A Novel Game Machine Learning Method for Calculating Optimal Response for Edge Server

[1]  Wei Zhou,et al.  HuAc: Human Activity Recognition Using Crowdsourced WiFi Signals and Skeleton Data , 2018, Wirel. Commun. Mob. Comput..

[2]  Parvez Faruki,et al.  Network Intrusion Detection for IoT Security Based on Learning Techniques , 2019, IEEE Communications Surveys & Tutorials.

[3]  Quanyan Zhu,et al.  A Dynamic Games Approach to Proactive Defense Strategies against Advanced Persistent Threats in Cyber-Physical Systems , 2019, Comput. Secur..

[4]  Victor I. Chang,et al.  Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system , 2018, Inf. Sci..

[5]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[6]  Lei Yang,et al.  Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC , 2018, Wirel. Commun. Mob. Comput..

[7]  Hamid Haj Seyyed Javadi,et al.  Key-management scheme for wireless sensor networks based on merging blocks of symmetric design , 2018, Wirel. Networks.

[8]  Nir Bitansky,et al.  From Cryptomania to Obfustopia Through Secret-Key Functional Encryption , 2019, Journal of Cryptology.

[9]  Akbar Siami Namin,et al.  A Survey on the Moving Target Defense Strategies: An Architectural Perspective , 2019, Journal of Computer Science and Technology.

[10]  Man Ho Au,et al.  Towards leakage-resilient fine-grained access control in fog computing , 2018, Future Gener. Comput. Syst..