2021
DOI: 10.1007/s11276-021-02643-w
|View full text |Cite
|
Sign up to set email alerts
|

Deep reinforcement learning-based computation offloading and resource allocation in security-aware mobile edge computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 39 publications
0
11
0
Order By: Relevance
“…UE associated with the same SBS allocates orthogonal spectrum, so there is no intra cell interference between UE which is associated with the same SBS. [ 19 21 ]. The uplink transmission rate is shown in the following formula: where B nk represents the channel bandwidth allocated by SBS k to UE n , P n represents the transmission power of UE n , h nk is the channel gain between SBS k and UE n , and N 0 is the power spectral density.…”
Section: Methodsmentioning
confidence: 99%
“…UE associated with the same SBS allocates orthogonal spectrum, so there is no intra cell interference between UE which is associated with the same SBS. [ 19 21 ]. The uplink transmission rate is shown in the following formula: where B nk represents the channel bandwidth allocated by SBS k to UE n , P n represents the transmission power of UE n , h nk is the channel gain between SBS k and UE n , and N 0 is the power spectral density.…”
Section: Methodsmentioning
confidence: 99%
“…Optimization objectives [37] Multidimensional optimization of offloading strategy formulation, load balancing and computing resource allocation A low complexity heuristic algorithm is proposed obtain the offloading and ensure the load balance among multiple MECs. Lagrange dual decomposition method is used to solve the computational resource allocation sub-problem Minimize the weighted sum of total delay and energy consumption of all devices in MEC network [38] Base station user matching and power allocation A cache-based NOMA downlink heterogeneous network architecture is proposed, and the messaging user coordination strategy is formulated to reasonably allocates Improve network cache hit rate and minimize energy consumption [39] Calculate privacy disclosure during uninstall A wireless communication and computing model of partial computing offload and resource allocation considering time-varying channel state, bandwidth constraints, random arrival of workload and privacy protection is established, and a scheme of local computing offload and resource allocation based on distributed reinforcement learning is proposed Minimize the calculation and offloading delay and energy consumption, while protecting users' privacy [40] Task calculation offloading problem A new MEC edge computing offload system based on D2D communication is proposed, and the problem of computing offload is solved by game theory…”
Section: Author Contributionsmentioning
confidence: 99%
“…Ke et al put forward that in order to prevent the degradation of individual artificial fish in swimming, the behavior of artificial fish should be improved as follows. When the best artificial fish in the population performs foraging, chasing after the tail, and swarming, if the target position is not as good as its own position, the artificial fish will not move [ 17 ]. The research of Llerena and Gondim shows that D2D users use resources orthogonal to Cu users to communicate on D2D direct link.…”
Section: Related Workmentioning
confidence: 99%
“…When the best artificial fish in the population performs foraging, chasing after the tail, and swarming, if the target position is not as good as its own position, the artificial fish will not move [17]. e research of Llerena and Gondim shows that D2D users use resources orthogonal to Cu users to communicate on D2D direct link.…”
Section: Related Workmentioning
confidence: 99%