Open Access
ARTICLE
Jinwei Mao1,2, Wang Luo1,2,*, Jiangtao Xu3, Daohua Zhu3, Wei Liang3, Zhechen Huang3, Bao Feng1,2, Shuang Yang1,2
1 State Grid Electric Power Research Institute Co., Ltd., Nanjing, China
2 Nanjing Nari Information & Communication Technology Co., Ltd., Nanjing, China
3 State Grid Jiangsu Electric Power Co., Ltd. Research Institute, Nanjing, China
* Corresponding Author: Wang Luo. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2026.072505
Received 28 August 2025; Accepted 15 December 2025; Published online 18 February 2026
View
Download
Like
Optimization Scheme of Trusted Task Offloading in IIoT Scenario Based on DQN
Xiaojuan Wang, Zikui Lu, Siyuan...Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment
Salaheddine Kably, Tajeddine Benbarrad,...Identity-Based Edge Computing Anonymous Authentication Protocol
Naixin Kang, Zhenhu Ning, Shiqiang...Optimal Resource Allocation for NOMA Wireless Networks
Fahad R. Albogamy, M. A. Aiyashi,...Light-Weighted Decision Support Framework for Selecting Cloud Service Providers
Abdulmajeed Aljuhani, Abdulaziz...