{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:57:59Z","timestamp":1775667479906,"version":"3.50.1"},"reference-count":54,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1016\/j.comnet.2025.111280","type":"journal-article","created":{"date-parts":[[2025,4,12]],"date-time":"2025-04-12T17:19:37Z","timestamp":1744478377000},"page":"111280","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["Performance enhancement of UAV-enabled MEC systems through intelligent task offloading and resource allocation"],"prefix":"10.1016","volume":"264","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7022-3571","authenticated-orcid":false,"given":"Mohsen","family":"Darchini-Tabrizi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5598-1808","authenticated-orcid":false,"given":"Amirali","family":"Pakdaman-Donyavi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3356-661X","authenticated-orcid":false,"given":"Reza","family":"Entezari-Maleki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8066-221X","authenticated-orcid":false,"given":"Leonel","family":"Sousa","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"12","key":"10.1016\/j.comnet.2025.111280_b1","doi-asserted-by":"crossref","first-page":"9310","DOI":"10.1109\/JIOT.2021.3130434","article-title":"Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system","volume":"9","author":"Zhou","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"110791","key":"10.1016\/j.comnet.2025.111280_b2","article-title":"Task offloading strategies for mobile edge computing: A survey","volume":"254","author":"Dong","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2025.111280_b3","article-title":"A survey of mobile cloud computing: Architecture, applications, and approaches","volume":"13","author":"Thai","year":"2013","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"10.1016\/j.comnet.2025.111280_b4","doi-asserted-by":"crossref","first-page":"14908","DOI":"10.1109\/ACCESS.2018.2812144","article-title":"Task offloading in heterogeneous mobile cloud computing: Modeling, analysis, and cloudlet deployment","volume":"6","author":"Lee","year":"2018","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.comnet.2025.111280_b5","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1109\/COMST.2017.2682318","article-title":"Mobile edge computing: A survey on architecture and computation offloading","volume":"19","author":"Mach","year":"2017","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"100868","key":"10.1016\/j.comnet.2025.111280_b6","article-title":"Dependent task offloading with deadline-aware scheduling in mobile edge networks","volume":"23","author":"Maray","year":"2023","journal-title":"Internet Things"},{"issue":"4","key":"10.1016\/j.comnet.2025.111280_b7","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/2721914.2721921","article-title":"A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets","author":"Satyanarayanan","year":"2015","journal-title":"GetMobile: Mob. Comput. Commun."},{"issue":"1","key":"10.1016\/j.comnet.2025.111280_b8","first-page":"1","article-title":"SCOF: Security-aware computation offloading using federated reinforcement learning in industrial internet of things with edge computing","author":"Peng","year":"2024","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"1","key":"10.1016\/j.comnet.2025.111280_b9","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/JIOT.2017.2750180","article-title":"Mobile edge computing: A survey","volume":"5","author":"Abbas","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2025.111280_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.sysarc.2021.102225","article-title":"A survey on task offloading in multi-access edge computing","volume":"118","author":"Islam","year":"2021","journal-title":"J. Syst. Archit."},{"issue":"4","key":"10.1016\/j.comnet.2025.111280_b11","doi-asserted-by":"crossref","first-page":"2322","DOI":"10.1109\/COMST.2017.2745201","article-title":"A survey on mobile edge computing: The communication perspective","volume":"19","author":"Mao","year":"2017","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"9","key":"10.1016\/j.comnet.2025.111280_b12","doi-asserted-by":"crossref","first-page":"6847","DOI":"10.1109\/TWC.2022.3152573","article-title":"Event-driven computation offloading in IoT with edge computing","volume":"21","author":"Wei","year":"2022","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"107496","key":"10.1016\/j.comnet.2025.111280_b13","article-title":"A survey on the computation offloading approaches in mobile edge computing: A machine learning-based perspective","volume":"182","author":"Shakarami","year":"2020","journal-title":"Comput. Netw."},{"issue":"108439","key":"10.1016\/j.comnet.2025.111280_b14","article-title":"Computation offloading over multi-UAV mec network: A distributed deep reinforcement learning approach","volume":"199","author":"Wei","year":"2021","journal-title":"Comput. Netw."},{"issue":"6","key":"10.1016\/j.comnet.2025.111280_b15","doi-asserted-by":"crossref","DOI":"10.3390\/s24061837","article-title":"Trajectory-aware offloading decision in UAV-aided edge computing: A comprehensive survey","volume":"24","author":"Baidya","year":"2024","journal-title":"Sensors"},{"issue":"3","key":"10.1016\/j.comnet.2025.111280_b16","first-page":"3448","article-title":"Joint task offloading and resource optimization in NOMA-based vehicular edge computing: A game-theoretic DRL approach","volume":"18","author":"Xu","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"109940","key":"10.1016\/j.comnet.2025.111280_b17","article-title":"Energy-efficient task offloading and trajectory planning in UAV-enabled mobile edge computing networks","volume":"234","author":"Li","year":"2023","journal-title":"Comput. Netw."},{"issue":"34","key":"10.1016\/j.comnet.2025.111280_b18","article-title":"Joint task offloading based on distributed deep reinforcement learning-based genetic optimization algorithm for internet of vehicles","volume":"22","author":"Jin","year":"2024","journal-title":"J. Grid Comput."},{"issue":"119849","key":"10.1016\/j.comnet.2025.111280_b19","article-title":"Deep reinforcement learning-based online task offloading in mobile edge computing networks","volume":"654","author":"Wu","year":"2024","journal-title":"Inform. Sci."},{"key":"10.1016\/j.comnet.2025.111280_b20","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2024.103411","article-title":"Mobility-aware task offloading in MEC with task migration and result caching","volume":"156","author":"Lai","year":"2024","journal-title":"Ad Hoc Networks"},{"key":"10.1016\/j.comnet.2025.111280_b21","article-title":"Rainbow: Combining improvements in deep reinforcement learning","volume":"32","author":"Hessel","year":"2017","journal-title":"Proc. the AAAI Conf. Artif. Intell."},{"issue":"20","key":"10.1016\/j.comnet.2025.111280_b22","doi-asserted-by":"crossref","first-page":"20681","DOI":"10.1109\/JIOT.2022.3175760","article-title":"Modeling on energy-efficiency computation offloading using probabilistic action generating","volume":"9","author":"Wang","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.comnet.2025.111280_b23","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1109\/LWC.2022.3149007","article-title":"Constrained multi-objective optimization for UAV-enabled mobile edge computing: Offloading optimization and path planning","volume":"11","author":"Peng","year":"2022","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"100996","key":"10.1016\/j.comnet.2025.111280_b24","article-title":"Dynamic offloading technique for real-time edge-to-cloud computing in heterogeneous MEC\u2013MCC and IoT devices","volume":"24","author":"Khan","year":"2023","journal-title":"Internet Things"},{"key":"10.1016\/j.comnet.2025.111280_b25","doi-asserted-by":"crossref","unstructured":"S. Tripathi, P. Kumar, M. Chaitanya, N. Teja, R. Misra, T. Singh, Dueling Double DQN with Attention for Optimized Offloading in Wireless-Powered Edge-Enabled Mobile Computing Networks, in: IEEE International Conference on Big Data (BigData), 2024, pp. 4420\u20134428.","DOI":"10.1109\/BigData62323.2024.10825921"},{"issue":"2","key":"10.1016\/j.comnet.2025.111280_b26","doi-asserted-by":"crossref","first-page":"1539","DOI":"10.1109\/TNSM.2021.3135389","article-title":"Joint computation offloading and resource allocation under task-overflowed situations in mobile-edge computing","volume":"19","author":"Tang","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"10.1016\/j.comnet.2025.111280_b27","doi-asserted-by":"crossref","unstructured":"Y. Gao, Z. Li, Energy and Delay-Aware Task Offloading and Resource Allocation in Mobile Edge Computing, in: IEEE 25th International Conference on Computer Supported Cooperative Work in Design, CSCWD, Hangzhou, China, 2022, pp. 1335\u20131340.","DOI":"10.1109\/CSCWD54268.2022.9776276"},{"issue":"18","key":"10.1016\/j.comnet.2025.111280_b28","doi-asserted-by":"crossref","first-page":"17565","DOI":"10.1109\/JSEN.2022.3182779","article-title":"Energy efficient task caching and offloading in UAV-enabled crowd management","volume":"22","author":"Wu","year":"2022","journal-title":"IEEE Sensors J."},{"issue":"90","key":"10.1016\/j.comnet.2025.111280_b29","article-title":"Integrating of IOTA-based blockchain with edge computing for task offloading powering the metaverse","volume":"28","author":"Priyadarshni","year":"2025","journal-title":"Clust. Comput."},{"key":"10.1016\/j.comnet.2025.111280_b30","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1109\/TSIPN.2022.3171336","article-title":"Deep reinforcement learning-based cloud-edge collaborative mobile computation offloading in industrial networks","volume":"8","author":"Chen","year":"2022","journal-title":"IEEE Trans. Signal Inf. Process. over Networks"},{"key":"10.1016\/j.comnet.2025.111280_b31","doi-asserted-by":"crossref","unstructured":"Q. Jiang, X. Xu, Q. He, X. Zhang, F. Dai, L. Qi, W. Dou, Game Theory-Based Task Offloading and Resource Allocation for Vehicular Networks in Edge-Cloud Computing, in: IEEE International Conference on Web Services, ICWS, Chicago, IL, USA, 2021, pp. 341\u2013346.","DOI":"10.1109\/ICWS53863.2021.00052"},{"issue":"110282","key":"10.1016\/j.comnet.2025.111280_b32","article-title":"Qos-aware task offloading and resource allocation optimization in vehicular edge computing networks via MADDPG","volume":"242","author":"Liu","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2025.111280_b33","first-page":"132","article-title":"Trajectory optimization and computing offloading strategy in UAV-enabled MEC system","author":"Gan","year":"2021","journal-title":"Comput. Commun. IoT Appl. ( ComComAp)"},{"key":"10.1016\/j.comnet.2025.111280_b34","doi-asserted-by":"crossref","unstructured":"P. Kumar, Priyadarshni, S. Tripathi, R. Misra, Proximal Policy Optimization based Computations Offloading for Delay Optimization in UAV-assisted Mobile Edge Computing, in: IEEE International Conference on Big Data (BigData), Sorrento, Italy, 2023, pp. 3355\u20133364.","DOI":"10.1109\/BigData59044.2023.10386861"},{"issue":"20","key":"10.1016\/j.comnet.2025.111280_b35","doi-asserted-by":"crossref","first-page":"19903","DOI":"10.1109\/JIOT.2022.3168968","article-title":"Dynamic energy-saving offloading strategy guided by Lyapunov optimization for IoT devices","volume":"9","author":"Tong","year":"2022","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.comnet.2025.111280_b36","doi-asserted-by":"crossref","first-page":"2253","DOI":"10.1007\/s11277-024-11714-y","article-title":"Maximizing energy harvesting with the aid of reconfigurable intelligent surface for UAV using proximal policy optimization algorithm","volume":"139","author":"Kumar","year":"2024","journal-title":"Wirel. Pers. Commun."},{"issue":"4","key":"10.1016\/j.comnet.2025.111280_b37","doi-asserted-by":"crossref","first-page":"2991","DOI":"10.1007\/s11276-021-02632-z","article-title":"Computation offloading optimization for UAV-enabled mobile edge computing: A deep deterministic policy gradient approach","volume":"27","author":"Wang","year":"2021","journal-title":"Wirel. Netw."},{"issue":"4","key":"10.1016\/j.comnet.2025.111280_b38","doi-asserted-by":"crossref","first-page":"4128","DOI":"10.1109\/JIOT.2024.3482870","article-title":"Digital-twin-assisted intelligent secure task offloading and caching in blockchain-based vehicular edge computing networks","volume":"12","author":"Xu","year":"2025","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"10.1016\/j.comnet.2025.111280_b39","doi-asserted-by":"crossref","first-page":"3056","DOI":"10.1109\/JSAC.2023.3310066","article-title":"Digital twin-driven collaborative scheduling for heterogeneous task and edge-end resource via multi-agent deep reinforcement learning","volume":"41","author":"Xu","year":"2023","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"100992","key":"10.1016\/j.comnet.2025.111280_b40","article-title":"An advanced deep reinforcement learning algorithm for three-layer D2D-edge-cloud computing architecture for efficient task offloading in the internet of things","volume":"43","author":"Moghaddasi","year":"2024","journal-title":"Sustain. Computing: Informatics Syst."},{"issue":"123622","key":"10.1016\/j.comnet.2025.111280_b41","article-title":"Deadline-aware task offloading in vehicular networks using deep reinforcement learning","volume":"249","author":"Farimani","year":"2024","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"10.1016\/j.comnet.2025.111280_b42","doi-asserted-by":"crossref","first-page":"207","DOI":"10.23919\/ICN.2024.0015","article-title":"A deep Q-learning model for sequential task offloading in edge ai systems","volume":"5","author":"Liu","year":"2024","journal-title":"Intell. Converg. Networks"},{"issue":"3","key":"10.1016\/j.comnet.2025.111280_b43","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1109\/LCOMM.2019.2891662","article-title":"Task offloading in UAV-aided edge computing: Bit allocation and trajectory optimization","volume":"23","author":"Xiong","year":"2019","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.comnet.2025.111280_b44","doi-asserted-by":"crossref","first-page":"78702","DOI":"10.1109\/ACCESS.2020.2990166","article-title":"Joint beamforming and trajectory optimization for intelligent reflecting surfaces-assisted UAV communications","volume":"8","author":"Ge","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2025.111280_b45","series-title":"Prioritized experience replay","author":"Schaul","year":"2016"},{"key":"10.1016\/j.comnet.2025.111280_b46","doi-asserted-by":"crossref","unstructured":"H. Hu, W. Song, Q. Wang, F. Zhou, R.Q. Hu, Mobility-Aware Offloading and Resource Allocation in MEC-Enabled IoT Networks, in: International Conference on Mobility, Sensing and Networking, MSN, Tokyo, Japan, 2020, pp. 554\u2013560.","DOI":"10.1109\/MSN50589.2020.00092"},{"key":"10.1016\/j.comnet.2025.111280_b47","article-title":"Deep reinforcement learning with double Q-learning","author":"v. Hasselt","year":"2016","journal-title":"AAAI Conf. Artif. Intell."},{"issue":"109943","key":"10.1016\/j.comnet.2025.111280_b48","article-title":"Joint task offloading and UAVs deployment for UAV-assisted mobile edge computing","volume":"234","author":"Shen","year":"2023","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2025.111280_b49","article-title":"A distributional perspective on reinforcement learning","author":"Bellemare","year":"2017","journal-title":"Int. Conf. Mach. Learn."},{"issue":"3","key":"10.1016\/j.comnet.2025.111280_b50","doi-asserted-by":"crossref","first-page":"2049","DOI":"10.1109\/TVT.2017.2706308","article-title":"Mobile edge computing via a UAV-mounted cloudlet: Optimization of bit allocation and path planning","volume":"67","author":"Jeong","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"10.1016\/j.comnet.2025.111280_b51","doi-asserted-by":"crossref","first-page":"1879","DOI":"10.1109\/JIOT.2018.2878876","article-title":"Joint offloading and trajectory design for UAV-enabled mobile edge computing systems","volume":"6","author":"Hu","year":"2019","journal-title":"IEEE Internet Things J."},{"issue":"9","key":"10.1016\/j.comnet.2025.111280_b52","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MCOM.2013.6588654","article-title":"Non-line-of-sight small cell backhauling using microwave technology","volume":"51","author":"Coldrey","year":"2013","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"10.1016\/j.comnet.2025.111280_b53","doi-asserted-by":"crossref","first-page":"1676","DOI":"10.1109\/25.790549","article-title":"A Q-learning-based dynamic channel assignment technique for mobile communication systems","volume":"48","author":"Nie","year":"1999","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comnet.2025.111280_b54","doi-asserted-by":"crossref","unstructured":"J. Li, Q. Liu, P. Wu, F. Shu, S. Jin, Task Offloading for UAV-based Mobile Edge Computing via Deep Reinforcement Learning, in: IEEE\/CIC International Conference on Communications in China, ICCC, Beijing, China, 2018, pp. 798\u2013802.","DOI":"10.1109\/ICCChina.2018.8641189"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128625002488?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128625002488?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T18:57:01Z","timestamp":1746212221000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128625002488"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":54,"alternative-id":["S1389128625002488"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2025.111280","relation":{"has-preprint":[{"id-type":"doi","id":"10.2139\/ssrn.4996444","asserted-by":"object"}]},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Performance enhancement of UAV-enabled MEC systems through intelligent task offloading and resource allocation","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2025.111280","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"111280"}}