4.7 Article

Joint Secure Offloading and Resource Allocation for Vehicular Edge Computing Network: A Multi-Agent Deep Reinforcement Learning Approach

Related references

Note: Only part of the references are listed.
Article Engineering, Civil

Mobility-Aware Multi-Hop Task Offloading for Autonomous Driving in Vehicular Edge Computing and Networks

Lei Liu et al.

Summary: This paper proposes a task offloading scheme in Vehicular Edge Computing (VEC) that utilizes multi-hop vehicle computation resources to improve response delay and enhance user experience.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Civil

A Deep Reinforcement Learning-Based Resource Management Game in Vehicular Edge Computing

Xiaoyu Zhu et al.

Summary: The study investigates the competitive interactions between VEC servers and vehicles, proposing a resource management scheme based on Stackelberg game and deep reinforcement learning.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Engineering, Civil

Computation Offloading and Resource Allocation in MEC-Enabled Integrated Aerial-Terrestrial Vehicular Networks: A Reinforcement Learning Approach

Noor Waqar et al.

Summary: This study proposes an MEC-enabled vehicular network assisted through aerial-terrestrial connectivity to provide network access and high data-rate entertainment services to vehicles. By establishing a time-varying dynamic system model and adopting a decentralized value-iteration-based reinforcement learning approach, the joint computation offloading and resource allocation strategies are optimized to reduce system costs.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Article Engineering, Electrical & Electronic

Physical-Layer Security of Uplink mmWave Transmissions in Cellular V2X Networks

Tong-Xing Zheng et al.

Summary: This paper investigates the physical-layer security of uplink millimeter wave communications in a C-V2X network, proposing two uplink association schemes and establishing an analytical framework to evaluate security performance. Numerical results validate theoretical analysis and show that the LPA scheme outperforms the SDA scheme in terms of secrecy throughput.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Task Offloading and Resource Allocation for IoV Using 5G NR-V2X Communication

Salman Raza et al.

Summary: This article discusses the problem of computation efficiency in vehicular edge computing (VEC). By optimizing task offloading decisions and computation resource allocation, a mobility-aware computational efficiency-based task offloading and resource allocation (MACTER) scheme is proposed. Simulation results demonstrate that the proposed algorithm can efficiently enhance computation efficiency while satisfying computing time and energy consumption constraints.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Hardware & Architecture

Security and Privacy in Vehicular Digital Twin Networks: Challenges and Solutions

Chao He et al.

IEEE WIRELESS COMMUNICATIONS (2022)

Proceedings Paper Computer Science, Information Systems

Learning Based and Physical-layer Assisted Secure Computation Offloading in Vehicular Spectrum Sharing Networks

Ying Ju et al.

Summary: A joint secure offloading and resource allocation scheme based on physical layer security (PLS) technology and spectrum sharing architecture is designed in this paper. By jointly optimizing spectrum access, transmit power, and computing resource allocation, the goal is to minimize the system processing delay of all vehicular users (VUs) while ensuring information security. A multi-agent deep reinforcement learning algorithm is adopted to solve the optimization problem.

IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS) (2022)

Article Computer Science, Information Systems

Applications of Multi-Agent Reinforcement Learning in Future Internet: A Comprehensive Survey

Tianxu Li et al.

Summary: Future Internet involves emerging technologies and decentralized network entities. Multi-agent Reinforcement Learning (MARL) allows network entities to learn optimal policies by observing both environments and other entities' policies, and has been widely used to solve issues in the future Internet. This paper reviews the applications of MARL in emerging networks and discusses the challenges and future directions.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2022)

Article Computer Science, Information Systems

Blockchain-Enabled Secure Data Sharing Scheme in Mobile-Edge Computing: An Asynchronous Advantage Actor-Critic Learning Approach

Lei Liu et al.

Summary: Mobile-edge computing (MEC) plays a crucial role in supporting various service applications through efficient data sharing. However, the unique characteristics of MEC also introduce data privacy and security concerns, hindering its development. Blockchain technology is seen as a promising solution to ensure secure data sharing, but integrating it into MEC systems faces challenges due to dynamic network conditions. In this article, a secure data sharing scheme using an asynchronous learning approach in a blockchain-enabled MEC system is proposed, aiming to optimize system performance while balancing energy consumption and throughput.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Engineering, Electrical & Electronic

Self-Learning Based Computation Offloading for Internet of Vehicles: Model and Algorithm

Quyuan Luo et al.

Summary: In this paper, a self-learning based distributed computation offloading scheme for IoV is proposed, establishing a game-theoretic model for optimal offloading decision-making. Through extensive simulations, the scheme outperforms counterparts and achieves significant improvements in time and message overhead.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2021)

Article Engineering, Electrical & Electronic

Physical Layer Security Assisted Computation Offloading in Intelligently Connected Vehicle Networks

Yiliang Liu et al.

Summary: The proposed SCOS in ICV networks aims to minimize overall latency by offloading computational tasks to nearby servers in SBSs and securing the information through physical layer security. The scheme utilizes ergodic secrecy rate to determine task offloading, proposes adaptive wiretap code rates, secure beamforming, and artificial noise to improve secrecy rates, showing shorter system delay compared to strategies neglecting time-varying characteristics.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2021)

Proceedings Paper Engineering, Electrical & Electronic

Secrecy Outage Analysis of Artificial-Noise-Aided mmWave Transmissions in the Presence of Blockage

Haoyu Wang et al.

Summary: This paper investigates the secrecy performance of artificial-noise (AN)-aided transmission in mmWave systems under the capacity-threshold on-off scheme in the presence of randomly distributed eavesdroppers. The impacts of various system parameters on the secrecy performance are characterized, showing that the secrecy performance is significantly enhanced with the narrower main beam and higher antenna gain. The results indicate that the capacity-based transmission scheme with AN-jamming can effectively improve the secrecy performance of mmWave systems.

2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING) (2021)

Article Engineering, Multidisciplinary

Resource Allocation for Delay-Sensitive Vehicle-to-Multi-Edges (V2Es) Communications in Vehicular Networks: A Multi-Agent Deep Reinforcement Learning Approach

Jing Wu et al.

Summary: The V2Es communication framework in vehicular networks improves service quality by utilizing edge node resources and reduces service latency effectively through reinforcement learning method learning dynamic communication states.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2021)

Article Engineering, Electrical & Electronic

Learning Driven NOMA Assisted Vehicular Edge Computing via Underlay Spectrum Sharing

Liping Qian et al.

Summary: In this paper, we investigate NOMA-assisted vehicular edge computing through underlay spectrum sharing to minimize the delay for vehicular users. By focusing on single-cell and multi-cell scenarios, we propose a layered algorithm for joint optimization of resources allocation and address the combinatorial nature of the pairing problem with a cross-entropy based probabilistic learning algorithm. Extensive numerical results validate the effectiveness of the proposed algorithms in reducing delay for vehicular users.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Engineering, Electrical & Electronic

Energy-Efficient Resource Allocation for Secure NOMA-Enabled Mobile Edge Computing Networks

Wei Wu et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Deep-Learning-Based Wireless Resource Allocation With Application to Vehicular Networks

Le Liang et al.

PROCEEDINGS OF THE IEEE (2020)

Article Engineering, Electrical & Electronic

Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing

Xiaofan He et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

3D Spectrum Sharing for Hybrid D2D and UAV Networks

Bodong Shang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

Physical Layer Security Enhancement Using Artificial Noise in Cellular Vehicle-to-Everything (C-V2X) Networks

Chao Wang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Proceedings Paper Computer Science, Information Systems

Joint Offloading and Resource Allocation for Scalable Vehicular Edge Computing

Wei Wu et al.

2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL) (2020)

Article Engineering, Electrical & Electronic

Deep Learning Empowered Traffic Offloading in Intelligent Software Defined Cellular V2X Networks

Bo Fan et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

Exploiting Physical-Layer Security for Multiuser Multicarrier Computation Offloading

Jie Xu et al.

IEEE WIRELESS COMMUNICATIONS LETTERS (2019)

Article Engineering, Electrical & Electronic

Computation Offloading and Resource Allocation in Vehicular Networks Based on Dual-Side Cost Minimization

Jianbo Du et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Engineering, Electrical & Electronic

Spectrum Sharing in Vehicular Networks Based on Multi-Agent Reinforcement Learning

Le Liang et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2019)

Article Engineering, Civil

A Security Credential Management System for V2X Communications

Benedikt Brecht et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)

Article Engineering, Electrical & Electronic

Safeguarding Millimeter Wave Communications Against Randomly Located Eavesdroppers

Ying Ju et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Computer Science, Information Systems

Mobile Edge Computing: A Survey

Nasir Abbas et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

A Survey on Multiple-Antenna Techniques for Physical Layer Security

Xiaoming Chen et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Information Systems

A Survey on Mobile Edge Computing: The Communication Perspective

Yuyi Mao et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Information Systems

Mobile Edge Computing: A Survey on Architecture and Computation Offloading

Pavel Mach et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Engineering, Electrical & Electronic

Secure Transmissions in Millimeter Wave Systems

Ying Ju et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

Resource Allocation for D2D-Enabled Vehicular Communications

Le Liang et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2017)

Article Engineering, Electrical & Electronic

Efficient Processing of Deep Neural Networks: A Tutorial and Survey

Vivienne Sze et al.

PROCEEDINGS OF THE IEEE (2017)

Article Computer Science, Theory & Methods

Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs

Jun Zhou et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Engineering, Electrical & Electronic

Optimization of Code Rates in SISOME Wiretap Channels

Shihao Yan et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2015)

Article Multidisciplinary Sciences

Human-level control through deep reinforcement learning

Volodymyr Mnih et al.

NATURE (2015)