Boopathi et al. propose a strategy to improve edge computing data privacy by utilizing secure transfer, DL optimization, and trust-based encryption …
http://dlvr.it/THbqrh

Written in
by
Boopathi et al. propose a strategy to improve edge computing data privacy by utilizing secure transfer, DL optimization, and trust-based encryption …
http://dlvr.it/THbqrh
Tags
Leave a comment