Online trajectory and resource optimization for stochastic UAV-enabled MEC systems

Z Yang, S Bi, YJA Zhang - IEEE Transactions on Wireless …, 2022 - ieeexplore.ieee.org
The recent development of unmanned aerial vehicle (UAV) and mobile edge computing
(MEC) technologies provides flexible and resilient computation services to mobile users out …

Combining federated learning and edge computing toward ubiquitous intelligence in 6G network: Challenges, recent advances, and future directions

Q Duan, J Huang, S Hu, R Deng… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Full leverage of the huge volume of data generated on a large number of user devices for
providing intelligent services in the 6G network calls for Ubiquitous Intelligence (UI). A key to …

[HTML][HTML] Applications of artificial intelligence, machine learning, big data and the internet of things to the COVID-19 pandemic: A scientometric review using text mining

I Rodriguez-Rodriguez, JV Rodriguez… - International Journal of …, 2021 - mdpi.com
The COVID-19 pandemic has wreaked havoc in every country in the world, with serious
health-related, economic, and social consequences. Since its outbreak in March 2020, many …

Verticals in 5G MEC-use cases and security challenges

TW Nowak, M Sepczuk, Z Kotulski, W Niewolski… - IEEE …, 2021 - ieeexplore.ieee.org
5G is the fifth-generation cellular network satisfying the requirements IMT-2020
(International Mobile Telecommunications-2020) of the International Telecommunication …

Optimization of task scheduling and dynamic service strategy for multi-UAV-enabled mobile-edge computing system

Y Luo, W Ding, B Zhang - IEEE Transactions on Cognitive …, 2021 - ieeexplore.ieee.org
In this study, we introduce a multi-unmanned aerial vehicle (multi-UAV) enabled mobile
edge computing (MEC) system, with UAVs as the computing server for the task offloading of …

Non-orthogonal multiple access assisted secure computation offloading via cooperative jamming

Y Wu, G Ji, T Wang, L Qian, B Lin… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we investigate non-orthogonal multiple access (NOMA) assisted secure
computation offloading under the eavesdropping-attack, in which a malicious node …

A review on computational intelligence techniques in cloud and edge computing

M Asim, Y Wang, K Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cloud computing (CC) is a centralized computing paradigm that accumulates resources
centrally and provides these resources to users through Internet. Although CC holds a large …

Computation offloading for vehicular environments: A survey

AB De Souza, PAL Rego, T Carneiro… - IEEE …, 2020 - ieeexplore.ieee.org
With significant advances in communication and computing, modern day vehicles are
becoming increasingly intelligent. This gives them the ability to contribute to safer roads and …

Sum-rate maximization for UAV-assisted visible light communications using NOMA: Swarm intelligence meets machine learning

QV Pham, T Huynh-The, M Alazab… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
As the integration of unmanned aerial vehicles (UAVs) into visible light communications
(VLCs) can offer many benefits for massive-connectivity applications and services in 5G and …

Incentive mechanism and resource allocation for edge-fog networks driven by multi-dimensional contract and game theories

M Diamanti, P Charatsaris… - IEEE Open Journal …, 2022 - ieeexplore.ieee.org
The edge computing paradigm has become extremely popular over the past years, as a
means of offloading computationally intensive tasks by users of resource and battery …