2021
DOI: 10.1109/tpds.2020.3010521
|View full text |Cite
|
Sign up to set email alerts
|

Cost-Effective App Data Distribution in Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
43
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 140 publications
(55 citation statements)
references
References 38 publications
1
43
0
1
Order By: Relevance
“…In future study, we will continuously refine SIFSimHash by considering more data types [25][26][27][28][29] and more optimization metrics [30][31][32][33][34][35]. Besides, how to integrate SIFSimHash with other privacy protection techniques (e.g., in [36][37][38][39][40][41][42][43][44][45]) is another research focus.…”
Section: Discussionmentioning
confidence: 99%
“…In future study, we will continuously refine SIFSimHash by considering more data types [25][26][27][28][29] and more optimization metrics [30][31][32][33][34][35]. Besides, how to integrate SIFSimHash with other privacy protection techniques (e.g., in [36][37][38][39][40][41][42][43][44][45]) is another research focus.…”
Section: Discussionmentioning
confidence: 99%
“…In addition, we will take the time and space factors into consideration to improve the algorithm from many aspects, such as privacy [22][23][24][25]. We will also further improve the performance and effectiveness of the algorithm [26][27][28] by combining some new approaches such as Blockchain and Edge Computing [29][30][31][32].…”
Section: Discussionmentioning
confidence: 99%
“…Privacy preservation using DNNs LAYENT [8] Modified CNN inference module [9] ObfNet [10] Privacy partition [11] [12] Homomorphic encryption [5] Additive perturbation [6] Multiplication perturbation [7] Figure 2: Structure of this section.…”
Section: Data Obfuscationmentioning
confidence: 99%
“…To solve the abovementioned bottleneck, a new computing paradigm called edge computing (EC) has been proposed recently and gets widespread attention. EC refers to the technology that deploys computing tasks to the edge of the network [5,6]. Compared with cloud computing, EC has many advantages, including protecting end-users' privacy, reducing the latency while data transmission, decreasing the burden of network bandwidth, and lessening the energy consumption of data center.…”
Section: Introductionmentioning
confidence: 99%