Sixth‐Generation (6G) Mobile Cloud Security and Privacy Risks for AI System Using High‐Performance Computing Implementation

SR Gundu, P Charanarur… - Wireless …, 2022 - Wiley Online Library
The exchange of information from one person to another is called communication.
Telecommunication makes it possible with electronic devices and their tools. The scientist …

AI System Security and Privacy Risks in Sixth-Generation (6G) Mobile Cloud Using High-Performance Computing Implementation

C Thacker, AK Pandey - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
Communication refers to the process through which two people communicate data. With the
help of technological equipment and their instruments, telecommunications makes it …

Energy-saving routing algorithm for mobile blockchain Device-to-Device network in 5G edge computing environment

H Qiu, C Lv, D Zhou - AIIPCC 2022; The Third International …, 2022 - ieeexplore.ieee.org
The introduction of mobile edge computing technology enables mobile blockchain to solve
the problem of proof-ofwork task offloading and accelerates the development of mobile …

User trust and evaluation mechanism based on community classification calculation in opportunistic social networks

J Huang, F Gou, J Wu - Journal of Intelligent & Fuzzy Systems - content.iospress.com
With the development of Internet of Things technology, 5G communication has gradually
entered people's daily lives. The number of network users has also increased dramatically …

[PDF][PDF] Research Article Sixth-Generation (6G) Mobile Cloud Security and Privacy Risks for AI System Using High-Performance Computing Implementation

SR Gundu, P Charanarur, KK Chandelkar, D Samanta… - 2022 - academia.edu
The exchange of information from one person to another is called communication.
Telecommunication makes it possible with electronic devices and their tools. The scientist …