메뉴 건너뛰기




Volumn 2018-January, Issue , 2017, Pages 1-6

Privacy-Aware Offloading in Mobile-Edge Computing

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION OFFLOADING; DELAY-SENSITIVE APPLICATIONS; ENERGY UTILIZATION; MARKOV PROCESSES; MOBILE EDGE COMPUTING; MOBILE TELECOMMUNICATION SYSTEMS;

EID: 85046494992     PISSN: 23340983     EISSN: 25766813     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2017.8253985     Document Type: Conference Paper
Times cited : (92)

References (25)
  • 2
    • 85184373237 scopus 로고    scopus 로고
    • A survey on mobile edge computing. in
    • A. Ahmed and E. Ahmed. A survey on mobile edge computing. In IEEE ISCO, 2016.
    • (2016) IEEE ISCO
    • Ahmed, A.1    Ahmed, E.2
  • 4
    • 85009814691 scopus 로고    scopus 로고
    • Dynamic computation offloading for mobile-edge computing with energy harvesting devices
    • Y. Mao, J. Zhang, and K. B. Letaief. Dynamic computation offloading for mobile-edge computing with energy harvesting devices. IEEE JSAC, 34(12):3590-3605, 2016.
    • (2016) IEEE JSAC , vol.34 , Issue.12 , pp. 3590-3605
    • Mao, Y.1    Zhang, J.2    Letaief, K.B.3
  • 5
    • 84985893628 scopus 로고    scopus 로고
    • Delay-optimal computation task scheduling for mobile-edge computing systems. in
    • J. Liu, Y. Mao, J. Zhang, and K. B. Letaief. Delay-optimal computation task scheduling for mobile-edge computing systems. In IEEE ISIT, 2016.
    • (2016) IEEE ISIT
    • Liu, J.1    Mao, Y.2    Zhang, J.3    Letaief, K.B.4
  • 6
    • 85015380112 scopus 로고    scopus 로고
    • Online learning for offloading and autoscaling in renewable-powered mobile edge computing. in
    • J. Xu and S. Ren. Online learning for offloading and autoscaling in renewable-powered mobile edge computing. In IEEE GLOBECOM, 2016.
    • (2016) IEEE GLOBECOM
    • Xu, J.1    Ren, S.2
  • 7
    • 85015372405 scopus 로고    scopus 로고
    • Multiuser resource allocation for mobile-edge computation offloading. in
    • C. You and K. Huang. Multiuser resource allocation for mobile-edge computation offloading. In IEEE GLOBECOM, 2016.
    • (2016) IEEE GLOBECOM
    • You, C.1    Huang, K.2
  • 8
    • 85015384872 scopus 로고    scopus 로고
    • Efficient multi-user computation offloading for mobile-edge cloud computing
    • X. Chen, L. Jiao, W. Li, and X. Fu. Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Transactions on Networking, 24(5):2795-2808, 2016.
    • (2016) IEEE/ACM Transactions on Networking , vol.24 , Issue.5 , pp. 2795-2808
    • Chen, X.1    Jiao, L.2    Li, W.3    Fu, X.4
  • 9
    • 85029659094 scopus 로고    scopus 로고
    • Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges
    • R. Roman, J. Lopez, and M. Mambo. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Elsevier Future Generation Computer Systems, 2016.
    • (2016) Elsevier Future Generation Computer Systems
    • Roman, R.1    Lopez, J.2    Mambo, M.3
  • 11
    • 81455148130 scopus 로고    scopus 로고
    • Fast reinforcement learning for energy-efficient wireless communication
    • N. Mastronarde and M. Van der Schaar. Fast reinforcement learning for energy-efficient wireless communication. IEEE Transactions on Signal Processing, 59(12):6262-6266, 2011.
    • (2011) IEEE Transactions on Signal Processing , vol.59 , Issue.12 , pp. 6262-6266
    • Mastronarde, N.1    Van Der Schaar, M.2
  • 13
    • 85009817152 scopus 로고    scopus 로고
    • D2D fogging: An energy-efficient and incentive-aware task offloading framework via network-assisted D2D collaboration
    • L. Pu, X. Chen, J. Xu, and X. Fu. D2D fogging: An energy-efficient and incentive-aware task offloading framework via network-assisted D2D collaboration. IEEE JSAC, 34(12):3887-3901, 2016.
    • (2016) IEEE JSAC , vol.34 , Issue.12 , pp. 3887-3901
    • Pu, L.1    Chen, X.2    Xu, J.3    Fu, X.4
  • 14
    • 84879515461 scopus 로고    scopus 로고
    • Who do you sync you are?: Smartphone fingerprinting via application behaviour. in
    • T. Stöber, M. Frank, J. Schmitt, and I. Martinovic. Who do you sync you are?: Smartphone fingerprinting via application behaviour. In ACM WiSec, 2013.
    • (2013) ACM WiSec
    • Stöber, T.1    Frank, M.2    Schmitt, J.3    Martinovic, I.4
  • 15
    • 84928136695 scopus 로고    scopus 로고
    • Can't you hear me knocking: Identification of user actions on android apps via traffic analysis. in
    • M. Conti, L. V. Mancini, R. Spolaor, and N. V. Verde. Can't you hear me knocking: Identification of user actions on android apps via traffic analysis. In ACM CODASPY, 2015.
    • (2015) ACM CODASPY
    • Conti, M.1    Mancini, L.V.2    Spolaor, R.3    Verde, N.V.4
  • 17
    • 13244278201 scopus 로고    scopus 로고
    • An actor-critic algorithm for constrained Markov decision processes
    • V. S. Borkar. An actor-critic algorithm for constrained Markov decision processes. Systems & control letters, 54(3):207-213, 2005.
    • (2005) Systems & Control Letters , vol.54 , Issue.3 , pp. 207-213
    • Borkar, V.S.1
  • 18
    • 85015451847 scopus 로고    scopus 로고
    • Power-delay tradeoff in multi-user mobile-edge computing systems. in
    • Y. Mao, J. Zhang, S. H. Song, and K. B. Letaief. Power-delay tradeoff in multi-user mobile-edge computing systems. In IEEE GLOBECOM, 2016.
    • (2016) IEEE GLOBECOM
    • Mao, Y.1    Zhang, J.2    Song, S.H.3    Letaief, K.B.4
  • 19
    • 85184381198 scopus 로고    scopus 로고
    • Energy efficiency of mobile clients in cloud computing. in
    • A. P. Miettinen and J. K. Nurminen. Energy efficiency of mobile clients in cloud computing. In ACM USENIX, 2010.
    • (2010) ACM USENIX
    • Miettinen, A.P.1    Nurminen, J.K.2
  • 20
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • W. Du and M. J. Atallah. Secure multi-party computation problems and their applications: A review and open problems. In ACM Workshop on New Security Paradigms, 2001.
    • (2001) ACM Workshop on New Security Paradigms
    • Du, W.1    Atallah, M.J.2
  • 21
    • 67650655439 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • C. Dwork. Differential privacy: A survey of results. In TAMC, 2008.
    • (2008) TAMC
    • Dwork, C.1
  • 23
    • 85184362481 scopus 로고    scopus 로고
    • Location privacy leaking from spectrum utilization information in database-driven cognitive radio network. in
    • Z. Gao, H. Zhu, Y. Liu, M. Li, and Z. Cao. Location privacy leaking from spectrum utilization information in database-driven cognitive radio network. In ACM CCS, 2012.
    • (2012) ACM CCS
    • Gao, Z.1    Zhu, H.2    Liu, Y.3    Li, M.4    Cao, Z.5
  • 24
    • 84881316459 scopus 로고    scopus 로고
    • Providing source location privacy in wireless sensor networks: A survey
    • M. Conti, J. Willemsen, and B. Crispo. Providing source location privacy in wireless sensor networks: A survey. IEEE Communications Surveys & Tutorials, 15(3):1238-1280, 2013.
    • (2013) IEEE Communications Surveys & Tutorials , vol.15 , Issue.3 , pp. 1238-1280
    • Conti, M.1    Willemsen, J.2    Crispo, B.3
  • 25
    • 84866628169 scopus 로고    scopus 로고
    • Trajectory privacy in location-based services and data publication
    • C. Y. Chow and M. F. Mokbel. Trajectory privacy in location-based services and data publication. ACM SIGKDD Explorations Newsletter, 13(1):19-29, 2011.
    • (2011) ACM SIGKDD Explorations Newsletter , vol.13 , Issue.1 , pp. 19-29
    • Chow, C.Y.1    Mokbel, M.F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.