2022
DOI: 10.1016/j.comcom.2022.07.037
|View full text |Cite
|
Sign up to set email alerts
|

Physical-layer security based mobile edge computing for emerging cyber physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 43 publications
(19 citation statements)
references
References 29 publications
0
16
0
Order By: Relevance
“…Among the existing activation functions, there is a most widely used activation function, named as linear rectification function (ReLu), and it can be expressed as [21][22][23] f (x) = max(0, x).…”
Section: System Model Of Deep Learning For Standard Knowledge Service...mentioning
confidence: 99%
“…Among the existing activation functions, there is a most widely used activation function, named as linear rectification function (ReLu), and it can be expressed as [21][22][23] f (x) = max(0, x).…”
Section: System Model Of Deep Learning For Standard Knowledge Service...mentioning
confidence: 99%
“…where λ t represents the threshold of the monitoring rate. Then, this equation can be further derived as [22][23][24] In further, the outage probability can be calculated as,…”
Section: System Modelmentioning
confidence: 99%
“…Then, the effective signal-to-noise ratio (SNR) of KG n * and eavesdropper can be written as [16,17]…”
Section: Multiple Kg Nodesmentioning
confidence: 99%