{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:17:33Z","timestamp":1761581853585,"version":"3.44.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/icc.2019.8761823","type":"proceedings-article","created":{"date-parts":[[2019,7,15]],"date-time":"2019-07-15T20:16:31Z","timestamp":1563221791000},"page":"1-6","source":"Crossref","is-referenced-by-count":14,"title":["Energy-Efficient Secure NOMA-Enabled Mobile Edge Computing Networks"],"prefix":"10.1109","author":[{"given":"Wei","family":"Wu","sequence":"first","affiliation":[{"name":"Nanjing Univ. of Posts &amp; Telecommun., Nanjing, China"}]},{"given":"Fuhui","family":"Zhou","sequence":"additional","affiliation":[{"name":"Nanjing Univ. of Posts &amp; Telecommun., Nanjing, China"}]},{"given":"Pei","family":"Li","sequence":"additional","affiliation":[{"name":"Nanjing Univ. of Posts &amp; Telecommun., Nanjing, China"}]},{"given":"Ping","family":"Deng","sequence":"additional","affiliation":[{"name":"Nanjing Univ. of Posts &amp; Telecommun., Nanjing, China"}]},{"given":"Baoyun","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanjing Univ. of Posts &amp; Telecommun., Nanjing, China"}]},{"given":"Victor C. M.","family":"Leung","sequence":"additional","affiliation":[{"name":"Utah State Univ., Logan, UT, USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2796542"},{"article-title":"Joint power and time allocation for NOMA-MEC offloading","year":"2018","author":"ding","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2303422"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700291"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2665465"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2744982"},{"key":"ref17","article-title":"Exploiting physical-layer security for multiuser multicarrier computation offloading","author":"xu","year":"2018","journal-title":"IEEE Wireless Commun Lett"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2725698"},{"key":"ref19","article-title":"Improving anti-eavesdropping ability without eavesdropper&#x2019;s CSI: a practical Ssecure transmission design perspective","author":"zheng","year":"2018","journal-title":"IEEE Wireless Commun Lett"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1500657CM"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2782726"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2785305"},{"key":"ref5","article-title":"Joint computation and communication cooperation for energy-efficient mobile edge computing","author":"cao","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2864426"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2821664"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"ref1","article-title":"Impact of non-orthogonal multiple access on the offloading of mobile edge computing","author":"ding","year":"2018","journal-title":"IEEE Trans Commun"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2017.8269088"},{"key":"ref20","article-title":"Joint offloading and computation energy efficiency maximization in a mobile edge computing systems","author":"sun","year":"2018","journal-title":"IEEE Trans Vh Technol"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"}],"event":{"name":"ICC 2019 - 2019 IEEE International Conference on Communications (ICC)","start":{"date-parts":[[2019,5,20]]},"location":"Shanghai, China","end":{"date-parts":[[2019,5,24]]}},"container-title":["ICC 2019 - 2019 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8753818\/8761046\/08761823.pdf?arnumber=8761823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T18:08:57Z","timestamp":1755626937000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8761823\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icc.2019.8761823","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}