Computer Science ›› 2023, Vol. 50 ›› Issue (8): 286-293.doi: 10.11896/jsjkx.230100082
• Information Security • Previous Articles Next Articles
WANG Biao1, WANG Da2, KE Ji1, MA Yuqing2, ZHANG Yipu1, WANG Changqing3, LI Aijun3
CLC Number:
[1]TALEB T,SAMDANIS K,MADA B,et al.On multi-access edge computing:A survey of the emerging 5G network edge cloud architecture and orchestration[J].IEEE Communications Surveys and Tutorials,2017,19(3):1657-1681. [2]YIN Y,CAO Z,XU Y,et al.QoS prediction for service recommendation with features learning in mobile edge computing environment[J].IEEE Transactions on Cognitive Communications and Networking,2020,6(4):1136-1145. [3]FANG W,DING S,LI Y,et al.OKRA:Optimal task and re-source allocation for energy minimization in mobile edge computing systems[J].Wireless Networks,2019,25(5):2851-2867. [4]ELGENDY I A,ZHANG W,TIAN Y C,et al.Resource allocation and computation offloading with data security for mobile edge computing[J].Future Generation Computer Systems,2019,100:531-541. [5]ELGENDY I A,MUTHANNA A,HAMMOUDEH M,et al.Advanced deep learning for resource allocation and security aware data offloading in industrial mobile edge computing[J].Big Data,2021,9(4):265-278. [6]SONG Y B,JIN X Y,YAN F,et al.Secure and energy-efficient offloading strategies for mobile edge computing in vehicular networking[J].Journal of Tsinghua University(Natural Science Edition),2021,61(11):1246-1253. [7]JIANG X,SUN Y,LIU B,et al.Combinatorial double auctionfor resource allocation with differential privacy in edge computing[J].Computer Communications,2022,185:13-22. [8]YAO Y,WANG Z,ZHOU P.Privacy-preserving and energy efficient task offloading for collaborative mobile computing in IoT:an ADMM approach[J].Computers and Security,2020,96:101886. [9]ZHOU Y S,TAN C,TANG F.A multidimensional security query scheme for fog-enhanced industrial Internet of Things[J].Journal of Communication,2020,41(8):175-186. [10]REN T Y,WANG X H,GUO G X,et al.Design of data security system for power IoT based on multi-level authentication and lightweight encryption[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition),2020,40(6):12-19. [11]HE X L,REN Z Y,SHI C H,et al.Cloud-fog network for medi-cal big data and its distributed computing scheme[J].Journal of Xi'an Jiaotong University,2016,50(10):71-77. [12]LI Z,CHANG V,HU H,et al.Profit maximization for security-aware task offloading in edge-cloud environment[J].Journal of Parallel and Distributed Computing,2021,157:43-55. [13]ZHANG Y,LIU Y,ZHOU J,et al.Slow-movement particleswarm optimization algorithms for scheduling security-critical tasks in resource-limited mobile edge computing[J].Future Generation Computer Systems,2020,112:148-161. [14]REN J,HE Y,YU G,et al.Joint communication and computation resource allocation for cloud-edge collaborative System[C]//2019 IEEE Wireless Communications and Networking Conference.2019:1-6. [15]JIANG W,ZHANG X,MA Y.Energy aware real-time scheduling policy with guaranteed security protection[C]//19th Asia and South Pacific Design Automation Conference.2014:317-322. [16]SINGHAL N,RAINA J.Comparative analysis of AES and RC4 algorithms for better utilization[J].International Journal of Computer Trends and Technology,2011,2(6):177-181. [17]TRAD A,BAHATTAB A A,OTHMAN S B.Performance trade-offs of encryption algorithms for wireless sensor networks[C]//2014 World Congress on Computer Applications and Information Systems(WCCAIS).IEEE,2014:1-6. [18]ALAM M,KHAN M.Performance and efficiency analysis ofdifferent block cipher algorithms of symmetric key cryptography[J].International Journal of Advanced Research in Computer Science and Software Engineering,2013,3(10):713-720. [19]ZHU A,WEN Y.Computing offloading strategy using improved genetic algorithm in mobile edge computing system[J].Journal of Grid Computing,2021,19(3):38. [20]SARVABHATLA M,KONDA S,VORUGUNTI C S,et al.A network aware energy efficient offloading algorithm for mobile cloud computing over 5G network[C]//2017 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).IEEE,2017:69-74. |
[1] | ZHOU Xuequan, DU Nisuo, OUYANG Zhi. Chaos COOT Bird Algorithm Based on Cauchy Mutation and Differential Evolution [J]. Computer Science, 2023, 50(8): 209-220. |
[2] | MENG Yiyue, PENG Rong, LYU Qibiao. Text Material Recommendation Method Combining Label Classification and Semantic QueryExpansion [J]. Computer Science, 2023, 50(1): 76-86. |
[3] | LI Dan-dan, WU Yu-xiang, ZHU Cong-cong, LI Zhong-kang. Improved Sparrow Search Algorithm Based on A Variety of Improved Strategies [J]. Computer Science, 2022, 49(6A): 217-222. |
[4] | LIU Bao-bao, YANG Jing-jing, TAO Lu, WANG He-ying. Study on Prediction of Educational Statistical Data Based on DE-LSTM Model [J]. Computer Science, 2022, 49(6A): 261-266. |
[5] | CEN Jian-ming, FENG Quan-xi, ZHANG Li-li, TONG Rui-chao. Empirical Study on the Forecast of Large Stock Dividends of Listed Companies Based on DE-lightGBM [J]. Computer Science, 2022, 49(11A): 211000017-7. |
[6] | CHEN Ying, HUANG Pei-xuan, CHEN Jin-ping, WANG Zu-yi, SHEN Ying-shan, FAN Xiao-mao. Hybrid Particle Swarm Optimization Algorithm Based on Hierarchical Learning and Different Evolution for Solving Capacitated Vehicle Routing Problem [J]. Computer Science, 2022, 49(11A): 210800271-7. |
[7] | YANG Hao, YAN Qiao. Adversarial Character CAPTCHA Generation Method Based on Differential Evolution Algorithm [J]. Computer Science, 2022, 49(11A): 211100074-5. |
[8] | YU Jia-shan, WU Lei. Two Types of Leaders Salp Swarm Algorithm [J]. Computer Science, 2021, 48(4): 254-260. |
[9] | ZHANG Zhi-qiang, LU Xiao-feng, SUI Lian-sheng, LI Jun-huai. Salp Swarm Algorithm with Random Inertia Weight and Differential Mutation Operator [J]. Computer Science, 2020, 47(8): 297-301. |
[10] | HOU Gai, HE Lang, HUANG Zhang-can, WANG Zhan-zhan, TAN Qing. Pyramid Evolution Strategy Based on Differential Evolution for Solving One-dimensional Cutting Stock Problem [J]. Computer Science, 2020, 47(7): 166-170. |
[11] | BAI Wei, PAN Zhi-song, XIA Shi-ming, CHENG Ang-xuan. Network Security Configuration Generation Framework Based on Genetic Algorithm Optimization [J]. Computer Science, 2020, 47(5): 306-312. |
[12] | LI Zhang-wei,WANG Liu-jing. Population Distribution-based Self-adaptive Differential Evolution Algorithm [J]. Computer Science, 2020, 47(2): 180-185. |
[13] | WANG Xuan, MAO Ying-chi, XIE Zai-peng, HUANG Qian. Inference Task Offloading Strategy Based on Differential Evolution [J]. Computer Science, 2020, 47(10): 256-262. |
[14] | DONG Ming-gang,LIU Bao,JING Chao. Multi-objective Differential Evolution Algorithm with Fuzzy Adaptive Ranking-based Mutation [J]. Computer Science, 2019, 46(7): 224-232. |
[15] | NI Hong-jie, PENG Chun-xiang, ZHOU Xiao-gen, YU Li. Differential Evolution Algorithm with Stage-based Strategy Adaption [J]. Computer Science, 2019, 46(6A): 106-110. |
|