Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240600153-8.doi: 10.11896/jsjkx.240600153
• Information Security • Previous Articles Next Articles
ZHAO Chanchan, WEI Xiaomin, SHI Bao, LYU Fei, LIU Libin, ZHANG Ziyang
CLC Number:
[1]SHI W S,CAO J,ZHANG Q,et al.Edge Computing:Vision and Challenges [J].IEEE Internet of Things Journal,2016,3(5):637-646. [2]TANG X Y,CAO C,WANG Y X,et al.Computing power network:The architecture of convergence of computing and networking towards 6G requirement [J].China Communications,2021,18(2):175-185. [3]YANG W,SHI L,LIANG H,et al.Blockchian Empowered Reliable Computation Offloading and Resource Allocation for Mobile Edge Computing Networks [C]//2023 IEEE/CIC International Conference on Communications in China(ICCC).IEEE,2023. [4]ALWARAFY A,AL-THELAYA K A,ABDALLAHM,et al.A Survey on Security and Privacy Issues inEdge-Computing-Assisted Internet of Things [J].IEEE Internet of Things Journal,2021,8(6):4004-4022. [5]NIKRAVAN M,HAGHI K.A review on trust management in fog/edge computing:Techniques,trends,and challenges [J].Journal of Network and Computer Applications,2022,204:103402. [6]ZHENG W Y,CHEN B,HE D B.An adaptive access control scheme based on trust degrees for edge computing[J].Computer Standards&Interfaces,2022,82:103640. [7]ZHANG L J,ZOU Y F,WANG W Z,et al.Resource allocation and trust computing for blockchain-enabled edge computing system[J].Computers & Security,2021,105:102249. [8]KONG W P,LI X Y,HOU L Y,et al.A Reliable and Efficient Task Offloading Strategy Based on Multifeedback Trust Mechanism for IoT Edge Computing[J].IEEE Internet of Things Journal,2022,9:13927-13941. [9]WEN M,WANG T,ZHANG S B,et al.An active and verifiable trust evaluation approach for edge computing[J].Journal of Cloud Computing,2020,9(1):1-19. [10]CHEN J Z,WANG X B,SHEN X M.RTE:Rapid and ReliableTrust Evaluation for Collaborator Selection and Time-Sensitive Task Handling in Internet of Vehicles [J].IEEE Internet of Things Journal,2024,11(7):12278-12291. [11]JAYAKUMAR D,SANTHOSH KUMAR K.Design of mutual trust between the IoT nodes using adaptive network-based fuzzy inference system in edge computing systems [J].Materials Today:Proceedings,2022,56:1795-1801. [12]LI T,HUANG G S,ZHANG S B,et al.NTSC:a novel trust-based service computing scheme in social internet of things [J].Peer-to-Peer Networking and Applications,2021,14(6):3431-3451. [13]JIANG F L,ZENG X W.Trust model for wireless network security based on the edge computing[J].Microsystem Technologies,2019,27:1627-1632. [14]WANG K,CHEN J M,LIANG Z D,et al.A trusted consensus fusion scheme for decentralized collaborated learning in massive IoT domain [J].Information Fusion,2021,72:100-109. [15]WU X,LIANG J B.A blockchain-based trust managementmethod for Internet of Things [J].Pervasive and Mobile Computing,2021,72:101330. [16]ABEYSEKARA P,HAI D,QINA K.Data-driven Trust Prediction in Mobile Edge Computing-based IoT Systems [J].IEEE Transactions on Services Computing,2021:1-1. [17]DEEBAK B D,MEMON F H,KHOWAJA S A,et al.A Lightweight Blockchain-Based Remote Mutual Authentication for AI-Empowered IoT Sustainable Computing Systems [J].IEEE Internet of Things Journal,2023,10(8):6652-6660. [18]PAN X,YUAN L Y,HUANG M M.Cross-domain trust evaluation model for IoT based on blockchain and domain trust degree[J].Computer Engineering,2023,49(5):181-190. [19]HE F,XIAO Z L,WANGX B,et al.Lightweight Flexible Group Authentication Utilizing Historical Collaboration Process Information [J].IEEE Transactions on Communications,2023,71(4):2260-2273. |
[1] | ZHAO Chanchan, YANG Xingchen, SHI Bao, LYU Fei, LIU Libin. Optimization Strategy of Task Offloading Based on Meta Reinforcement Learning [J]. Computer Science, 2025, 52(6A): 240800050-8. |
[2] | WANG Pu, GAO Zhanyun, WANG Zhenfei, SONG Zheli. BDBFT:A Consensus Protocol Based on Reputation Prediction Model for IoT Scenario [J]. Computer Science, 2025, 52(5): 366-374. |
[3] | CHEN Yitian, TONG Yinghua. Joint Optimization of UAV Trajectories and Computational Offloading for Space-Air-GroundIntegrated Networks [J]. Computer Science, 2025, 52(4): 74-84. |
[4] | YANG Fan, SUN Yi, LIN Wei, GAO Qi. Blockchain-based Highly Trusted Query Verification Scheme for Streaming Data [J]. Computer Science, 2025, 52(4): 352-361. |
[5] | JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368. |
[6] | WANG Dongzhi, LIU Yan, GUO Bin, YU Zhiwen. Edge-side Federated Continuous Learning Method Based on Brain-like Spiking Neural Networks [J]. Computer Science, 2025, 52(3): 326-337. |
[7] | DU Likuan, LIU Chen, WANG Junlu, SONG Baoyan. Self-learning Star Chain Space Adaptive Allocation Method [J]. Computer Science, 2025, 52(3): 359-365. |
[8] | ZHOU Wenhui, PENG Qinghua, XIE Lei. Study on Adaptive Cloud-Edge Collaborative Scheduling Methods for Multi-object State Perception [J]. Computer Science, 2024, 51(9): 319-330. |
[9] | WANG Dong, LI Xiaoruo, ZHU Bingnan. Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [J]. Computer Science, 2024, 51(9): 408-415. |
[10] | ZANG Wenyang, LYU Jinlai. Study on Time Rotation Notary Group Model Based on Threshold Signature [J]. Computer Science, 2024, 51(8): 403-411. |
[11] | XIANG Yanjie, HUANG Xiaofang, XIANG Kefeng, ZHENG Ji’nan. Blockchain Certificateless Encryption Mechanism Based on National Secret Algorithm [J]. Computer Science, 2024, 51(8): 440-446. |
[12] | SUN Li. Application,Challenge and New Strategy of Block Chain Technology in Metaverse [J]. Computer Science, 2024, 51(7): 373-379. |
[13] | LI Zhiyuan, XU Binglei, ZHOU Yingyi. Blockchain Anonymous Transaction Tracking Method Based on Node Influence [J]. Computer Science, 2024, 51(7): 422-429. |
[14] | LIU Dong, WANG Ruijin, ZHAO Yanjun, MA Chaoyang, YUAN Haonan. Study on Key Platform of Edge Computing Server Based on ARM Architecture [J]. Computer Science, 2024, 51(6A): 230600119-8. |
[15] | WANG Zhongxiao, PENG Qinglan, SUN Ruoxiao, XU Xifeng, ZHENG Wanbo, XIA Yunni. Delay and Energy-aware Task Offloading Approach for Orbit Edge Computing [J]. Computer Science, 2024, 51(6A): 240100188-9. |
|