DMRO: A deep meta reinforcement learning-based task offloading framework for edge-cloud computing

G Qu, H Wu, R Li, P Jiao - IEEE Transactions on Network and …, 2021 - ieeexplore.ieee.org
With the explosive growth of mobile data and the unprecedented demand for computing
power, resource-constrained edge devices cannot effectively meet the requirements of …

Collaborate edge and cloud computing with distributed deep learning for smart city internet of things

H Wu, Z Zhang, C Guan, K Wolter… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
City Internet-of-Things (IoT) applications are becoming increasingly complicated and thus
require large amounts of computational resources and strict latency requirements. Mobile …

Forecasting of forex time series data based on deep learning

L Ni, Y Li, X Wang, J Zhang, J Yu, C Qi - Procedia computer science, 2019 - Elsevier
This paper proposes a C-RNN forecasting method for Forex time series data based on deep-
Recurrent Neural Network (RNN) and deep Convolutional Neural Network (CNN), which …

wChain: A fast fault-tolerant blockchain protocol for multihop wireless networks

M Xu, C Liu, Y Zou, F Zhao, J Yu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper presents, a blockchain protocol specifically designed for multihop wireless
networks that deeply integrates wireless communication properties and blockchain …

Distributed consensus for blockchains in internet-of-things networks

L Yang, Y Zou, M Xu, Y Xu, D Yu… - Tsinghua Science and …, 2022 - ieeexplore.ieee.org
In recent years, due to the wide implementation of mobile agents, the Internet-of-Things (IoT)
networks have been applied in several real-life scenarios, servicing applications in the …

Implementing the abstract MAC layer in dynamic networks

D Yu, Y Zou, J Yu, Y Zhang, F Li… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Dynamicity is one of the most challenging, yet, key aspects of wireless networks. It can come
in many guises, such as churn (node insertion/deletion) and node mobility. Although the …

BLOWN: A blockchain protocol for single-hop wireless networks under adversarial SINR

M Xu, F Zhao, Y Zou, C Liu, X Cheng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Known as a distributed ledger technology (DLT), blockchain has attracted much attention
due to its properties such as decentralization, security, immutability and transparency, and …

Watchdog: Detecting ultrasonic-based inaudible voice attacks to smart home systems

J Mao, S Zhu, X Dai, Q Lin, J Liu - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things is a critical infrastructure component as well as an enabling technology to
support the fast-developing cross-region, cross-application, and diversified collaborative …

Distributed byzantine-resilient multiple-message dissemination in wireless networks

Y Zou, D Yu, J Yu, Y Zhang, F Dressler… - … /ACM Transactions on …, 2021 - ieeexplore.ieee.org
The byzantine model is widely used to depict a variety of node faults in networks. Previous
studies on byzantine-resilient protocols in wireless networks assume reliable …

Byzantine fault tolerant consensus in open wireless networks via an abstract mac layer

G Jing, Y Zou, Z Zhang, D Yu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The openness of wireless networks opens the door to Byzantine attacks on the physical
channels, making the communications unreliable and resulting in more challenges in …