Open Access
ARTICLE
Wenxuan Yu1, Wenjing Gao1, Jiuru Wang2, Rong Hao1,*, Jia Yu1,*
1 College of Computer Science and Technology, Qingdao University, Qingdao, China
2 School of Information Science and Engineering, Linyi University, Linyi, China
* Corresponding Author: Rong Hao. Email: ; Jia Yu. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2026.076731
Received 25 November 2025; Accepted 27 January 2026; Published online 18 February 2026
View
Download
Like
Optimization Scheme of Trusted Task Offloading in IIoT Scenario Based on DQN
Xiaojuan Wang, Zikui Lu, Siyuan...Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment
Salaheddine Kably, Tajeddine Benbarrad,...Identity-Based Edge Computing Anonymous Authentication Protocol
Naixin Kang, Zhenhu Ning, Shiqiang...Transparent Access to Heterogeneous IoT Based on Virtual Resources
Wenquan Jin, Sunhwan Lim, Young-Ho...Resource Management in UAV Enabled MEC Networks
Muhammad Abrar, Ziyad M. Almohaimeed,...