2022
DOI: 10.1109/tcss.2021.3072693
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative Edge Computing for Social Internet of Things: Applications, Solutions, and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 27 publications
(8 citation statements)
references
References 72 publications
0
8
0
Order By: Relevance
“…The parameter r indicates the time discount degree, ranging from (0, 1], and is associated with the task information's timeliness. The gain factors λ 1 and λ 2 , with values in the range [1,2], are related to the value of the task information. The parameters θ 1 , θ 2 , and θ 3 , each ranging from (0, 5], represent the cost factor per unit time associated with the communication overhead caused by task information.…”
Section: A Simulation Settingsmentioning
confidence: 99%
See 1 more Smart Citation
“…The parameter r indicates the time discount degree, ranging from (0, 1], and is associated with the task information's timeliness. The gain factors λ 1 and λ 2 , with values in the range [1,2], are related to the value of the task information. The parameters θ 1 , θ 2 , and θ 3 , each ranging from (0, 5], represent the cost factor per unit time associated with the communication overhead caused by task information.…”
Section: A Simulation Settingsmentioning
confidence: 99%
“…As a consequence, users expect higher standards for network performance [1]. Despite the significant computational capabilities of cloud computing, it often fails to meet user demands for data transmission rates, latency, and overall service quality [2]. Consequently, Mobile Edge Computing (MEC) has emerged as a solution [3].…”
Section: Introductionmentioning
confidence: 99%
“…Its main features are: (1) It can handle many different cryptographic primitives, including shared and public key encryption (encryption and signing), hash functions, and Diffie-Hellman key agreement, specified as rewrite rules or equations. (2) It can handle an unlimited number of protocol sessions (even in parallel) and an unlimited message space. Using this tool, we can model different cryptographic elements correctly, and we can verify reachability properties, corresponding assertions, and observation equivalence.…”
Section: Automatic Formal Verification Of Security By Proverifmentioning
confidence: 99%
“…However, in federated learning within the Internet of Things (IoT), the model parameters encode user information, which means that the privacy of IoT devices can still be compromised through these parameters 2‐5 . Therefore, protecting the leakage of model parameters remains a challenge in federated learning.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation