Security in Mobile Edge Caching with Reinforcement Learning
暂无分享,去创建一个
Xiang Chen | Mohsen Guizani | Xiaojiang Du | Liang Xiao | Xiaoyue Wan | Canhuang Dai | M. Guizani | Xiaojiang Du | Liang Xiao | Xiang Chen | Xiaoyue Wan | Canhuang Dai
[1] Tao Zhang,et al. Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.
[2] Liang Xiao,et al. Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.
[3] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[4] H. Vincent Poor,et al. Two-dimensional anti-jamming communication based on deep reinforcement learning , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[5] H. Vincent Poor,et al. Mobile offloading game against smart attacks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[6] Cataldo Basile,et al. Virtualized security at the network edge: a user-centric approach , 2015, IEEE Communications Magazine.
[7] Sudharman K. Jayaweera,et al. Multi-Agent Reinforcement Learning Based Cognitive Anti-Jamming , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[8] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[9] Liang Xiao,et al. User-centric view of smart attacks in wireless networks , 2016, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB).
[10] Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[11] K. B. Letaief,et al. A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.
[12] H. T. Kung,et al. Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learning , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[13] Zhu Han,et al. Machine Learning Paradigms for Next-Generation Wireless Networks , 2017, IEEE Wireless Communications.
[14] K. J. Ray Liu,et al. Anti-Jamming Games in Multi-Channel Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.
[15] Peng Ning,et al. Improving learning and adaptation in security games by exploiting information asymmetry , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[16] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[17] Nirwan Ansari,et al. EdgeIoT: Mobile Edge Computing for the Internet of Things , 2016, IEEE Communications Magazine.