[1] |
王田, 沈雪微, 罗皓 ,等. 基于雾计算的可信传感云研究进展[J]. 通信学报, 2019,40(3): 170-181.
|
|
WANG T , SHEN X W , LUO H ,et al. Research progress of trusted sensor-cloud based on fog computing[J]. Journal on Communications, 2019,40(3): 170-181.
|
[2] |
黄晓舸, 刘鑫, 何勇 ,等. 基于区块链的雾网络中的任务卸载优化方案研究[J]. 电子与信息学报, 2022,44(7): 2440-2448.
|
|
HUANG X G , LIU X , HE Y ,et al. Research on optimization scheme of task offloading in blockchain-enabled fog networks[J]. Journal of Electronics & Information Technology, 2022,44(7): 2440-2448.
|
[3] |
ZHAO S , LI F H , LI H W ,et al. Smart and practical privacy-preserving data aggregation for fog-based smart grids[J]. IEEE Transactions on Information Forensics and Security, 2021,16: 521-536.
|
[4] |
LIANG J B , ZHANG M , LEUNG V C M . A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud[J]. IEEE Internet of Things Journal, 2020,7(6): 5481-5490.
|
[5] |
WU D , ANSARI N . A cooperative computing strategy for blockchain-secured fog computing[J]. IEEE Internet of Things Journal, 2020,7(7): 6603-6609.
|
[6] |
HAMAMREH J M , FURQAN H M , ARSLAN H . Classifications and applications of physical layer security techniques for confidentiality:a comprehensive survey[J]. IEEE Communications Surveys & Tutorials, 2019,21(2): 1773-1828.
|
[7] |
丁青锋, 刘梦霞 . 基于混合精度ADC的大规模MIMO中继系统物理层安全性能研究[J]. 电子学报, 2021,49(6): 1142-1150.
|
|
DING Q F , LIU M X . Research on physical layer security performance of massive MIMO relay system based on mixed-ADC[J]. Acta Electronica Sinica, 2021,49(6): 1142-1150.
|
[8] |
SI J B , CHENG Z H , LI Z ,et al. Cooperative jamming for secure transmission with both active and passive eavesdroppers[J]. IEEE Transactions on Communications, 2020,68(9): 5764-5777.
|
[9] |
SHEN H , XU W , GONG S L ,et al. Secrecy rate maximization for intelligent reflecting surface assisted multi-antenna communications[J]. IEEE Communications Letters, 2019,23(9): 1488-1492.
|
[10] |
KUHESTANI A , MOHAMMADI A , MOHAMMADI M . Joint relay selection and power allocation in large-scale MIMO systems with untrusted relays and passive eavesdroppers[J]. IEEE Transactions on Information Forensics and Security, 2018,13(2): 341-355.
|
[11] |
NI L N , ZHANG J Q , JIANG C J ,et al. Resource allocation strategy in fog computing based on priced timed Petri nets[J]. IEEE Internet of Things Journal, 2017,4(5): 1216-1228.
|
[12] |
WANG C M , YU F R , LIANG C C ,et al. Joint computation offloading and interference management in wireless cellular networks with mobile edge computing[J]. IEEE Transactions on Vehicular Technology, 2017,66(8): 7432-7445.
|
[13] |
GU Y N , CHANG Z , PAN M ,et al. Joint radio and computational resource allocation in IoT fog computing[J]. IEEE Transactions on Vehicular Technology, 2018,67(8): 7475-7484.
|
[14] |
VU T T , NGUYEN D N , HOANG D T ,et al. Optimal energy efficiency with delay constraints for multi-layer cooperative fog computing networks[J]. IEEE Transactions on Communications, 2021,69(6): 3911-3929.
|
[15] |
SENGUPTA J , RUJ S , BIT S D.A secure fog-based architecture for industrial Internet of things and industry 4 . 0[J]. IEEE Transactions on Industrial Informatics, 2021,17(4): 2316-2324.
|
[16] |
JUNEJO A K , KOMNINOS N , MCCANN J A . A secure integrated framework for fog-assisted Internet-of-things systems[J]. IEEE Internet of Things Journal, 2021,8(8): 6840-6852.
|
[17] |
CHEN G J , COON J P , DI RENZO M . Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers[J]. IEEE Transactions on Information Forensics and Security, 2017,12(5): 1195-1206.
|
[18] |
ZHANG X M , FENG T H . Chaotic bean optimization algorithm[J]. Soft Computing, 2018,22(1): 67-77.
|
[19] |
ZAHMANI M H . An adaptation of the galaxy-based search algorithm for solving the single machine total weighted tardiness problem[J]. International Journal of Manufacturing Research, 2021,16(4): 399-413.
|
[20] |
HAGHDAR K . Optimal DC source influence on selective harmonic elimination in multilevel inverters using teaching-learning-based optimization[J]. IEEE Transactions on Industrial Electronics, 2020,67(2): 942-949.
|
[21] |
ZHANG X M , WANG H L , SUN B Y ,et al. The Markov model of bean optimization algorithm and its convergence analysis[J]. International Journal of Computational Intelligence Systems, 2013,6(4): 609-615.
|
[22] |
高洪元, 杜亚男, 张世铂 ,等. 能量采集认知无线电的量子蝙蝠最优合作策略[J]. 通信学报, 2018,39(9): 10-19.
|
|
GAO H Y , DU Y N , ZHANG S B ,et al. Optimal cooperative strategy based on quantum bat for cognitive radio of energy harvesting[J]. Journal on Communications, 2018,39(9): 10-19.
|
[23] |
AGRAWAL A , TRIPATHI S . Particle swarm optimization with adaptive inertia weight based on cumulative binomial probability[J]. Evolutionary Intelligence, 2021,14(2): 305-313.
|