Physical-Layer Assisted Privacy-Preserving Offloading in Mobile-Edge Computing
暂无分享,去创建一个
Richeng Jin | Xiaofan He | Huaiyu Dai | H. Dai | Richeng Jin | Xiaofan He
[1] Richeng Jin,et al. Privacy-Aware Offloading in Mobile-Edge Computing , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[2] Wei Yu,et al. Fractional Programming for Communication Systems—Part I: Power Control and Beamforming , 2018, IEEE Transactions on Signal Processing.
[3] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[4] Derrick Wing Kwan Ng,et al. Robust Beamforming for Secure Communication in Systems With Wireless Information and Power Transfer , 2013, IEEE Transactions on Wireless Communications.
[5] Taneli Riihonen,et al. Mitigation of Loopback Self-Interference in Full-Duplex MIMO Relays , 2011, IEEE Transactions on Signal Processing.
[6] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[7] Le Thi Hoai An,et al. The DC (Difference of Convex Functions) Programming and DCA Revisited with DC Models of Real World Nonconvex Optimization Problems , 2005, Ann. Oper. Res..
[8] Stephen P. Boyd,et al. Variations and extension of the convex–concave procedure , 2016 .
[9] Ting He,et al. Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach , 2017, IEEE Journal on Selected Areas in Communications.
[10] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[11] Jie Xu,et al. Exploiting Physical-Layer Security for Multiuser Multicarrier Computation Offloading , 2018, IEEE Wireless Communications Letters.
[12] Björn E. Ottersten,et al. Improving Physical Layer Secrecy Using Full-Duplex Jamming Receivers , 2013, IEEE Transactions on Signal Processing.
[13] Matthieu R. Bloch,et al. Wireless Secrecy Regions With Friendly Jamming , 2011, IEEE Transactions on Information Forensics and Security.
[14] Khaled Ben Letaief,et al. Delay-optimal computation task scheduling for mobile-edge computing systems , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[15] Kaibin Huang,et al. Energy-Efficient Resource Allocation for Mobile-Edge Computation Offloading , 2016, IEEE Transactions on Wireless Communications.
[16] Bing Chen,et al. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.
[17] Richeng Jin,et al. Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT , 2019, IEEE Internet of Things Journal.
[18] Ruoheng Liu,et al. Securing Wireless Communications at the Physical Layer , 2014 .
[19] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[20] Lifeng Wang,et al. Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.
[21] Qun Li,et al. Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.
[22] Kalyanmoy Deb,et al. A Review on Bilevel Optimization: From Classical to Evolutionary Approaches and Applications , 2017, IEEE Transactions on Evolutionary Computation.
[23] Zhiguo Ding,et al. Secrecy Performance of Untrusted Relay Systems With a Full-Duplex Jamming Destination , 2018, IEEE Transactions on Vehicular Technology.
[24] Björn E. Ottersten,et al. Robust Cognitive Beamforming With Bounded Channel Uncertainties , 2009, IEEE Transactions on Signal Processing.
[25] Kai-Kit Wong,et al. Robust Masked Beamforming for MISO Cognitive Radio Networks With Unknown Eavesdroppers , 2016, IEEE Transactions on Vehicular Technology.