Tensor-based Lyapunov deep neural networks offloading control strategy with cloud-fog-edge orchestration

Y Chen, LT Yang, Z Cui - IEEE Transactions on Industrial …, 2023 - ieeexplore.ieee.org
Using DNN (Deep Neural Networks) models to obtain high Quality of Services (QoS)
through the cloud has become increasingly popular nowadays. Users want to use DNN by …

Adversarial attacks for image segmentation on multiple lightweight models

X Kang, B Song, X Du, M Guizani - IEEE Access, 2020 - ieeexplore.ieee.org
Due to the powerful ability of data fitting, deep neural networks have been applied in a wide
range of applications in many key areas. However, in recent years, it was found that some …

Stackelberg game-based pricing and offloading in mobile edge computing

M Tao, K Ota, M Dong, H Yuan - IEEE Wireless …, 2021 - ieeexplore.ieee.org
Owing to the limited computing resources at the MEC server, reasonable strategies of
resources pricing and task offloading are necessary to be designed. In this letter, a scenario …

A survey of game theory as applied to social networks

X Song, W Jiang, X Liu, H Lu, Z Tian… - Tsinghua Science and …, 2020 - ieeexplore.ieee.org
Social network services can not only help people form relationships and make new friends
and partners, but also assist in processing personal information, sharing knowledge, and …

CEPS: a cross-blockchain based electronic health records privacy-preserving scheme

S Cao, J Wang, X Du, X Zhang… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
The Electronic Health Record (EHR) has been widely used in cloud-based medical data
platforms. Since the owner of the EHR is a patient and the manager is a doctor (or hospital) …

GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot

KS Gill, S Saxena, A Sharma - Computers & Security, 2020 - Elsevier
Cloud Computing has been adopted by many leading organizations for storage, processing,
sharing and to provide other services. It faces several security challenges from its …

Inverse reinforcement learning: a new framework to mitigate an Intelligent Backoff Attack

J Parras, A Almodóvar, PA Apellániz… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The recent advances in Deep Learning have a significant impact on the security of wireless
networks, such as intelligent attackers which are able to successfully exploit a possibly …

A blockchain-based conditional privacy-preserving traffic data sharing in cloud

J Liu, G Zhang, R Sun, X Du… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
As a typical application scenarios of Internet of Things (IoT), Internet of Vehicles (IoV) is
playing an important role in the field of intelligent transportation. In such a system, vehicles …

SNIRD: Disclosing rules of malware spread in heterogeneous wireless sensor networks

S Shen, H Zhou, S Feng, J Liu, Q Cao - IEEE Access, 2019 - ieeexplore.ieee.org
Heterogeneous wireless sensor networks (WSNs) are widely deployed, owing to their good
capabilities in terms of network stability, dependability, and survivability. However, they are …

Deepnoise: Learning sensor and process noise to detect data integrity attacks in CPS

Y Luo, L Cheng, Y Liang, J Fu… - China Communications, 2021 - ieeexplore.ieee.org
Cyber-physical systems (CPS) have been widely deployed in critical infrastructures and are
vulnerable to various attacks. Data integrity attacks manipulate sensor measurements and …