Articles with "secure mobile" as a keyword



Photo by jordanharrison from unsplash

Secure mobile crowdsensing based on deep learning

Sign Up to like & get
recommendations!
Published in 2018 at "China Communications"

DOI: 10.1109/cc.2018.8485464

Abstract: To improve the quality of multimedia services and stimulate secure sensing in Internet of Things applications, such as healthcare and traffic monitoring, mobile crowdsensing (MCS) systems must address security threats such as jamming, spoofing and… read more here.

Keywords: deep learning; secure mobile; mobile crowdsensing; crowdsensing based ... See more keywords
Photo by davidvives from unsplash

Offloading Optimization for Low-Latency Secure Mobile Edge Computing Systems

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2019.2959579

Abstract: This letter proposes a low-latency secure mobile edge computing (MEC) system where multiple users offload computing tasks to a base station in the presence of an eavesdropper. We jointly optimize the users’ transmit power, computing… read more here.

Keywords: low latency; secure mobile; edge computing; mobile edge ... See more keywords
Photo by davidvives from unsplash

Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2021.3119075

Abstract: In this paper, we investigate a secure mobile edge computing (MEC) network in the presence of multiple eavesdroppers, where multiple users can offload parts of their tasks to the computational access point (CAP). The multiple… read more here.

Keywords: mobile edge; secure mobile; presence multiple; edge computing ... See more keywords