2022
DOI: 10.1109/tgcn.2022.3170146
|View full text |Cite
|
Sign up to set email alerts
|

Joint Optimization of Energy Conservation and Privacy Preservation for Intelligent Task Offloading in MEC-Enabled Smart Cities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 37 publications
0
4
0
Order By: Relevance
“…Rui Chen, Ganesh Neelakanta Iyer [16,17], and others considered the interactions among market participants with different risk attitudes and incorporated risk-neutral computation with given weights. Kai Peng [18] studied the privacy risk of different edge devices to propose a privacy-preserving game without considering the impact of risk on the allocation. Jianbo Du [19] used the asynchronous advantage actor-critic (A3C) deep reinforcement learning algorithm to obtain resource pricing and allocation and explored the risk coefficients that may exist using reinforcement learning.…”
Section: Related Workmentioning
confidence: 99%
“…Rui Chen, Ganesh Neelakanta Iyer [16,17], and others considered the interactions among market participants with different risk attitudes and incorporated risk-neutral computation with given weights. Kai Peng [18] studied the privacy risk of different edge devices to propose a privacy-preserving game without considering the impact of risk on the allocation. Jianbo Du [19] used the asynchronous advantage actor-critic (A3C) deep reinforcement learning algorithm to obtain resource pricing and allocation and explored the risk coefficients that may exist using reinforcement learning.…”
Section: Related Workmentioning
confidence: 99%
“…Game theory is an effective way to deal with the interactions between incentive structures of a competitive nature, particularly, it describes a reactive decision-ahead scenario where other competitors react to their own decisions, and then adjust the initial decision to make a better final decision [74]. In ref.…”
Section: Game Theorymentioning
confidence: 99%
“…The endpoint transmits the raw data to the edge node, which processes it and then returns the resultant data to the endpoint 3 . Although this type of data processing reduces the risk of privacy leakage during data transmission, edge devices can access and store large amounts of raw sensitive data of users, which brings new challenges to the issue of data privacy protection in MEC 4,5 . For example, smart sensors in smart homes can capture a large amount of private user information, such as dynamic activity information of family members and room layouts.…”
Section: Introductionmentioning
confidence: 99%
“…3 Although this type of data processing reduces the risk of privacy leakage during data transmission, edge devices can access and store large amounts of raw sensitive data of users, which brings new challenges to the issue of data privacy protection in MEC. 4,5 For example, smart sensors in smart homes can capture a large amount of private user information, such as dynamic activity information of family members and room layouts. If this information is accessed by unscrupulous elements, the safety of users' lives and property will be seriously threatened.…”
mentioning
confidence: 99%