A review of safe reinforcement learning: Methods, theory and applications
Reinforcement Learning (RL) has achieved tremendous success in many complex decision-
making tasks. However, safety concerns are raised during deploying RL in real-world …
making tasks. However, safety concerns are raised during deploying RL in real-world …
Reinforcement learning-based physical cross-layer security and privacy in 6G
Sixth-generation (6G) cellular systems will have an inherent vulnerability to physical (PHY)-
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …
layer attacks and privacy leakage, due to the large-scale heterogeneous networks with …
Priority-aware resource scheduling for UAV-mounted mobile edge computing networks
In this paper, we investigate the joint impact of task priority and mobile computing service on
the mobile edge computing (MEC) networks, in which one unmanned aerial vehicle (UAV) …
the mobile edge computing (MEC) networks, in which one unmanned aerial vehicle (UAV) …
Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems
S Shen, X Wu, P Sun, H Zhou, Z Wu, S Yu - Expert Systems with …, 2023 - Elsevier
Data privacy leakage can be severe when a malicious Internet of Things (IoT) node sends
requests to gather private data from an edge-computing-based IoT cloud storage system …
requests to gather private data from an edge-computing-based IoT cloud storage system …
Lyapunov-guided deep reinforcement learning for stable online computation offloading in mobile-edge computing networks
Opportunistic computation offloading is an effective method to improve the computation
performance of mobile-edge computing (MEC) networks under dynamic edge environment …
performance of mobile-edge computing (MEC) networks under dynamic edge environment …
Relay-assisted federated edge learning: performance analysis and system optimization
In this paper, we study a relay-assisted federated edge learning (FEEL) network under
latency and bandwidth constraints. In this network, users collaboratively train a global model …
latency and bandwidth constraints. In this network, users collaboratively train a global model …
Energy-efficient joint task offloading and resource allocation in OFDMA-based collaborative edge computing
Mobile edge computing (MEC) is an emergent architecture, which brings computation and
storage resources to the edge of mobile network and provides rich services and applications …
storage resources to the edge of mobile network and provides rich services and applications …
Edge intelligence: A computational task offloading scheme for dependent IoT application
Computational offloading, as an effective way to extend the capability of resource-limited
edge devices in Internet of Things (IoT), is considered as a promising emerging paradigm for …
edge devices in Internet of Things (IoT), is considered as a promising emerging paradigm for …
Physical-layer security based mobile edge computing for emerging cyber physical systems
This paper studies a secure mobile edge computing (MEC) for emerging cyber physical
systems (CPS), where there exist K eavesdroppers in the network, which can threaten the …
systems (CPS), where there exist K eavesdroppers in the network, which can threaten the …
Reinforcement learning methods for computation offloading: a systematic review
Z Zabihi, AM Eftekhari Moghadam… - ACM Computing …, 2023 - dl.acm.org
Today, cloud computation offloading may not be an appropriate solution for delay-sensitive
applications due to the long distance between end-devices and remote datacenters. In …
applications due to the long distance between end-devices and remote datacenters. In …