Boopathi et al. propose a strategy to improve edge computing data privacy by utilizing secure transfer, DL optimization, and trust-based encryption …
http://dlvr.it/THbqrh

Tags

Leave a comment