说明
本次学习的论文整理part2部分
论文学习
- 说明
- 论文目录
- 13 BeCome: Blockchain-Enabled Computation Offloading for IoT in Mobile Edge Computing
- 14 Cooperative Computation Offloading and Resource Allocation for Blockchain-Enabled Mobile-Edge Computing: A Deep Reinforcement Learning Approach
- 15 Efficient Privacy Preserving Data Collection and Computation Offloading for Fog-Assisted IoT
- 16 Energy Efficient Resource Allocation and Computation Offloading Strategy in a UAV-enabled Secure Edge-Cloud Computing System
- 17 Energy-Efficient Resource Allocation for Secure NOMA-Enabled Mobile Edge Computing Networks
- 18 Optimal Access Scheme for Security Provisioning of C-V2X Computation Offloading Network With Imperfect CSI
论文目录
13 BeCome: Blockchain-Enabled Computation Offloading for IoT in Mobile Edge Computing
14 Cooperative Computation Offloading and Resource Allocation for Blockchain-Enabled Mobile-Edge Computing: A Deep Reinforcement Learning Approach
15 Efficient Privacy Preserving Data Collection and Computation Offloading for Fog-Assisted IoT
16 Energy Efficient Resource Allocation and Computation Offloading Strategy in a UAV-enabled Secure Edge-Cloud Computing System
17 Energy-Efficient Resource Allocation for Secure NOMA-Enabled Mobile Edge Computing Networks
18 Optimal Access Scheme for Security Provisioning of C-V2X Computation Offloading Network With Imperfect CSI
版权声明:本文为qq_29212049原创文章,遵循CC 4.0 BY-SA版权协议,转载请附上原文出处链接和本声明。