Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning
暂无分享,去创建一个
Hui Xia | Xiangguo Cheng | Chao Liu | Ruobing Jiang | Rui Zhang | Xiangguo Cheng | Rui Zhang | Ruobing Jiang | Hui Xia | Chao Liu
[1] Jiguo Yu,et al. Multi-Armed-Bandit-Based Spectrum Scheduling Algorithms in Wireless Networks: A Survey , 2020, IEEE Wireless Communications.
[2] Mikael Rönnqvist,et al. Coalition formation in collaborative production and transportation with competing firms , 2021, Eur. J. Oper. Res..
[3] Tie Qiu,et al. Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas , 2020, IEEE/ACM Transactions on Networking.
[4] Theodoros Tsiligkaridis,et al. Information Aware max-norm Dirichlet networks for predictive uncertainty estimation , 2019, Neural Networks.
[5] Dongsu Han,et al. A Secure Middlebox Framework for Enabling Visibility Over Multiple Encryption Protocols , 2020, IEEE/ACM Transactions on Networking.
[6] Jiguo Yu,et al. Faster Parallel Core Maintenance Algorithms in Dynamic Graphs , 2020, IEEE Transactions on Parallel and Distributed Systems.
[7] Dong Dong,et al. Evaluation of the intelligent logistics eco-index: Evidence from China , 2020 .
[8] Shiva Raj Pokhrel,et al. Adaptive Admission Control for IoT Applications in Home WiFi Networks , 2020, IEEE Transactions on Mobile Computing.
[9] Xiangjian He,et al. Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[10] Miao Pan,et al. Data-Driven Spectrum Trading with Secondary Users’ Differential Privacy Preservation , 2019, IEEE Transactions on Dependable and Secure Computing.
[11] Ximeng Liu,et al. Person Re-Identification over Encrypted Outsourced Surveillance Videos , 2019, IEEE Transactions on Dependable and Secure Computing.
[12] Feng Li,et al. Privacy-Preserving Collaborative Learning for Multiarmed Bandits in IoT , 2021, IEEE Internet of Things Journal.
[13] Wouter Joosen,et al. Predicting Vulnerable Software Components via Text Mining , 2014, IEEE Transactions on Software Engineering.
[14] Bernardo Henz,et al. Synthesizing Camera Noise Using Generative Adversarial Networks , 2020, IEEE Transactions on Visualization and Computer Graphics.
[15] Ximeng Liu,et al. Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud , 2021, IEEE Transactions on Dependable and Secure Computing.
[16] Feng Li,et al. Distributed learning dynamics of Multi-Armed Bandits for edge intelligence , 2020, J. Syst. Archit..
[17] Junhu Ruan,et al. Fertigation management for sustainable precision agriculture based on Internet of Things , 2020 .
[18] Mojtaba Alizadeh,et al. Authentication in mobile cloud computing: A survey , 2016, J. Netw. Comput. Appl..
[19] Yi Liang,et al. Deep Learning Based Inference of Private Information Using Embedded Sensors in Smart Devices , 2018, IEEE Network.
[20] Xiaoyu Ruan,et al. Platform Embedded Security Technology Revealed , 2014, Apress.
[21] Hamid Reza Shahriari,et al. Neural software vulnerability analysis using rich intermediate graph representations of programs , 2021, Inf. Sci..
[22] Qun Li,et al. Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.
[23] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[24] Qi Li,et al. Operation Optimization and Control Method Based on Optimal Energy and Hydrogen Consumption for the Fuel Cell/Supercapacitor Hybrid Tram , 2021, IEEE Transactions on Industrial Electronics.
[25] Zhipeng Cai,et al. Task Scheduling in Deadline-Aware Mobile Edge Computing Systems , 2019, IEEE Internet of Things Journal.
[26] Xingyu Fu,et al. Robust Log-Optimal Strategy with Reinforcement Learning , 2018 .
[27] Zhipeng Cai,et al. Privacy-Preserved Data Sharing Towards Multiple Parties in Industrial IoTs , 2020, IEEE Journal on Selected Areas in Communications.
[28] Yingshu Li,et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[29] Tuo Shi,et al. Distributed Query Processing in the Edge-Assisted IoT Data Monitoring System , 2021, IEEE Internet of Things Journal.
[30] Chunqiang Hu,et al. Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.