2023
DOI: 10.21203/rs.3.rs-2596903/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Optimization algorithms in security and privacy-preserving data disturbance for collaborative edge computing social IoT deep learning architectures

Abstract: Edge computing (EC) has been viewed as a viable option for addressing cloud computing's shortcomings in supporting Internet-of-Things (IoT) applications as an innovative strategy. However, edge-assisted IoT security requires to be better guaranteed due to the network's instability and increase in attack surfaces. Practice of safeguarding a given network from threats that could compromise its availability is referred to as network security. In addition, we can add that network security must address issues such … Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
references
References 20 publications
(25 reference statements)
0
0
0
Order By: Relevance