4.7 Article

A Deep Reinforcement Learning-Based Resource Management Game in Vehicular Edge Computing

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TITS.2021.3114295

关键词

Resource management; Servers; Games; Edge computing; Reinforcement learning; Pricing; Computational modeling; Resource management; Stackelberg pricing game; deep reinforcement learning; vehicular edge computing

资金

  1. National Natural Science Foundation of China [62072475, 61772554]
  2. Hunan Provincial Natural Science Foundation of China [2020JJ4317]

向作者/读者索取更多资源

The study investigates the competitive interactions between VEC servers and vehicles, proposing a resource management scheme based on Stackelberg game and deep reinforcement learning.
Vehicular Edge Computing (VEC) is a promising paradigm that leverages the vehicles to offload computation tasks to the nearby VEC server with the aim of supporting the low latency vehicular application scenarios. Incentivizing VEC servers to participate in computation offloading activities and make full use of computation resources is of great importance to the success of intelligent transportation services. In this paper, we formulate the competitive interactions between the VEC servers and vehicles as a two-stage Stackelberg game with the VEC servers as the leader players and the vehicles as the followers. After obtaining the full information of vehicles, the VEC server calculates the unit price of computation resource. Given the unit prices announced by VEC server, the vehicles determine the amount of computation resource to purchase from VEC server. In the scenario that vehicles do not want to share their computation demands, a deep reinforcement learning based resource management scheme is proposed to maximize the profits of vehicles and VEC server. The extensive experimental results have demonstrated the effectiveness of our proposed resource management scheme based on Stackelberg game and deep reinforcement learning.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Chemistry, Multidisciplinary

An Improved Multiple-Target Tracking Scheme Based on IGGM-PMBM for Mobile Aquaculture Sensor Networks

Chunfeng Lv, Jianping Zhu, Naixue Xiong, Zhengsu Tao

Summary: This paper proposes an improved multitarget tracking method based on a PMBM filter with adaptive detection probability and adaptive newborn distribution to address the problems of unknown detection probability, random target newborn distribution, and high energy consumption in limited computational and processing capacity in sensor networks. The proposed method introduces the gamma distribution to represent the augmented state of unknown and changing target detection probability. The intensity of newborn targets is adaptively derived from the inverse gamma distribution based on this augmented state. The effectiveness of this IGGM-PMBM method is verified through comprehensive experiments, and comparisons with other multitarget tracking filters demonstrate significant improvements in tracking behaviors, especially in reducing tracking energy consumption and enhancing tracking accuracy.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Information Systems

Intelligent Delay-Aware Partial Computing Task Offloading for Multiuser Industrial Internet of Things Through Edge Computing

Xiaoheng Deng, Jian Yin, Peiyuan Guan, Neal N. Xiong, Lan Zhang, Shahid Mumtaz

Summary: The development of Industrial Internet of Things (IIoT) and Industry 4.0 has transformed the traditional manufacturing industry. With the mobile-edge computing (MEC) system, computation-intensive tasks can be offloaded from resource-constrained IIoT devices to nearby MEC servers, resulting in lower delay and energy consumption for better Quality of Service (QoS).

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Multidisciplinary Sciences

The secure judgment of graphic similarity against malicious adversaries and its applications

Xin Liu, Yang Xu, Dan Luo, Gang Xu, Neal Xiong, Xiu-Bo Chen

Summary: This paper studies the similarity problem of geometric graphics and proposes a graphic similarity security decision protocol, which has wide application value in various fields.

SCIENTIFIC REPORTS (2023)

Editorial Material Physics, Mathematical

Advances in Information Entropy

Bin Wang, Naixue Xiong, Fengming Xin

ADVANCES IN MATHEMATICAL PHYSICS (2023)

Article Computer Science, Theory & Methods

ALPS: Achieving accuracy-aware location privacy service via assisted regions

Shaobo Zhang, Tao Guo, Qin Liu, Entao Luo, Kim-Kwang Raymond Choo, Guojun Wang

Summary: This paper proposes an accuracy-aware location privacy service, named ALPS, based on assisted regions to protect user location privacy while ensuring the accuracy of services. Two novel mechanisms (assisted regions mechanism and query obfuscation mechanism) are devised to protect user location privacy and ensure the accuracy of LSSs based on trilateration. Theoretical analysis and experimental evaluation demonstrate that our scheme can protect location privacy without compromising the accuracy of LSSs.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Computer Science, Information Systems

Aerial Edge Computing: Flying Attitude-Aware Collaboration for Multi-UAV

Jianwen Xu, Kaoru Ota, Mianxiong Dong

Summary: With continuous innovation in manufacturing, UAVs have become commodities from professional equipment. Quadrotor UAVs, as a universal type, show potential for applications in multiple fields. In the field of aerial computing, UAVs have started to play a leading role in providing computing services. However, due to limitations in onboard equipment performance, relying on a single UAV for complex computing tasks is not feasible.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Engineering, Electrical & Electronic

A Covert Jamming Scheme Against an Intelligent Eavesdropper in Cooperative Cognitive Radio Networks

Yingkun Wen, Lei Liu, Junhuai Li, Xiangwang Hou, Ning Zhang, Mianxiong Dong, Mohammed Atiquzzaman, Kan Wang, Yan Huo

Summary: In this work, a covert jamming scheme is designed to protect the primary message from intelligent eavesdroppers in cognitive radio networks. The detection error probability is derived and used to formulate the covert jamming scheme, which is then optimized to maximize secrecy performance and effective secrecy throughput.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Information Systems

A decentralized trust inference approach with intelligence to improve data collection quality for mobile crowd sensing

Xuezheng Yang, Zhiwen Zeng, Anfeng Liu, Neal N. Xiong, Tian Wang, Shaobo Zhang

Summary: In this paper, a decentralized trust inference approach is proposed to improve the data collection quality for mobile crowd sensing. The approach includes trust evaluation and data filling components, which assess the trust level of workers and fill missing data using Bayesian probabilistic matrix factorization. Furthermore, a worker recruitment method based on trust prioritization and bid ratio is proposed to preferentially select reliable and low-bid workers, thereby improving data quality and reducing costs.

INFORMATION SCIENCES (2023)

Article Computer Science, Information Systems

Efficient reversible data hiding via two layers of double-peak embedding

Fuhu Wu, Jian Sun, Shun Zhang, Neal Xiong, Hong Zhong

Summary: This paper proposes an efficient reversible data hiding scheme through a double-peak two-layer embedding and prediction error expansion. By utilizing the higher significant bit (HSB) plane and double prediction error peaks, the redundancy space of images can be fully utilized. Moreover, the size of the auxiliary information is reduced through pre-processing. Experimental results demonstrate that this scheme performs better in high capacity embedding scenarios and achieves a 83% higher embedding rate on real-world datasets, such as BOSSbase, BOWS2, and UCID, compared to state-of-the-art approaches.

INFORMATION SCIENCES (2023)

Article Computer Science, Information Systems

Pushing the Charging Distance Beyond Near Field by Antenna Design

Shibo He, Yuyi Sun, Yuan Wu, Mianxiong Dong, Zhiguo Shi

Summary: Wireless charging is a popular technology in IoT that eliminates the need for batteries in electronic devices. This article presents a wireless charging antenna design that extends the charging distance from 5 to 55 cm, achieving a ten-fold improvement compared to near-field commercial communication. The authors model the near-field signal propagation with higher-order factors and establish the relationship between geometry parameters and transmit power, utilizing a greedy search algorithm to optimize coil parameters and maximize charging distance.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Nested Hash Access With Post Quantum Encryption for Mission-Critical IoT Communications

Dongyang Xu, Lei Liu, Ning Zhang, Mianxiong Dong, Victor C. M. Leung, James A. Ritcey

Summary: Protecting the initial access of IoT devices over wireless channels is challenging, especially when malicious quantum adversaries tamper critical wireless messages. We propose a nested hash access system with post-quantum encryption to solve this issue. The system encodes and decodes preambles precisely and resiliently using random repetition coding and nested hash coding on multidomain physical-layer resources.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

AQND: An asymmetric quorum-based neighbor discovery protocol for reducing delay in sensor based systems

Ziqing Xia, Zhangyang Gao, Anfeng Liu, Neal N. Xiong

Summary: In this paper, an asymmetric quorum-based neighbor discovery (AQND) protocol is proposed to reduce delay, improve energy utilization and lifetime, and outperform previous strategies in main performance indicators.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

DDSR: A delay differentiated services routing scheme to reduce deployment costs for the Internet of Things

Xiaohuan Liu, Anfeng Liu, Shaobo Zhang, Tian Wang, Neal N. Xiong

Summary: This paper proposes a delay differentiated services routing (DDSR) scheme to reduce the deployment costs for wireless sensor networks (WSNs) with wake-up radio (WuR) functionality, while meeting the delay requirement of forwarding urgent data and maintaining a long lifetime.

INFORMATION SCIENCES (2024)

Article Computer Science, Artificial Intelligence

An improved weighted ensemble clustering based on two-tier uncertainty measurement

Qinghua Gu, Yan Wang, Peipei Wang, Xuexian Li, Lu Chen, Neal N. Xiong, Di Liu

Summary: This paper proposes a new ensemble clustering method that combines the influence of cluster level and the base clustering level in a unified framework. The method inserts a global weighting strategy into a local ensemble cluster learning framework, improving the robustness and stability of clustering.

EXPERT SYSTEMS WITH APPLICATIONS (2024)

暂无数据