[1] |
梁芳, 佟恬, 马贺荣, 等. 东数西算下算力网络发展分析[J]. 信息通信技术与政策, 2022, 48(11): 79-83.
|
[2] |
郭亮. “东数西算”之五大热点问题探讨[J]. 通信世界, 2022, 909(23): 40-42.
|
[3] |
林成创, 檀童和, 曾桓涛, 等. “东数西算”赋能智慧交通行业发展[J]. 数据通信, 2023, 212(1): 24-27.
|
[4] |
解云鹏, 马思聪, 田毅, 等. 从“东数西算”甘肃节点看中国电信的算力调度探索与实践[J]. 通信世界, 2022, 908(22): 34-37.
|
[5] |
周勇, 郭转转, 曾沁, 等. 论“东数西算”对气象行业的影响[J]. 数据与计算发展前沿, 2022, 4(5): 42-49.
|
[6] |
钟瑛. 推动“东数西算”实现数据要素跨区域融通[J]. 北京观察, 2023, 389(3): 26.
|
[7] |
周成祖, 吴文, 蔡晓强. 基于分类分级的数据安全防控策略研究[J]. 数据与计算发展前沿, 2023, 5(1): 128-135.
|
[8] |
陈其宇, 许海兰. 大数据环境下数据安全传输与存储分析与研究[J]. 信息系统工程, 2023, 353(5):129-131.
|
[9] |
陈良臣. 大数据存储安全的关键技术研究[J]. 集成电路应用, 2021, 38(11): 46-47.
|
[10] |
郭丽. 工业互联网数据传输安全问题及改进策略研究[J]. 现代工业经济和信息化, 2022, 12(7): 117-119.
|
[11] |
CETOLA S. A Method for Comparative Analysis of Trusted Execution Environments[D]. Portland: Portland State University, 2021.
|
[12] |
ZHANG X, KANG Y, CHEN K, et al. Trading Off Privacy, Utility and Efficiency in Federated Learning[J/OL]. [2022-09-01]. ArXiv, abs/2209. 00230. https://arxiv.org/abs/2209.00230.
|
[13] |
张燕, 杨一帆, 伊人, 等. 隐私计算场景下数据质量治理探索与实践[J]. 大数据, 2022, 8(5): 55-73.
doi: 10.11959/j.issn.2096-0271.2022073
|
[14] |
ZHAN Y, ZHANG J, HONG Z, et al. A Survey of Incentive Mechanism Design for Federated Learning[J]. IEEE Transactions on Emerging Topics in Computing, 2022, 10(2): 1035-1044.
|
[15] |
LIM W Y B, LUONG N C, HOANG D T, et al. Federated Learning in Mobile Edge Networks: A Comprehensive Survey[J]. IEEE Communications Surveys & Tutorials, 2020, 22(3): 2031-2063.
|
[16] |
SERGEI A, BOHDAN T, FRANZ G, et al. SCONE: secure Linux containers with Intel SGX[C]. Proceedings of the 12th USENIX conference on Operating Systems Design and Implementation (OSDI'16), USENIX Association, USA, 2016: 689-703.
|
[17] |
SUZAKI K, NAKAJIMA K, OI T, et al. TS-Perf: General Performance Measurement of Trusted Execution Environment and Rich Execution Environment on Intel SGX, Arm TrustZone, and RISC-V Keystone[J]. IEEE Access, 2021, 9(1): 133520-133530.
doi: 10.1109/ACCESS.2021.3112202
|
[18] |
左亚兵, 王凯, 杨帆, 等. 基于用户偏好的协作内容缓存策略[J]. 计算机应用研究, 2022, 39(1): 123-127.
|
[19] |
CAI Y, LLORCA J, TULINO M A, et al. Joint Compute-Caching-Communication Control for Online Data-Intensive Service Delivery[J/OL]. [2022-09-01].ArXiv, abs/2205.01944. https://arxiv.org/abs/2205.01944.
|
[20] |
BEN-AMEUR A, ARALDO A, CHAHED T. Cache Allocation in Multi-Tenant Edge Computing via online Reinforcement Learning[C]. ICC 2022-IEEE International Conference on Communications, Seoul, Korea, 2022: 859-864.
|
[21] |
范灵俊, 郑卫城, 彭亚松, 等. “东数西算”工程落地的关键问题分析与对策建议[J]. 中国信息安全, 2023, 159(2): 100-104.
|
[22] |
ALE L, ZHANG N, FANG X, et al. Delay-Aware and Energy-Efficient Computation Offloading in Mobile-Edge Computing Using Deep Reinforcement Learning[J]. IEEE Transactions on Cognitive Communications and Networking, 2021, 7(3): 881-892.
doi: 10.1109/TCCN.2021.3066619
|
[23] |
ZHANG W, YU F, WANG X, et al. R2Fed: Resilient Reinforcement Federated Learning for Industrial Applications[J/OL]. IEEE Transactions on Industrial Informatics, 2022. doi:10.1109/TII.2022.3222369. https://ieeexplore.ieee.org/document/9950718.
|
[24] |
MAO Y, ZHANG J, SONG S H, et al. Stochastic Joint Radio and Computational Resource Management for Multi-User Mobile-Edge Computing Systems[J]. IEEE Transactions on Wireless Communications, 2017, 16(9): 5994-6009.
doi: 10.1109/TWC.2017.2717986
|
[25] |
隆云滔, 王磊, 刘海波. 跨境数据流动治理规则研究[J]. 数据与计算发展前沿, 2023, 5(1): 74-84.
|
[26] |
LILLICRAP T P, JONATHAN J H, ALEXANDER P, et al. Continuous control with deep reinforcement learning[J/OL]. [2015-09-09]. ArXiv,abs/1509.02971. https://arxiv.org/abs/1509.02971.
|
[27] |
JOHN S, SERGEY L, PHILIPP M, et al. Trust region policy optimization[C]. Proceedings of the 32nd International Conference on International Conference on Machine Learning, 2015, 37(ICML'15): 1889-1897.
|