{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T11:30:52Z","timestamp":1767007852717,"version":"3.46.0"},"reference-count":37,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Knowledge-Based Systems"],"published-print":{"date-parts":[[2025,11]]},"DOI":"10.1016\/j.knosys.2025.114431","type":"journal-article","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T23:54:40Z","timestamp":1757375680000},"page":"114431","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"PA","title":["Optimized task offloading with energy efficient communication and optimal offloading network: a mobility and energy-efficient approach for augmented reality in mobile edge computing"],"prefix":"10.1016","volume":"330","author":[{"given":"Anitha Jebamani","family":"Soundararaj","sequence":"first","affiliation":[]},{"given":"Godfrey","family":"Winster Sathianesan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"12","key":"10.1016\/j.knosys.2025.114431_bib0001","doi-asserted-by":"crossref","first-page":"5459","DOI":"10.3390\/s23125459","article-title":"Defending the defender: adversarial learning based defending strategy for learning based security methods in cyber-physical systems (CPS)","volume":"23","author":"Sheikh","year":"2023","journal-title":"Sensors"},{"issue":"2","key":"10.1016\/j.knosys.2025.114431_bib0002","doi-asserted-by":"crossref","first-page":"62","DOI":"10.3390\/fi15020062","article-title":"Adversarial machine learning attacks against intrusion detection systems: a survey on strategies and defense","volume":"15","author":"Alotaibi","year":"2023","journal-title":"Futur. Internet"},{"issue":"12","key":"10.1016\/j.knosys.2025.114431_bib0003","doi-asserted-by":"crossref","first-page":"3815","DOI":"10.3390\/s24123815","article-title":"Security control of cyber\u2013physical systems under cyber attacks: a survey","volume":"24","author":"Xing","year":"2024","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.knosys.2025.114431_bib0004","doi-asserted-by":"crossref","first-page":"32","DOI":"10.3390\/fi16010032","article-title":"A holistic review of machine learning adversarial attacks in IoT networks","volume":"16","author":"Khazane","year":"2024","journal-title":"Futur. Internet"},{"key":"10.1016\/j.knosys.2025.114431_bib0005","doi-asserted-by":"crossref","first-page":"41796","DOI":"10.1109\/ACCESS.2023.3270225","article-title":"Attack detection for medical cyber-physical systems\u2013a systematic literature review","volume":"11","author":"Weber","year":"2023","journal-title":"IEEE Access"},{"issue":"13","key":"10.1016\/j.knosys.2025.114431_bib0006","first-page":"5206","article-title":"Review of cyberattack implementation, detection, and mitigation methods in cyber-physical systems","volume":"16","author":"Mtukushe","year":"2023","journal-title":"Energ. (Basel)"},{"key":"10.1016\/j.knosys.2025.114431_bib0007","doi-asserted-by":"crossref","first-page":"29414","DOI":"10.1109\/ACCESS.2024.3364362","article-title":"A survey on cyber-physical security of active distribution networks in smart grids","volume":"12","author":"Khalaf","year":"2024","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.knosys.2025.114431_bib0008","doi-asserted-by":"crossref","first-page":"233","DOI":"10.3390\/math11010233","article-title":"Cyber security for detecting distributed denial of service attacks in agriculture 4.0: deep learning model","volume":"11","author":"Aldhyani","year":"2023","journal-title":"Mathematics"},{"issue":"6","key":"10.1016\/j.knosys.2025.114431_bib0009","doi-asserted-by":"crossref","first-page":"428","DOI":"10.3390\/info16060428","article-title":"Mitigating impact of data poisoning attacks on CPS anomaly detection with provable guarantees","volume":"16","author":"Abedzadeh","year":"2025","journal-title":"Information"},{"issue":"6","key":"10.1016\/j.knosys.2025.114431_bib0010","doi-asserted-by":"crossref","first-page":"199","DOI":"10.3390\/fi15060199","article-title":"Deep neural networks for spatial-temporal cyber-physical systems: a survey","volume":"15","author":"Musa","year":"2023","journal-title":"Futur. Internet"},{"issue":"8","key":"10.1016\/j.knosys.2025.114431_bib0011","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1007\/s00607-023-01171-z","article-title":"Energy-aware scheduling for spark job based on deep reinforcement learning in cloud","volume":"105","author":"Li","year":"2023","journal-title":"Computing"},{"issue":"12","key":"10.1016\/j.knosys.2025.114431_bib0012","first-page":"2719","article-title":"An ai-enhanced strategy of service offloading for iov in mobile edge computing","volume":"12","author":"Peng","year":"2023","journal-title":"Electron. (Basel)"},{"issue":"2","key":"10.1016\/j.knosys.2025.114431_bib0013","doi-asserted-by":"crossref","first-page":"204","DOI":"10.3390\/mi12020204","article-title":"An efficient computation offloading strategy with mobile edge computing for IoT","volume":"12","author":"Fang","year":"2021","journal-title":"Micromach. (Basel)"},{"issue":"4","key":"10.1016\/j.knosys.2025.114431_bib0014","doi-asserted-by":"crossref","first-page":"266","DOI":"10.3390\/drones7040266","article-title":"A self-adaptive trajectory optimization algorithm using fuzzy logic for mobile edge computing system assisted by unmanned aerial vehicle","volume":"7","author":"Subburaj","year":"2023","journal-title":"Drones"},{"issue":"6","key":"10.1016\/j.knosys.2025.114431_bib0015","doi-asserted-by":"crossref","first-page":"139","DOI":"10.3390\/drones6060139","article-title":"Deep learning-based energy optimization for edge device in UAV-aided communications","volume":"6","author":"Chen","year":"2022","journal-title":"Drones"},{"issue":"1","key":"10.1016\/j.knosys.2025.114431_bib0016","doi-asserted-by":"crossref","first-page":"229","DOI":"10.3390\/s21010229","article-title":"Mobility-included DNN partition offloading from mobile devices to edge clouds","volume":"21","author":"Tian","year":"2021","journal-title":"Sensors"},{"issue":"8","key":"10.1016\/j.knosys.2025.114431_bib0017","doi-asserted-by":"crossref","first-page":"2628","DOI":"10.3390\/s21082628","article-title":"Multi-objective whale optimization algorithm for computation offloading optimization in mobile edge computing","volume":"21","author":"Huang","year":"2021","journal-title":"Sensors"},{"issue":"13","key":"10.1016\/j.knosys.2025.114431_bib0018","doi-asserted-by":"crossref","first-page":"4592","DOI":"10.3390\/s21134592","article-title":"Gait-based implicit authentication using edge computing and deep learning for mobile devices","volume":"21","author":"Zeng","year":"2021","journal-title":"Sensors"},{"issue":"7","key":"10.1016\/j.knosys.2025.114431_bib0019","doi-asserted-by":"crossref","first-page":"3312","DOI":"10.3390\/app12073312","article-title":"COME-UP: computation offloading in mobile edge computing with LSTM based user direction prediction","volume":"12","author":"Zaman","year":"2022","journal-title":"Appl. Sci."},{"issue":"6","key":"10.1016\/j.knosys.2025.114431_bib0020","doi-asserted-by":"crossref","first-page":"4051","DOI":"10.1007\/s10586-022-03809-7","article-title":"A multi-objective task offloading based on BBO algorithm under deadline constrain in mobile edge computing","volume":"26","author":"Li","year":"2023","journal-title":"Cluster Comput."},{"issue":"8","key":"10.1016\/j.knosys.2025.114431_bib0021","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1007\/s00607-023-01171-z","article-title":"Energy-aware scheduling for spark job based on deep reinforcement learning in cloud","volume":"105","author":"Li","year":"2023","journal-title":"Computing"},{"key":"10.1016\/j.knosys.2025.114431_bib0022","article-title":"Energy-efficient offloading based on hybrid bio-inspired algorithm for edge\u2013cloud integrated computation","volume":"42","author":"Li","year":"2024","journal-title":"Sustain. Comput.: Informat. Syst."},{"key":"10.1016\/j.knosys.2025.114431_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.future.2024.107681","article-title":"Energy-aware scheduling and two-tier coordinated load balancing for streaming applications in apache flink","volume":"166","author":"Li","year":"2025","journal-title":"Futur. Generat. Comput. Syst."},{"issue":"1","key":"10.1016\/j.knosys.2025.114431_bib0024","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/s11227-019-03036-9","article-title":"CSL-driven and energy-efficient resource scheduling in cloud data center","volume":"76","author":"Li","year":"2020","journal-title":"J. Supercomput."},{"issue":"3","key":"10.1016\/j.knosys.2025.114431_bib0025","doi-asserted-by":"crossref","first-page":"2793","DOI":"10.1007\/s10586-017-0893-5","article-title":"Energy-efficient and QoS-aware model based resource consolidation in cloud data centers","volume":"20","author":"Li","year":"2017","journal-title":"Cluster Comput."},{"key":"10.1016\/j.knosys.2025.114431_bib0026","article-title":"TJCCT: a two-timescale approach for UAV-assisted mobile edge computing","author":"Sun","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"11","key":"10.1016\/j.knosys.2025.114431_bib0027","doi-asserted-by":"crossref","first-page":"4088","DOI":"10.3390\/s22114088","article-title":"Deep learning-based dynamic computation task offloading for mobile edge computing networks","volume":"22","author":"Yang","year":"2022","journal-title":"Sensors"},{"issue":"1","key":"10.1016\/j.knosys.2025.114431_bib0028","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1186\/s13638-022-02114-6","article-title":"A survey on next location prediction techniques, applications, and challenges","volume":"2022","author":"Chekol","year":"2022","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"3","key":"10.1016\/j.knosys.2025.114431_bib0029","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1007\/s41315-022-00258-8","article-title":"Concatenated deep features with modified LSTM for enhanced crop disease classification","volume":"7","author":"Farooqui","year":"2023","journal-title":"Int. J. Intell. Robot. Appl."},{"key":"10.1016\/j.knosys.2025.114431_bib0030","doi-asserted-by":"crossref","DOI":"10.1016\/j.patcog.2023.109377","article-title":"Cascaded feature fusion with multi-level self-attention mechanism for object detection","volume":"138","author":"Wang","year":"2023","journal-title":"Pattern Recognit."},{"key":"10.1016\/j.knosys.2025.114431_bib0031","doi-asserted-by":"crossref","DOI":"10.1016\/j.compeleceng.2023.108769","article-title":"Gray wolf optimization-based wind power load mid-long term forecasting algorithm","volume":"109","author":"Cai","year":"2023","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"10.1016\/j.knosys.2025.114431_bib0032","doi-asserted-by":"crossref","first-page":"1427","DOI":"10.32604\/iasc.2022.017304","article-title":"Comparative research directions of population initialization techniques using PSO algorithm","volume":"32","author":"Pervaiz","year":"2022","journal-title":"Intell. Automat. Soft Comput."},{"key":"10.1016\/j.knosys.2025.114431_bib0033","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.engappai.2019.06.017","article-title":"A hybrid optimization algorithm based on cuckoo search and differential evolution for solving constrained engineering problems","volume":"85","author":"Zhang","year":"2019","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"2","key":"10.1016\/j.knosys.2025.114431_bib0034","doi-asserted-by":"crossref","first-page":"556","DOI":"10.3390\/app14020556","article-title":"Allocation and sizing of DSTATCOM with renewable energy systems and load uncertainty using enhanced gray wolf optimization","volume":"14","author":"Mohammedi","year":"2024","journal-title":"Appl. Sci."},{"issue":"3","key":"10.1016\/j.knosys.2025.114431_bib0035","first-page":"1152","article-title":"Review and comparison of genetic algorithm and particle swarm optimization in the optimal power flow problem","volume":"16","author":"Papazoglou","year":"2023","journal-title":"Energ. (Basel)"},{"issue":"7","key":"10.1016\/j.knosys.2025.114431_bib0036","first-page":"927","article-title":"Novel hybrid crayfish optimization algorithm and self-adaptive differential evolution for solving complex optimization problems","volume":"16","author":"Fakhouri","year":"2024","journal-title":"Symmet. (Basel)"},{"issue":"2","key":"10.1016\/j.knosys.2025.114431_bib0037","doi-asserted-by":"crossref","first-page":"697","DOI":"10.3390\/app13020697","article-title":"Modified genetic algorithm with deep learning for fraud transactions of ethereum smart contract","volume":"13","author":"Aziz","year":"2023","journal-title":"Appl. Sci."}],"container-title":["Knowledge-Based Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705125014704?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705125014704?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,30]],"date-time":"2025-11-30T07:33:59Z","timestamp":1764488039000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950705125014704"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":37,"alternative-id":["S0950705125014704"],"URL":"https:\/\/doi.org\/10.1016\/j.knosys.2025.114431","relation":{},"ISSN":["0950-7051"],"issn-type":[{"type":"print","value":"0950-7051"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Optimized task offloading with energy efficient communication and optimal offloading network: a mobility and energy-efficient approach for augmented reality in mobile edge computing","name":"articletitle","label":"Article Title"},{"value":"Knowledge-Based Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.knosys.2025.114431","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"114431"}}