Open Access
ARTICLE
Zuyi Huang1, Yue Wang1, Jia Liu2, Haodong Yi1, Lejun Ai1, Min Chen1,3,*, Salman A. AlQahtani4
1 School of Computer Science and Engineering, South China University of Technology, Guangzhou, 510006, China
2 School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074, China
3 Pazhou Laboratory, Guangzhou, 510640, China
4 New Emerging Technologies and 5G Network and Beyond Research Chair, Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, 11574, Saudi Arabia
* Corresponding Author: Min Chen. Email:
(This article belongs to the Special Issue: Advancing Network Intelligence: Communication, Sensing and Computation)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.074034
Received 30 September 2025; Accepted 05 December 2025; Published online 29 December 2025
View
Download
Like
Optimization Scheme of Trusted Task Offloading in IIoT Scenario Based on DQN
Xiaojuan Wang, Zikui Lu, Siyuan...Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment
Salaheddine Kably, Tajeddine Benbarrad,...Identity-Based Edge Computing Anonymous Authentication Protocol
Naixin Kang, Zhenhu Ning, Shiqiang...Transparent Access to Heterogeneous IoT Based on Virtual Resources
Wenquan Jin, Sunhwan Lim, Young-Ho...Resource Management in UAV Enabled MEC Networks
Muhammad Abrar, Ziyad M. Almohaimeed,...