Articles with "secure mobile" as a keyword



Photo by jordanharrison from unsplash

Secure mobile crowdsensing based on deep learning

Sign Up to like & get
recommendations!
Published in 2018 at "China Communications"

DOI: 10.1109/cc.2018.8485464

Abstract: To improve the quality of multimedia services and stimulate secure sensing in Internet of Things applications, such as healthcare and traffic monitoring, mobile crowdsensing (MCS) systems must address security threats such as jamming, spoofing and… read more here.

Keywords: deep learning; secure mobile; mobile crowdsensing; crowdsensing based ... See more keywords

Offloading Optimization for Low-Latency Secure Mobile Edge Computing Systems

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2019.2959579

Abstract: This letter proposes a low-latency secure mobile edge computing (MEC) system where multiple users offload computing tasks to a base station in the presence of an eavesdropper. We jointly optimize the users’ transmit power, computing… read more here.

Keywords: low latency; secure mobile; edge computing; mobile edge ... See more keywords

Aerial IRS-Enabled Secure Mobile Communications: Joint 3-D Trajectory and Beamforming Design

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2023.3338273

Abstract: This letter investigates a novel aerial intelligent reflecting surface (IRS)-assisted secure mobile communication system. In particular, the IRS is mounted on a unmanned aerial vehicle (UAV) to help a source transmit its confidential messages to… read more here.

Keywords: irs enabled; aerial irs; design; secure mobile ... See more keywords

Beamforming and Computing Capacity Allocation for ISAC-Assisted Secure Mobile Edge Computing

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Wireless Communications Letters"

DOI: 10.1109/lwc.2024.3463752

Abstract: This letter deals with the design of an integrated sensing and communication (ISAC)-assisted secure mobile edge computing (MEC) system, where latency-sensitive users offload partial tasks to edge servers near a full-duplex (FD) base station (BS)… read more here.

Keywords: assisted secure; isac assisted; edge computing; secure mobile ... See more keywords

Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2021.3119075

Abstract: In this paper, we investigate a secure mobile edge computing (MEC) network in the presence of multiple eavesdroppers, where multiple users can offload parts of their tasks to the computational access point (CAP). The multiple… read more here.

Keywords: mobile edge; secure mobile; presence multiple; edge computing ... See more keywords