2022
DOI: 10.1109/jiot.2022.3143572
|View full text |Cite
|
Sign up to set email alerts
|

A Reliable and Efficient Task Offloading Strategy Based on Multifeedback Trust Mechanism for IoT Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(9 citation statements)
references
References 31 publications
0
9
0
Order By: Relevance
“…In the direct evaluation process, a rating score between [0, 1] is awarded to T rustN ode while for the indirect evaluation process, the historical honest behavior of T rustN ode is used for assessing its credibility. Although, direct evaluation is prone to feedback sparseness and misjudgment [29]. However, in this study, time relevance is incorporated in the evaluation process to prevent misjudgment.…”
Section: Consortium Blockchain Systemmentioning
confidence: 99%
“…In the direct evaluation process, a rating score between [0, 1] is awarded to T rustN ode while for the indirect evaluation process, the historical honest behavior of T rustN ode is used for assessing its credibility. Although, direct evaluation is prone to feedback sparseness and misjudgment [29]. However, in this study, time relevance is incorporated in the evaluation process to prevent misjudgment.…”
Section: Consortium Blockchain Systemmentioning
confidence: 99%
“…To combat cyber threats in IoT networks [57], cloud computing [58], and communication networks [59], several researchers have employed ML models. To identify DDoS assaults using two characteristics, A self-adaptive model using RF and LSTM was integrated with a learning strategy by Vedula et al [60].…”
Section: Drone Security Using Machine Learningmentioning
confidence: 99%
“…Supervised, unsupervised, and semi-supervised learning are the three primary types of ML approaches. Many researchers have used ML models to cope with cyberthreats in communication networks [ 34 ], IoT networks [ 35 ], and cloud computing [ 36 ]. Vedula et al [ 37 ] used RF and LSTM (autoencoder) to combine a learning methodology with a self-adaptive model to identify DDoS attacks using two features.…”
Section: Literature Reviewmentioning
confidence: 99%