Citation: | Tingyan LONG, Peng CHEN, Yunni XIA, et al., “A Deep Deterministic Policy Gradient-Based Method for Enforcing Service Fault-Tolerance in MEC,” Chinese Journal of Electronics, vol. 33, no. 4, pp. 899–909, 2024 doi: 10.23919/cje.2023.00.105 |
[1] |
Y. Chen, J. Zhao, X. K. Zhou, et al., “A distributed game theoretical approach for credibility-guaranteed multimedia data offloading in MEC,” Information Sciences, vol. 644, article no. 119306, 2023. doi: 10.1016/j.ins.2023.119306
|
[2] |
Y. Chen, J. Zhao, J. T. Hu, et al., “Distributed task offloading and resource purchasing in NOMA-enabled mobile edge computing: Hierarchical game theoretical approaches,” ACM Transactions on Embedded Computing Systems, vol. 23, no. 1, article no. 2, 2024. doi: 10.1145/3597023
|
[3] |
X. F. Cao, G. M. Tang, D. K. Guo, et al., “Edge federation: Towards an integrated service provisioning model,” IEEE/ACM Transactions on Networking, vol. 28, no. 3, pp. 1116–1129, 2020. doi: 10.1109/TNET.2020.2979361
|
[4] |
C. Engelmann, G. R. Vallee, T. Naughton, et al., “Proactive fault tolerance using preemptive migration,” in Proceedings of the 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing, Weimar, Germany, pp. 252–257, 2009.
|
[5] |
F. Z. Liu, J. W. Huang, and X. B. Wang, “Joint task offloading and resource allocation for device-edge-cloud collaboration with subtask dependencies,” IEEE Transactions on Cloud Computing, vol. 11, no. 3, pp. 3027–3039, 2023. doi: 10.1109/TCC.2023.3251561
|
[6] |
J. W. Huang, J. Y. Wan, B. F. Lv, et al., “Joint computation offloading and resource allocation for edge-cloud collaboration in internet of vehicles via deep reinforcement learning,” IEEE Systems Journal, vol. 17, no. 2, pp. 2500–2511, 2023. doi: 10.1109/JSYST.2023.3249217
|
[7] |
Y. Chen, J. T. Hu, J. Zhao, et al., “QoS-aware computation offloading in LEO satellite edge computing for IoT: A game-theoretical approach,”Chinese Journal of Electronics, in press, doi: 10.23919/cje.2022.00.412, 2023.
|
[8] |
J. L. Liu, S. G. Wang, A. Zhou, et al, “Using proactive fault-tolerance approach to enhance cloud service reliability,” IEEE Transactions on Cloud Computing, vol. 6, no. 4, pp. 1191–1202, 2018. doi: 10.1109/TCC.2016.2567392
|
[9] |
A. Rawat, R. Sushil, A. Agarwal, et al., “A new adaptive fault tolerant framework in the cloud,” IETE Journal of Research, vol. 69, no. 5, pp. 2897–2909, 2023. doi: 10.1080/03772063.2021.1907231
|
[10] |
B. K. Ray, A. Saha, S. Khatua, et al., “Proactive fault-tolerance technique to enhance reliability of cloud service in cloud federation environment,” IEEE Transactions on Cloud Computing, vol. 10, no. 2, pp. 957–971, 2022. doi: 10.1109/TCC.2020.2968522
|
[11] |
P. Y. Zhang, S. Shu, and M. C. Zhou, “An online fault detection model and strategies based on SVM-grid in clouds,” IEEE/CAA Journal of Automatica Sinica, vol. 5, no. 2, pp. 445–456, 2018. doi: 10.1109/JAS.2017.7510817
|
[12] |
X. F. Hu, Y. B. Li, L. Jia, et al., “A novel two-stage unsupervised fault recognition framework combining feature extraction and fuzzy clustering for collaborative AIoT,” IEEE Transactions on Industrial Informatics, vol. 18, no. 2, pp. 1291–1300, 2022. doi: 10.1109/TII.2021.3076077
|
[13] |
Z. L. He, P. F. Chen, X. Y. Li, et al., “A spatiotemporal deep learning approach for unsupervised anomaly detection in cloud systems,” IEEE Transactions on Neural Networks and Learning Systems, vol. 34, no. 4, pp. 1705–1719, 2023. doi: 10.1109/TNNLS.2020.3027736
|
[14] |
S. Tuli, G. Casale, and N. R. Jennings, “PreGAN: Preemptive migration prediction network for proactive fault-tolerant edge computing, ” in Proceedings of 2022 IEEE Conference on Computer Communications, London, United Kingdom, pp. 670–679, 2022.
|
[15] |
P. Dasgupta, R. C. Chen, S. Menon, et al., “Design and implementation of the clouds distributed operating system,” Computing Systems, vol. 3, no. 1, pp. 11–46, 1990.
|
[16] |
H. Gupta, A. V. Dastjerdi, S. K. Ghosh, et al., “IFogSim: A toolkit for modeling and simulation of resource management techniques in the internet of things, edge and fog computing environments,” Software:Practice and Experience, vol. 47, no. 9, pp. 1275–1296, 2017. doi: 10.1002/spe.2509
|
[17] |
A. Al-Shuwaili, O. Simeone, A. Bagheri, et al., “Joint uplink/downlink optimization for backhaul-limited mobile cloud computing with user scheduling,” IEEE Transactions on Signal and Information Processing over Networks, vol. 3, no. 4, pp. 787–802, 2017. doi: 10.1109/TSIPN.2017.2668142
|
[18] |
X. Chen, L. Jiao, W. Z. Li, et al., “Efficient multi-user computation offloading for mobile-edge cloud computing,” IEEE/ACM Transactions on Networking, vol. 24, no. 5, pp. 2795–2808, 2016. doi: 10.1109/TNET.2015.2487344
|
[19] |
D. Satria, D. Park, and M. Jo, “Recovery for overloaded mobile edge computing,” Future Generation Computer Systems, vol. 70, pp. 138–147, 2017.
|
[20] |
K. J. Ye, Y. Y. Liu, G. Y. Xu, et al., “Fault injection and detection for artificial intelligence applications in container-based clouds,” in Proceedings of the 11th International Con ference on Cloud Computing, Seattle, WA, USA, pp. 112–127, 2018.
|
[21] |
A. Beloglazov and R. Buyya, “Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers,” Concurrency and Computation: Practice and Experience, vol. 24, no. 13, pp. 1397–1420, 2012. doi: 10.1002/cpe.1867
|
[22] |
S. Tuli, S. Tuli, G. Casale, et al., “Generative optimization networks for memory efficient data generation,” arXiv preprint, arXiv: 2110.02912, 2021.
|
[23] |
G. L. Liu, K. J. Shih, T. C. Wang, et al., “Partial convolution based padding,” arXiv preprint, arXiv: 1811.11718, 2018.
|
[24] |
P. Chen, H. Y. Liu, R. Y. Xin, et al., “Effectively detecting operational anomalies in large-scale IoT data infrastructures by using a GAN-based predictive model,” The Computer Journal, vol. 65, no. 11, pp. 2909–2925, 2022. doi: 10.1093/comjnl/bxac085
|
[25] |
Z. W. Yao, A. Gholami, S. Shen, et al., “ADAHESSIAN: An adaptive second order optimizer for machine learning,” in Proceedings of the 35th AAAI Conference on Artificial In telligence, Virtual Event, pp. 10665–10673, 2021.
|
[26] |
S. Zhang, H. H. Tong, J. J. Xu, et al., “Graph convolutional networks: A comprehensive review,” Computational Social Networks, vol. 6, no. 1, article no. 11, 2019. doi: 10.1186/s40649-019-0069-y
|
[27] |
D. Silver, G. Lever, N. Heess, et al., “Deterministic policy gradient algorithms,” in Proceedings of the 31st Internatio nal Conference on Machine Learning, Beijing, China, pp. I-387–I-395, 2014.
|
[28] |
A. Siffer, P. A. Fouque, A. Termier, et al., “Anomaly detection in streams with extreme value theory,” in Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, pp. 1067–1075, 2017.
|
[29] |
S. G. Wang, Y. L. Zhao, J. L. Xu, et al., “Edge server placement in mobile edge computing,” Journal of Parallel and Distributed Computing, vol. 127 pp. , pp. 160–168, 2019. doi: 10.1016/j.jpdc.2018.06.008
|
[30] |
S. Y. Liu, Y. H. Liu, L. M. Ni, et al., “Towards mobility-based clustering,” in Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, pp. 919–928, 2010.
|
[31] |
S. Q. Shen, V. V. Beek, and A. Iosup, “Statistical characterization of business-critical workloads hosted in cloud datacenters,” in Proceedings of the 2015 15th IEEE/ACM Inter national Symposium on Cluster, Cloud and Grid Computing, Shenzhen, China, pp. 465–474, 2015.
|
[32] |
A. Javed, J. Robert, K. Heljanko, et al., “IoTEF: A federated edge-cloud architecture for fault-tolerant IoT applications,” Journal of Grid Computing, vol. 18, no. 1, pp. 57–80, 2020. doi: 10.1007/s10723-019-09498-8
|
[33] |
Y. Feng, Z. J. Liu, J. L. Chen, et al., “Make the rocket intelligent at IoT edge: Stepwise GAN for anomaly detection of LRE with multisource fusion,” IEEE Internet of Things Journal, vol. 9, no. 4, pp. 3135–3149, 2022. doi: 10.1109/JIOT.2021.3097437
|
[34] |
S. Tuli, G. Casale, and N. R. Jennings, “DRAGON: Decentralized fault tolerance in edge federations,” IEEE Transactions on Network and Service Management, vol. 20, no. 1, pp. 276–291, 2023. doi: 10.1109/TNSM.2022.3199886
|
[35] |
D. Li, D. C. Chen, B. H. Jin, et al., “MAD-GAN: Multivariate anomaly detection for time series data with generative adversarial networks,” in Proceedings of the 28th Interna tional Conference on Artificial Neural Networks, Munich, Germany, pp. 703–716, 2019.
|
[36] |
L. Hou, Z. H. Yuan, L. Huang, et al., “Slimmable generative adversarial networks,” in Proceedings of the 35th AAAI Conference on Artificial Intelligence, Virtual Event, pp. 7746–7753, 2021.
|
[37] |
J. Audibert, P. Michiardi, F. Guyard, et al., “USAD: UnSupervised anomaly detection on multivariate time series,” in Proceedings of the 26th ACM SIGKDD International Con ference on Knowledge Discovery & Data Mining, New York, NY, USA, pp. 3395–3404, 2020.
|
[38] |
Y. X. Zhang, Y. Q. Chen, J. D. Wang, et al., “Unsupervised deep anomaly detection for multi-sensor time-series signals,” IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 2, pp. 2118–2132, 2023. doi: 10.1109/TKDE.2021.3102110
|
[39] |
Z. W. Ji, J. H. Gong, and J. R. Feng, “A novel deep learning approach for anomaly detection of time series data,” Scientific Programming, vol. 2021, article no. 6636270, 2021. doi: 10.1155/2021/6636270
|
[40] |
Y. Chen, J. Zhao, Y. Wu, et al., “QoE-aware decentralized task offloading and resource allocation for end-edge-cloud systems: A game-theoretical approach,” IEEE Transactions on Mobile Computing, vol. 23, no. 1, pp. 769–784, 2024. doi: 10.1109/TMC.2022.3223119
|