Legitimate Surveillance of Suspicious Computation Offloading in Mobile Edge Computing Networks.
Ding XuHongbo ZhuPublished in: IEEE Trans. Commun. (2022)
Keyphrases
- efficiently computing
- mobile devices
- mobile wireless
- delay tolerant
- edge information
- anomaly detection
- edge detection
- computing environments
- efficient computation
- mobile phone
- mobile learning
- network connectivity
- network analysis
- surveillance videos
- computer networks
- wireless technologies
- mobile terminals
- heterogeneous networks
- mobile environments
- detect malicious
- multi camera
- edge map
- mobile computing
- social networks
- m learning
- mobile users
- surveillance system
- complex networks
- context aware
- computer vision