Search Results - "Xia, Geming"

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Poisoning Attacks in Federated Learning: A Survey by Xia, Geming, Chen, Jian, Yu, Chaodong, Ma, Jun

    Published in IEEE access (01-01-2023)
    “…Federated learning faces many security and privacy issues. Among them, poisoning attacks can significantly impact global models, and malicious attackers can…”
    Get full text
    Journal Article
  2. 2

    Coordinated Control of Intelligent Fuzzy Traffic Signal Based on Edge Computing Distribution by Yu, Chaodong, Chen, Jian, Xia, Geming

    Published in Sensors (Basel, Switzerland) (01-08-2022)
    “…With the development of Internet of Things infrastructures and intelligent traffic systems, the traffic congestion that results from the continuous complexity…”
    Get full text
    Journal Article
  3. 3

    Fault-Tolerant Scheduling Mechanism for Dynamic Edge Computing Scenarios Based on Graph Reinforcement Learning by Zhang, Yuze, Xia, Geming, Yu, Chaodong, Li, Hongcheng, Li, Hongfeng

    Published in Sensors (Basel, Switzerland) (30-10-2024)
    “…With the proliferation of Internet of Things (IoT) devices and edge nodes, edge computing has taken on much of the real-time data processing and low-latency…”
    Get full text
    Journal Article
  4. 4

    Adaptive Wireless Image Transmission Transformer Architecture for Image Transmission and Reconstruction by Li, Hongcheng, Xia, Geming, Yu, Chaodong, Zhang, Yuze, Li, Hongfeng

    Published in Sensors (Basel, Switzerland) (22-10-2024)
    “…The advancement of 6G (6th Generation Mobile Networks) communication technology has posed challenges for traditional communication network architectures in…”
    Get full text
    Journal Article
  5. 5

    A Fuzzy-Based Co-Incentive Trust Evaluation Scheme for Edge Computing in CEEC Environment by Xia, Geming, Yu, Chaodong, Chen, Jian

    Published in Applied sciences (01-12-2022)
    “…With the development of 5G and artificial intelligence, the security of Cloud-Edge-End Collaboration (CEEC) networks becomes an increasingly prominent issue…”
    Get full text
    Journal Article
  6. 6

    Towards the Benefit of Multi-hop Relaying in Opportunistic Networking by Jia Jianbin, Chen Yingwen, Xu Ming, Xia Geming, Xiao Xiaoqiang

    “…Hop count is an important parameter for routing strategies in wireless network. Particularly in the opportunistic networks, due to the intermittent…”
    Get full text
    Conference Proceeding
  7. 7

    Trust Evaluation of Computing Power Network Based on Improved Particle Swarm Neural Network by Yu, Chaodong, Xia, Geming, Wang, Zhaohang

    “…In order to satisfy the trust evaluation of efficient cooperative scheduling of computing power in Computing Power Network, we propose a trust evaluation…”
    Get full text
    Conference Proceeding
  8. 8

    A Two-Layer-Consensus Based Blockchain Architecture for IoT by Bai, He, Xia, Geming, Fu, Shaojing

    “…Due to its immutable and transparent nature, Blockchain (BC) provided a decentralized solution to overcome security and resource challenges of centralized…”
    Get full text
    Conference Proceeding
  9. 9

    Graph Attention Network Reinforcement Learning Based Computation Offloading in Multi-Access Edge Computing by Liu, Yuxuan, Xia, Geming, Chen, Jian, Zhang, Danlei

    “…Edge computing has emerged as a popular paradigm for handling heterogeneous tasks to improve computing capacity and promote quality of service (QoS)…”
    Get full text
    Conference Proceeding
  10. 10

    FL-PTD: A Privacy Preserving Defense Strategy Against Poisoning Attacks in Federated Learning by Xia, Geming, Chen, Jian, Huang, Xinyi, Yu, Chaodong, Zhang, Zhong

    “…Federated learning allows participants to share models (gradients) rather than raw data to collaboratively train a global model, enhancing participants'…”
    Get full text
    Conference Proceeding
  11. 11

    Toward Dispersed Computing: Cases and State-of-The-Art by Yuan, Sen, Xia, Geming, Chen, Jian, Yu, Chaodong

    “…With the growth of IoT and latency-sensitive applications (e.g., virtual reality, autonomous driving), massive amounts of data are generated at the network and…”
    Get full text
    Conference Proceeding
  12. 12

    Adaptive Asynchronous Federated Learning for Edge Intelligence by Zhaohang, Wang, Geming, Xia, Jian, Chen, Chaodong, Yu

    “…Edge intelligence has received great attention for the rapid development and wild application of edge computing and artificial intelligence. As a key…”
    Get full text
    Conference Proceeding
  13. 13

    Survey on Edge Computing Security by Zeyu, Huang, Geming, Xia, Zhaohang, Wang, Sen, Yuan

    “…With the advent of the Internet of Everything, emerging application scenarios including autonomous driving, immersive games based on VR or AR technology, and…”
    Get full text
    Conference Proceeding
  14. 14

    A Blockchain-Based Traffic Conditions and Driving Behaviors Warning Scheme in the Internet of Vehicles by Bai, He, Wu, Cangshuai, Yang, Yuexiang, Xia, Geming, Jiang, Yue

    “…With the economic development, the number of cars is increasing, and the traffic accidents and congestion problems that follow will not be underestimated. The…”
    Get full text
    Conference Proceeding
  15. 15

    The Messaging Protocols Analysis of Integrating Blockchain and Edge Computing for IoT by Bai, He, Jiang, Yue, Yang, Hui, Xia, Geming

    “…The integration of blockchain (BC) and edge computing (EC) enables more reliable access and control for Internet of Things (IoT), providing faster network…”
    Get full text
    Conference Proceeding