Semi-distributed resource management in UAV-aided MEC systems: A multi-agent federated reinforcement learning approach

Y Nie, J Zhao, F Gao, FR Yu - IEEE Transactions on Vehicular …, 2021 - ieeexplore.ieee.org
Recently, unmanned aerial vehicle (UAV)-enabled multi-access edge computing (MEC) has
been introduced as a promising edge paradigm for the future space-aerial-terrestrial …

Differential privacy in cognitive radio networks: a comprehensive survey

M Ul Hassan, MH Rehmani, M Rehan, J Chen - Cognitive Computation, 2022 - Springer
Integrating cognitive radio (CR) with traditional wireless networks is helping solve the
problem of spectrum scarcity in an efficient manner. The opportunistic and dynamic …

Energy-efficient proactive caching for adaptive video streaming via data-driven optimization

L Li, D Shi, R Hou, R Chen, B Lin… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Proactive caching in mobile-edge computing (MEC) networks is promising to handle the
ever-increasing demand for wireless video services, and transcoding at MEC servers further …

Data-driven transportation network company vehicle scheduling with users' location differential privacy preservation

X Zhang, J Wang, H Zhang, L Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the popularity of mobile devices with global positioning system (GPS), transportation
network company (TNC) service has become an indispensable option of people's daily …

Federated and online dynamic spectrum access for mobile secondary users

X Dong, Z You, X Liu, Y Guo, Y Shen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Users in dynamic spectrum access (DSA) with federated reinforcement learning (FRL)
autonomously access channels, avoiding centralized coordination and protecting users' …

Multi-access filtering for privacy-preserving fog computing

K Gai, L Zhu, M Qiu, K Xu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The interest in fog computing is growing, including in traditionally conservative and sensitive
areas such as military and governments. This is partly driven by the interconnectivity of our …

Data-driven caching with users' content preference privacy in information-centric networks

X Zhang, H Li, J Wang, Y Guo, Q Pei… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Information-centric networking (ICN) as an emerging networking paradigm has recently
gained significant attention, due to the improvement of content delivery efficiency. The built …

Joint Distribution Analysis for Set-Valued Data with Local Differential Privacy

Y Huang, K Xue, B Zhu, DSL Wei… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Set-valued data are commonly used to represent subsets of a universal set and are
frequently utilized in online services, such as online shopping preferences, website …

A stochastic spectrum trading and resource allocation framework for opportunistic dynamic spectrum access networks

M Abdelraheem, MM Abdellatif - IEEE Access, 2022 - ieeexplore.ieee.org
In this article, the spectrum trading problem between primary users and secondary networks
is investigated. The secondary network requests multiple channels with the targeted …

Covid-19 vulnerability map construction via location privacy preserving mobile crowdsourcing

R Chen, L Li, JJ Chen, R Hou, Y Gong… - … 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
The pandemic of the coronavirus (COVID-19) has caused an unprecedented global public
health crisis, and most countries in the world are running out of the healthcare resources. A …