Reviews
Description
Chapter 1 The Foundation of Edge Computing
1.1 Definition of Edge Computing
1.2 System Architecture of Edge Computing
1.3 Edge Computing vs Cloud Computing
1.4 Advantages of Edge Computing
Chapter 2 Privacy issues in Edge Computing
2.1 Research Challenges of Privacy Preserving in Edge Computing
2.2 Context-Aware Privacy Preserving
2.3 Location-Aware Privacy Preserving
Chapter 3 Context-Aware Privacy Preserving in Edge Computing
3.1 System Modeling
3.2 System Analysis
3.3 Reinforcement Learning in Optimal Defense Strategy3.4 Performance Evaluation
Chapter 4 Location-Aware Privacy Preserving in Edge Computing
4.1 System Modeling
4.2 System Analysis
4.3 Differential Privacy Protection Scheme
4.4 Performance Evaluation
4.5 From Automation to Intelligence
Chapter 5 Blockchain based Decentralized Privacy in Edge Computing
5.1 System Modeling
5.2 System Analysis
5.3 Blockchain enabled Federated Learning
5.4 Decentralized Privacy-Preserving Protocols
Chapter 6 Conclusion and Future Work
6.1 Conclusion6.2 Future Work
EXTRA 10 % discount with code: EXTRA
The promotion ends in 22d.00:43:55
The discount code is valid when purchasing from 10 €. Discounts do not stack.
Chapter 1 The Foundation of Edge Computing
1.1 Definition of Edge Computing
1.2 System Architecture of Edge Computing
1.3 Edge Computing vs Cloud Computing
1.4 Advantages of Edge Computing
Chapter 2 Privacy issues in Edge Computing
2.1 Research Challenges of Privacy Preserving in Edge Computing
2.2 Context-Aware Privacy Preserving
2.3 Location-Aware Privacy Preserving
Chapter 3 Context-Aware Privacy Preserving in Edge Computing
3.1 System Modeling
3.2 System Analysis
3.3 Reinforcement Learning in Optimal Defense Strategy3.4 Performance Evaluation
Chapter 4 Location-Aware Privacy Preserving in Edge Computing
4.1 System Modeling
4.2 System Analysis
4.3 Differential Privacy Protection Scheme
4.4 Performance Evaluation
4.5 From Automation to Intelligence
Chapter 5 Blockchain based Decentralized Privacy in Edge Computing
5.1 System Modeling
5.2 System Analysis
5.3 Blockchain enabled Federated Learning
5.4 Decentralized Privacy-Preserving Protocols
Chapter 6 Conclusion and Future Work
6.1 Conclusion6.2 Future Work
Reviews