A comprehensive survey on edge data integrity verification: Fundamentals and future trends

Y Zhao, Y Qu, Y Xiang, MP Uddin, D Peng… - ACM Computing …, 2024 - dl.acm.org
Recent advances in edge computing (EC) have pushed cloud-based data caching services
to edge; however, such emerging edge storage comes with numerous challenging and …

A Survey on Data Markets

J Zhang, Y Bi, M Cheng, J Liu, K Ren, Q Sun… - arXiv preprint arXiv …, 2024 - arxiv.org
Data is the new oil of the 21st century. The growing trend of trading data for greater welfare
has led to the emergence of data markets. A data market is any mechanism whereby the …

Lmaas: Exploring pricing strategy of large model as a service for communication

P Wu, Q Liu, Y Dong, Z Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
One of the most important features of next-generation communication is to incorporate
intelligence towards semantic communication, where highly condensed semantic …

Game Theoretical Incentive for USV Fleet-Assisted Data Sharing in Maritime Communication Networks

H Zeng, Z Su, Q Xu, K Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the rapid proliferations of maritime applications, the data demands of unmanned
surface vehicles (USVs) keep ever-increasing. However, due to limitations of resources (eg …

Privacy-preserved data trading via verifiable data disturbance

M Zhang, X Li, Y Ren, B Luo, Y Miao… - … on Dependable and …, 2023 - ieeexplore.ieee.org
To motivate data owner (DO) to trade data, the existing data trading allows DO to sell the
disturbed data to the data consumer (DC), where the disturbance parameter and the data …

UAV-enhanced service caching for IoT systems in extreme environments

H Yan, H Li, X Xu, M Bilal - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The proliferation of Internet of Things (IoT) applications and real-time services brings severe
performance pressure on IoT systems with cloud computing, so edge computing is …

Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading

M Zhang, X Li, Y Miao, B Luo, W Xu… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The advanced data trading allows data generator's (DG) disturbed data to be traded as both
initial and reselling trading modes, which meets DG's raw data privacy and data …

An intention-driven task offloading strategy based on imitation learning in pervasive edge computing

Y Zhang, S Zhang, Q Zhang, J Fan - Computer Networks, 2024 - Elsevier
Consider an infrastructure-less wireless network environment (eg, a land battlefield) in
which devices are characterized by varying resource configurations, dynamic mobility …

Economical behavior modeling and analyses for data collection in edge Internet of Things networks

Y Zeng, P Zhou, C Wang, J Liu, Y Yang - ACM Transactions on Sensor …, 2022 - dl.acm.org
Internet of Things (IoT) is progressively becoming an essential aspect of daily life that can be
sensed anywhere and anytime, transforming the traditional lifestyle into a high-tech one …

BTDA: Two-factor dynamic identity authentication scheme for data trading based on alliance chain

F Chen, B Zhao, Y Gao, W Zhang - The Journal of Supercomputing, 2023 - Springer
With the increase in the market share of data trading, the risks such as identity authentication
and authority management are increasingly intensified. Aiming at the problems of …