@article{e41fd0590f9d48e5bc455f445f08ae22,
title = "Enhancing Security-Problem-Based Deep Learning in Mobile Edge Computing",
abstract = "The implementation of a variety of complex and energy-intensive mobile applications by resource-limited mobile devices (MDs) is a huge challenge. Fortunately, mobile edge computing (MEC) as a new computing paragon can offer rich resources to perform all or part of the MD's task, which greatly reduces the energy consumption of the MD and improves the quality of service (QoS) for applications. However, offloading tasks to the edge server is vulnerable to attacks such as tampering and snooping, resulting in a deep learning (DL) security feature developed by major cloud service providers. An effective security strategy method to minimize ongoing attacks in the MEC setting is proposed. The algorithm is based on the synthetic principle of a special set of strategies, and it can quickly construct suboptimal solutions even if the number of targets achieves hundreds of millions. In addition, for a given structure and a given number of patrollers, the upper bound of the protection level can be obtained, and the lower bound required for a given protection level can also be inferred. These bounds apply to universal strategies. By comparing with the previous three basic experiments, it can be proved that our algorithm is better than the previous ones in terms of security and running time. ",
keywords = "deep learning, mobile device, Mobile edge computing, quality of service, security strategies, suboptimal, synthetic theories",
author = "Xiao Zheng and Mingchu Li and Shah, {Syed Bilal Hussain} and Do, {Dinh Thuan} and Yuanfang Chen and Mavromoustakis, {Constandinos X.} and George Mastorakis and Evangelos Pallis",
note = "Funding Information: Xiao Zheng, Mingchu Li, and Syed Bilal Hussain Shah contributed equally to this research. The article is supported by the National Nature Science Foundation of China under grant Nos 61572095 and 61877007. Authors{\textquoteright} addresses: X. Zheng, School of Computer Science and Technology, Shandong University of Technology, 266 Xin-cun West Road, Zibo, China; email: xiao_zheng0910@163.com; M. Li, School of Software, Dalian University of Technology, Tuqiang Street, Dalian, Kaifaqu, China, 116620; email: mingchul@dlut.edu.cn; S. B. Hussain Shah, School of Computing and Mathematics, Manchester Metropolitan University, Metropolitan, Manchester, UK; email: S.Shah@mmu.ac.uk; D.-T. Do, Department of Computer Science and Information Engineering, Asia University, Taichung, Taichung, Taiwan; email: dod-inhthuan@asia.edu.tw; Y. Chen, Zhejiang University, Zhejiang, Hangzhou, China; email: yuanfangchen@gmail.com; C. X. Mavromoustakis, Department of Computer Science, Mobile Systems Laboratory (MoSys Lab), University of Nicosia and University of Nicosia Research Foundation, 46 Makedonitissas Avenue, Nicosia, Cyprus; email: mavromoustakis.c@unic.ac.cy; G. Mastorakis, Department of Management Science and Technology, Hellenic Mediterranean University, Agios Nikolaos, Crete, Greece, 72100; email: gmastorakis@hmu.gr; E. Pallis, Department of Electrical and Computer Engineering, Hellenic Mediterranean University, 1 Th{\o}rv{\"a}ld Circle, Heraklion, Greece; email: pallis@pasiphae.eu. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org. {\textcopyright} 2022 Association for Computing Machinery. 1533-5399/2022/05-ART49 $15.00 https://doi.org/10.1145/3458931 Publisher Copyright: {\textcopyright} 2022 Association for Computing Machinery.",
year = "2022",
month = may,
doi = "10.1145/3458931",
language = "English",
volume = "22",
journal = "ACM Transactions on Internet Technology",
issn = "1533-5399",
publisher = "Association for Computing Machinery (ACM)",
number = "2",
}