An active and verifiable trust evaluation approach for edge computing
暂无分享,去创建一个
Jinhuan Zhang | Wen Mo | Shaobo Zhang | Tian Wang | Shaobo Zhang | Tian Wang | Wen Mo | Jinhuan Zhang
[1] Jiguo Yu,et al. An Invocation Cost Optimization Method for Web Services in Cloud Environment , 2017, Sci. Program..
[2] Anfeng Liu,et al. Energy Efficient Mode Selection, Base Station Selection and Resource Allocation Algorithm in D2D Heterogeneous Networks , 2020, Peer-to-Peer Netw. Appl..
[3] Song Guo,et al. Resource Management at the Network Edge: A Deep Reinforcement Learning Approach , 2019, IEEE Network.
[4] Anfeng Liu,et al. Bidirectional Prediction-Based Underwater Data Collection Protocol for End-Edge-Cloud Orchestrated System , 2020, IEEE Transactions on Industrial Informatics.
[5] Ming Zhao,et al. A high‐accurate content popularity prediction computational modeling for mobile edge computing using matrix completion technology , 2020, Trans. Emerg. Telecommun. Technol..
[6] Shigeng Zhang,et al. A Cloud–MEC Collaborative Task Offloading Scheme With Service Orchestration , 2020, IEEE Internet of Things Journal.
[7] Guojun Wang,et al. Enabling Verifiable and Dynamic Ranked Search over Outsourced Data , 2019, IEEE Transactions on Services Computing.
[8] Yi Pan,et al. Reconstruction of Hidden Representation for Robust Feature Extraction , 2017, ACM Trans. Intell. Syst. Technol..
[9] Zhongming Zheng,et al. Energy and Memory Efficient Clone Detection in Wireless Sensor Networks , 2016, IEEE Transactions on Mobile Computing.
[10] Sudip Misra,et al. Assessment of the Suitability of Fog Computing in the Context of Internet of Things , 2018, IEEE Transactions on Cloud Computing.
[11] Athanasios V. Vasilakos,et al. An effective service-oriented networking management architecture for 5G-enabled internet of things , 2020, Comput. Networks.
[12] Kaoru Ota,et al. Vehicles joint UAVs to acquire and analyze data for topology discovery in large-scale IoT systems , 2020, Peer-to-Peer Netw. Appl..
[13] Zhiguo Shi,et al. Noise-Aware DVFS for Efficient Transitions on Battery-Powered IoT Devices , 2020, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[14] Bo Yu,et al. CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..
[15] Paolo Montuschi,et al. Building Trust in Autonomous Vehicles: Role of Virtual Reality Driving Simulators in HMI Design , 2019, IEEE Transactions on Vehicular Technology.
[16] Sherali Zeadally,et al. Fog Computing for 5G Tactile Industrial Internet of Things: QoE-Aware Resource Allocation Model , 2019, IEEE Transactions on Industrial Informatics.
[17] Jon W. Mark,et al. Performance Analysis and Enhancement of the DSRC for VANET's Safety Applications , 2013, IEEE Trans. Veh. Technol..
[18] Ye Wang,et al. Towards minimum code dissemination delay through UAV joint vehicles for smart city , 2020, IET Commun..
[19] Arun Kumar Sangaiah,et al. Edge-Computing-Based Trustworthy Data Collection Model in the Internet of Things , 2020, IEEE Internet of Things Journal.
[20] Tao Wang,et al. QoE-ensured price competition model for emerging mobile networks , 2015, IEEE Wireless Communications.
[21] Zhongming Zheng,et al. Secure and Energy-Efficient Disjoint Multipath Routing for WSNs , 2012, IEEE Transactions on Vehicular Technology.
[22] Tie Qiu,et al. Swarm-Intelligence-Based Rendezvous Selection via Edge Computing for Mobile Sensor Networks , 2020, IEEE Internet of Things Journal.
[23] Wei Liu,et al. Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things , 2020, Trans. Emerg. Telecommun. Technol..
[24] Wei Liu,et al. An adaptive retransmit mechanism for delay differentiated services in industrial WSNs , 2019, EURASIP J. Wirel. Commun. Netw..
[25] Jinjun Chen,et al. A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment , 2018, Future Gener. Comput. Syst..
[26] Hossam S. Hassanein,et al. Reputation-Aware, Trajectory-Based Recruitment of Smart Vehicles for Public Sensing , 2018, IEEE Transactions on Intelligent Transportation Systems.
[27] Xuyun Zhang,et al. A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems , 2019, World Wide Web.
[28] Zhiwen Zeng,et al. Relay Selection Joint Consecutive Packet Routing Scheme to Improve Performance for Wake-Up Radio-Enabled WSNs , 2020, Wirel. Commun. Mob. Comput..
[29] Jiannong Cao,et al. On-Line Anomaly Detection With High Accuracy , 2018, IEEE/ACM Transactions on Networking.
[30] Zhiliang Zhu,et al. Detecting Confident Information Coverage Holes in Industrial Internet of Things: An Energy-Efficient Perspective , 2018, IEEE Communications Magazine.
[31] Xiaoyu Zhu,et al. Data Collection Through Mobile Vehicles in Edge Network of Smart City , 2019, IEEE Access.
[32] Fang Liu,et al. A Trust Computing-based Security Routing Scheme for Cyber Physical Systems , 2019, ACM Trans. Intell. Syst. Technol..
[33] Laurence T. Yang,et al. Data fusion based coverage optimization in heterogeneous sensor networks: A survey , 2019, Inf. Fusion.
[34] Xiaolong Li,et al. Privacy-Enhanced Data Collection Based on Deep Learning for Internet of Vehicles , 2020, IEEE Transactions on Industrial Informatics.
[35] Xuyun Zhang,et al. A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data , 2017, IEEE Journal on Selected Areas in Communications.
[36] Anfeng Liu,et al. An Intelligent Edge-Computing-Based Method to Counter Coupling Problems in Cyber-Physical Systems , 2020, IEEE Network.
[37] Xiaohui Liang,et al. BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[38] Arun Kumar Sangaiah,et al. Mobility Based Trust Evaluation for Heterogeneous Electric Vehicles Network in Smart Cities , 2021, IEEE Transactions on Intelligent Transportation Systems.
[39] Mohsen Guizani,et al. An Efficient Distributed Trust Model for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[40] Tao Peng,et al. Intelligent route planning on large road networks with efficiency and privacy , 2019, J. Parallel Distributed Comput..
[41] Gabriel Maciá-Fernández,et al. A model of data forwarding in MANETs for lightweight detection of malicious packet dropping , 2015, Comput. Networks.
[42] Bo Jiang,et al. Trust based energy efficient data collection with unmanned aerial vehicle in edge network , 2020, Trans. Emerg. Telecommun. Technol..
[43] Jiangtao Wang,et al. HyTasker: Hybrid Task Allocation in Mobile Crowd Sensing , 2018, IEEE Transactions on Mobile Computing.
[44] Xuemin Shen,et al. Synergy of Big Data and 5G Wireless Networks: Opportunities, Approaches, and Challenges , 2018, IEEE Wireless Communications.
[45] Wenbing Zhao,et al. Performance optimization for state machine replication based on application semantics: A review , 2016, J. Syst. Softw..
[46] Hong-Ning Dai,et al. Blockchain-based data privacy management with Nudge theory in open banking , 2020, Future Gener. Comput. Syst..
[47] Anfeng Liu,et al. A Unified Trustworthy Environment Establishment Based on Edge Computing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.
[48] Jiannong Cao,et al. Recover Corrupted Data in Sensor Networks: A Matrix Completion Solution , 2017, IEEE Transactions on Mobile Computing.
[49] Takahiro Hara,et al. A proposed security scheme against Denial of Service attacks in cluster-based wireless sensor networks , 2014, Secur. Commun. Networks.
[50] Ting Li,et al. Machine learning based code dissemination by selection of reliability mobile vehicles in 5G networks , 2020, Comput. Commun..
[51] Hilde van der Togt,et al. Publisher's Note , 2003, J. Netw. Comput. Appl..
[52] G. Bianchi,et al. Opportunistic communication in smart city: Experimental insight with small-scale taxi fleets as data carriers , 2016, Ad Hoc Networks.
[53] Zhiwen Zeng,et al. An AUV-Assisted Data Gathering Scheme Based on Clustering and Matrix Completion for Smart Ocean , 2020, IEEE Internet of Things Journal.
[54] Mianxiong Dong,et al. Intelligent resource allocation management for vehicles network: An A3C learning approach , 2020, Comput. Commun..
[55] Zhiwen Zeng,et al. A trust-based minimum cost and quality aware data collection scheme in P2P network , 2020, Peer-to-Peer Netw. Appl..
[56] Anfeng Liu,et al. Objective-Variable Tour Planning for Mobile Data Collection in Partitioned Sensor Networks , 2022, IEEE Transactions on Mobile Computing.
[57] Mianxiong Dong,et al. ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.