Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems

S Shen, X Wu, P Sun, H Zhou, Z Wu, S Yu - Expert Systems with …, 2023 - Elsevier
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends
requests to gather private data from an edge-computing-based IoT cloud storage system …

[HTML][HTML] Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes

Y Shen, S Shen, Q Li, H Zhou, Z Wu, Y Qu - Digital Communications and …, 2023 - Elsevier
The fast proliferation of edge devices for the Internet of Things (IoT) has led to massive
volumes of data explosion. The generated data is collected and shared using edge-based …

An approach of flow compensation incentive based on Q-learning strategy for IoT user privacy protection

L Chen, D Zhang, J Zhang, T Zhang, J Du… - AEU-International Journal …, 2022 - Elsevier
In MCS (mobile crowd sensing), reducing network overhead, protecting IoT user privacy and
increasing the participation enthusiasm of perception task are key issues. The QLPPIA (an …

A security-and privacy-preserving approach based on data disturbance for collaborative edge computing in social IoT systems

P Zhang, Y Wang, N Kumar, C Jiang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Internet of things (IoT) has certainly become one of the hottest technology frameworks of
the year. It is deep in many industries, affecting people's lives in all directions. The rapid …

Multistage signaling game-based optimal detection strategies for suppressing malware diffusion in fog-cloud-based IoT networks

S Shen, L Huang, H Zhou, S Yu… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
We consider the Internet of Things (IoT) with malware diffusion and seek optimal malware
detection strategies for preserving the privacy of smart objects in IoT networks and …

Resource allocation in IoT edge computing via concurrent federated reinforcement learning

Z Tianqing, W Zhou, D Ye, Z Cheng… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Resource allocation is a fundamental research issue in IoT edge computing, and
reinforcement learning is fast becoming a common solution. The majority of the current …

Distributed data privacy preservation in IoT applications

J Du, C Jiang, E Gelenbe, L Xu, J Li… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
Recently, the Internet of Things (IoT) has penetrated many aspects of the physical world to
realize different applications. Through IoT, these applications generate, exchange …

Deep Learning‐Based Privacy‐Preserving Data Transmission Scheme for Clustered IIoT Environment

K Lakshmanna, R Kavitha, BT Geetha… - Computational …, 2022 - Wiley Online Library
The Industrial Internet of Things (IIoT) has received significant attention from several leading
industries like agriculture, mining, transport, energy, and healthcare. IIoT acts as a vital part …

SecOFF-FCIoT: Machine learning based secure offloading in Fog-Cloud of things for smart city applications

AA Alli, MM Alam - Internet of Things, 2019 - Elsevier
Computation offloading is one of the important application in Internet of Things (IoT)
ecosystem. Computational offloading provides assisted means of processing large amounts …

Combining lyapunov optimization with actor-critic networks for privacy-aware IIoT computation offloading

G Wu, X Chen, Y Shen, Z Xu, H Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Opportunistic computation offloading is an effective way to improve the computing
performance of Industrial Internet of Things (IIoT) devices. However, as more and more …