2020
DOI: 10.1016/j.comcom.2020.06.019
|View full text |Cite
|
Sign up to set email alerts
|

Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…In specific practice, it is necessary to choose the corresponding security strategy according to the constraints of the given defense conditions. For this work, one can refer to the relevant literature 48,49 …”
Section: Discussionmentioning
confidence: 99%
“…In specific practice, it is necessary to choose the corresponding security strategy according to the constraints of the given defense conditions. For this work, one can refer to the relevant literature 48,49 …”
Section: Discussionmentioning
confidence: 99%
“…Here, e is the edge server. If q e i of the MEC is very long, it means that the MEC is overloaded, and the task will be offloaded to the cloud server for processing [33,34].…”
Section: Characteristics Of Edge Networkmentioning
confidence: 99%
“…Methods based on artificial intelligence have been proposed to overcome the limitations of nature-inspired optimization algorithms. The deep Q-learning approach utilizes neural networks like deep learning to help agents to choose the next action [ 23 , 24 ]. As the name suggests, it uses the Q-value (expected reward) to make the decision.…”
Section: Related Workmentioning
confidence: 99%