Quality-based Privacy …

[PDF][PDF] RPL-Based IoT Networks under Decreased Rank Attack: Performance Analysis in Static and Mobile Environments.

A Hkiri, M Karmani, OB Bahri, AM Murayr… - … Materials & Continua, 2024 - cdn.techscience.cn
ABSTRACT The RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) protocol is
essential for efficient communication within the Internet of Things (IoT) ecosystem. Despite …

Publicly verifiable and secure SVM classification for cloud-based health monitoring services

D Lei, J Liang, C Zhang, X Liu, D He… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
In cloud-based health monitoring services, healthcare centers often outsource support
vector machine (SVM)-based clinical decision models to provide remote users with clinical …

Privacy-preserving batch-based task assignment over spatial crowdsourcing platforms

Y Lin, Y Jiang, Y Li, Y Zhou - Computer Networks, 2024 - Elsevier
With the rapid development of mobile networks and the widespread use of mobile devices,
an increasing number of spatial crowdsourcing platforms have emerged. Task assignment is …

[HTML][HTML] FLARE: A Backdoor Attack to Federated Learning with Refined Evasion

Q Wang, Y Wu, H Xuan, H Wu - Mathematics, 2024 - mdpi.com
Federated Learning (FL) is vulnerable to backdoor attacks in which attackers inject
malicious behaviors into the global model. To counter these attacks, existing works mainly …

Joint AP Selection and Task Offloading Based on Deep Reinforcement Learning for Urban-Micro Cell-Free UAV Network

C Pan, J Wang, X Yue, L Guo, Z Yang - Electronics, 2023 - mdpi.com
The flexible mobility feature of unmanned aerial vehicles (UAVs) leads to frequent
handovers and serious inter-cell interference problems in UAV-assisted cellular networks …