Open Access
ARTICLE
Chengqi Liu1, Yongtao Li2, Weiping Zou3,*, Deyu Lin4,5,*
1 Network and Information Center, Nanchang University, No. 999 of Xuefu Road, Nanchang, 330031, China
2 School of Mathematics and Computer Sciences, Nanchang University, No. 999 of Xuefu Road, Nanchang, 330031, China
3 School of Artificial Intelligence, Wenzhou Polytechnic, Chashan Higher Education Park, Ouhai District, Wenzhou, 325035, China
4 School of Software, Nanchang University, Nanchang, 330031, China
5 School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore, 639798, Singapore
* Corresponding Author: Weiping Zou. Email: ; Deyu Lin. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.074975
Received 22 October 2025; Accepted 16 December 2025; Published online 04 January 2026
View
Download
Like
Optimization Scheme of Trusted Task Offloading in IIoT Scenario Based on DQN
Xiaojuan Wang, Zikui Lu, Siyuan...Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment
Salaheddine Kably, Tajeddine Benbarrad,...Identity-Based Edge Computing Anonymous Authentication Protocol
Naixin Kang, Zhenhu Ning, Shiqiang...Transparent Access to Heterogeneous IoT Based on Virtual Resources
Wenquan Jin, Sunhwan Lim, Young-Ho...Resource Management in UAV Enabled MEC Networks
Muhammad Abrar, Ziyad M. Almohaimeed,...