menu
{ "item_title" : "Privacy-Preserving in Edge Computing", "item_author" : [" Longxiang Gao", "Tom H. Luan", "Bruce Gu "], "item_description" : "Chapter 1 The Foundation of Edge Computing1.1 Definition of Edge Computing1.2 System Architecture of Edge Computing1.3 Edge Computing vs Cloud Computing1.4 Advantages of Edge ComputingChapter 2 Privacy issues in Edge Computing2.1 Research Challenges of Privacy Preserving in Edge Computing2.2 Context-Aware Privacy Preserving2.3 Location-Aware Privacy PreservingChapter 3 Context-Aware Privacy Preserving in Edge Computing3.1 System Modeling3.2 System Analysis3.3 Reinforcement Learning in Optimal Defense Strategy3.4 Performance EvaluationChapter 4 Location-Aware Privacy Preserving in Edge Computing4.1 System Modeling4.2 System Analysis4.3 Differential Privacy Protection Scheme4.4 Performance Evaluation4.5 From Automation to IntelligenceChapter 5 Blockchain based Decentralized Privacy in Edge Computing5.1 System Modeling5.2 System Analysis5.3 Blockchain enabled Federated Learning5.4 Decentralized Privacy-Preserving ProtocolsChapter 6 Conclusion and Future Work6.1 Conclusion6.2 Future Work", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/9/81/162/201/9811622019_b.jpg", "price_data" : { "retail_price" : "169.99", "online_price" : "169.99", "our_price" : "169.99", "club_price" : "169.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Privacy-Preserving in Edge Computing|Longxiang Gao

Privacy-Preserving in Edge Computing

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Chapter 1 The Foundation of Edge Computing

1.1 Definition of Edge Computing

1.2 System Architecture of Edge Computing

1.3 Edge Computing vs Cloud Computing

1.4 Advantages of Edge Computing

Chapter 2 Privacy issues in Edge Computing

2.1 Research Challenges of Privacy Preserving in Edge Computing

2.2 Context-Aware Privacy Preserving

2.3 Location-Aware Privacy Preserving

Chapter 3 Context-Aware Privacy Preserving in Edge Computing

3.1 System Modeling

3.2 System Analysis

3.3 Reinforcement Learning in Optimal Defense Strategy

3.4 Performance Evaluation

Chapter 4 Location-Aware Privacy Preserving in Edge Computing

4.1 System Modeling

4.2 System Analysis

4.3 Differential Privacy Protection Scheme

4.4 Performance Evaluation

4.5 From Automation to Intelligence

Chapter 5 Blockchain based Decentralized Privacy in Edge Computing

5.1 System Modeling

5.2 System Analysis

5.3 Blockchain enabled Federated Learning

5.4 Decentralized Privacy-Preserving Protocols

Chapter 6 Conclusion and Future Work

6.1 Conclusion

6.2 Future Work


This item is Non-Returnable

Details

  • ISBN-13: 9789811622014
  • ISBN-10: 9811622019
  • Publisher: Springer
  • Publish Date: June 2022
  • Dimensions: 9.21 x 6.14 x 0.27 inches
  • Shipping Weight: 0.42 pounds
  • Page Count: 113

Related Categories

You May Also Like...

    1

BAM Customer Reviews