2024
DOI: 10.1109/jiot.2024.3349538
|View full text |Cite
|
Sign up to set email alerts
|

Task-Driven Cooperative Internet of Robotic Things Crowdsourcing: From the Perspective of Hierarchical Game Theoretic

Han Xiao,
Zhenglei Huang,
Zuyun Xu
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 38 publications
0
1
0
Order By: Relevance
“…Becoming chosen as a message forwarder, on the other hand, could force vehicles to deviate from the method to conserve their personal data and resources. 28 In literature, various ways to detect and encouraged selfish vehicles for cooperation have been presented. For example, there are two main forms of incentives for cooperative activity in mobile ad hoc networks.…”
Section: Related Workmentioning
confidence: 99%
“…Becoming chosen as a message forwarder, on the other hand, could force vehicles to deviate from the method to conserve their personal data and resources. 28 In literature, various ways to detect and encouraged selfish vehicles for cooperation have been presented. For example, there are two main forms of incentives for cooperative activity in mobile ad hoc networks.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, current sensitive data identification methods do not take into account the application scenarios of data-efficient transmission technology. [1][2][3][4][5][6] This paper proposes a sensitive data identification method based on batch data and streaming data for the problem of identifying sensitive data in multiple categories and scenarios within Beike Inc. To mitigate the problems posed by the size and complexity of the data, this method further divides data into incremental data, stock data, structured data, semi-structured and unstructured data, then uses different sensitive data identification government schemes respectively. In addition, the method constructs a classification & annotation platform and a dataset management platform to provide a reference for the definition and classification of sensitive data, therefore further supporting the training and evaluation of machine learning models for sensitive data identification.…”
Section: Introductionmentioning
confidence: 99%
“…The rapid increase in the number of mobile terminals and Internet-of-Things (IoT) devices in network deployments [1][2][3][4][5][6] introduces security challenges due to the broadcast nature of the wireless transmissions. 7 This is because the mobile terminals are vulnerable to cyberattacks and overhearing process.…”
Section: Introductionmentioning
confidence: 99%