Cited By
View all- Chen LGuo CGong BWaqas MDeng LQin H(2024)A secure cross-domain authentication scheme based on threshold signature for MECJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00631-x13:1Online publication date: 22-Mar-2024
- Li CJiang KZhang YJiang LLuo YWan S(2024)Deep Reinforcement Learning-based Mining Task Offloading Scheme for Intelligent Connected Vehicles in UAV-aided MECACM Transactions on Design Automation of Electronic Systems10.1145/365345129:3(1-29)Online publication date: 3-May-2024
- Liu FShi LXu JDing XFan YLi ZKim MKo GSagduyu YShi Y(2024)Cost Minimization for Joint Server and Service Deployment in Edge ComputingProceedings of the 2024 ACM Workshop on Wireless Security and Machine Learning10.1145/3649403.3656487(32-37)Online publication date: 30-May-2024
- Show More Cited By