{"id":"https://openalex.org/W4399453012","doi":"https://doi.org/10.1109/jsyst.2024.3403696","title":"Decentralized and Fault-Tolerant Task Offloading for Enabling Network Edge Intelligence","display_name":"Decentralized and Fault-Tolerant Task Offloading for Enabling Network Edge Intelligence","publication_year":2024,"publication_date":"2024-06-01","ids":{"openalex":"https://openalex.org/W4399453012","doi":"https://doi.org/10.1109/jsyst.2024.3403696"},"language":"en","primary_location":{"id":"doi:10.1109/jsyst.2024.3403696","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2024.3403696","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047222731","display_name":"Huixiang Zhang","orcid":"https://orcid.org/0000-0002-4823-1436"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huixiang Zhang","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0000-0002-4823-1436","affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050056146","display_name":"Kaihua Liao","orcid":"https://orcid.org/0009-0000-9874-3969"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaihua Liao","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0009-0000-9874-3969","affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103159031","display_name":"Yu Tai","orcid":"https://orcid.org/0000-0002-2584-2867"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Tai","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0000-0002-2584-2867","affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073551486","display_name":"Wenqiang Ma","orcid":"https://orcid.org/0000-0001-7474-1264"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenqiang Ma","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0000-0001-7474-1264","affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024907692","display_name":"Guoyan Cao","orcid":"https://orcid.org/0000-0003-2921-1920"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoyan Cao","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0000-0003-2921-1920","affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032266950","display_name":"Wen Sun","orcid":"https://orcid.org/0000-0001-7086-4910"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wen Sun","raw_affiliation_strings":["School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China"],"raw_orcid":"https://orcid.org/0000-0001-7086-4910","affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061307388","display_name":"Lexi Xu","orcid":"https://orcid.org/0000-0003-4338-7252"},"institutions":[{"id":"https://openalex.org/I6507939","display_name":"China United Network Communications Group (China)","ror":"https://ror.org/028w99c90","country_code":"CN","type":"company","lineage":["https://openalex.org/I6507939"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lexi Xu","raw_affiliation_strings":["Research Institute, China United Network Communications Corporation, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-4338-7252","affiliations":[{"raw_affiliation_string":"Research Institute, China United Network Communications Corporation, Beijing, China","institution_ids":["https://openalex.org/I6507939"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5047222731"],"corresponding_institution_ids":["https://openalex.org/I17145004"],"apc_list":null,"apc_paid":null,"fwci":3.0276,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.91626934,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"18","issue":"2","first_page":"1459","last_page":"1470"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13553","display_name":"Age of Information Optimization","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7011861801147461},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6191544532775879},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5378491282463074},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.48764052987098694},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4716495871543884},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.46208828687667847},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45700231194496155},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16306021809577942},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13229969143867493},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.10557839274406433}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7011861801147461},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6191544532775879},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5378491282463074},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.48764052987098694},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4716495871543884},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.46208828687667847},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45700231194496155},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16306021809577942},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13229969143867493},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.10557839274406433}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jsyst.2024.3403696","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jsyst.2024.3403696","pdf_url":null,"source":{"id":"https://openalex.org/S95999327","display_name":"IEEE Systems Journal","issn_l":"1932-8184","issn":["1932-8184","1937-9234","2373-7816"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Systems Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.47999998927116394,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G7251765679","display_name":null,"funder_award_id":"62272391","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1486093464","https://openalex.org/W2018583728","https://openalex.org/W2069463277","https://openalex.org/W2104906922","https://openalex.org/W2150231507","https://openalex.org/W2159394089","https://openalex.org/W2767029835","https://openalex.org/W2797431058","https://openalex.org/W2910821961","https://openalex.org/W2963783229","https://openalex.org/W2963821095","https://openalex.org/W3006743689","https://openalex.org/W3010243247","https://openalex.org/W3015297534","https://openalex.org/W3036795615","https://openalex.org/W3047488480","https://openalex.org/W3094422995","https://openalex.org/W3099689767","https://openalex.org/W3126610359","https://openalex.org/W3153450967","https://openalex.org/W3164769238","https://openalex.org/W4226045864","https://openalex.org/W4285507608","https://openalex.org/W4293796518","https://openalex.org/W4297911671","https://openalex.org/W4308736131","https://openalex.org/W4312904354","https://openalex.org/W4320002923","https://openalex.org/W4387415408","https://openalex.org/W4389098960","https://openalex.org/W4389105015","https://openalex.org/W4389960968","https://openalex.org/W4393002679","https://openalex.org/W6738796088","https://openalex.org/W6840380725"],"related_works":["https://openalex.org/W2144438995","https://openalex.org/W4324372666","https://openalex.org/W1577886464","https://openalex.org/W2164896586","https://openalex.org/W4225706866","https://openalex.org/W1593559483","https://openalex.org/W2111125783","https://openalex.org/W2108334564","https://openalex.org/W2914646191","https://openalex.org/W4386004629"],"abstract_inverted_index":{"Edge":[0],"intelligence":[1,26],"has":[2],"recently":[3],"attracted":[4],"great":[5],"interest":[6],"from":[7],"industry":[8],"and":[9,11,24,41,53,74,112,120,137,155,197],"academia,":[10],"it":[12,45,80],"greatly":[13],"improves":[14],"the":[15,19,28,31,98,142,160,175,186],"processing":[16,198],"speed":[17],"at":[18],"edge":[20,29,34,61,91,104],"by":[21],"moving":[22],"data":[23],"artificial":[25],"to":[27,47,67,70,82,85,108,158],"of":[30,115,162,189],"network.":[32],"However,":[33],"devices":[35,63],"have":[36],"bottlenecks":[37],"in":[38,51,58,102,118],"battery":[39],"capacity":[40],"computing":[42,49,105,116],"power,":[43],"making":[44],"challenging":[46],"perform":[48],"tasks":[50,190],"dynamic":[52,119],"harsh":[54,121],"network":[55],"environments.":[56],"Especially":[57],"disaster":[59],"scenarios,":[60,183],"(rescue)":[62],"are":[64],"more":[65],"likely":[66],"fail":[68],"due":[69],"unreliable":[71],"wireless":[72],"communications":[73],"scattered":[75],"rescue":[76],"requests,":[77],"which":[78,132],"makes":[79],"urgent":[81],"explore":[83],"how":[84],"provide":[86],"low-latency,":[87],"reliable":[88],"services":[89,117],"through":[90,141],"collaboration.":[92],"In":[93],"this":[94],"article,":[95],"we":[96,124,149],"investigate":[97],"task":[99,129,134,164],"offloading":[100,130],"mechanism":[101],"mobile":[103],"networks,":[106],"aiming":[107],"ensure":[109],"fault":[110],"tolerance":[111],"rapid":[113],"response":[114],"scenarios.":[122],"Specifically,":[123],"design":[125],"a":[126],"fault-tolerant":[127],"distributed":[128],"scheme,":[131],"minimizes":[133],"execution":[135],"time":[136],"system":[138,194],"energy":[139,195],"consumption":[140,196],"multi-agent":[143],"proximal":[144],"policy":[145],"optimization":[146],"algorithm.":[147],"Furthermore,":[148],"introduce":[150],"logarithmic":[151],"ratio":[152],"reward":[153],"functions":[154],"action":[156],"masking":[157],"reduce":[159],"impact":[161],"different":[163],"queue":[165],"lengths":[166],"while":[167,191],"accelerating":[168],"model":[169],"convergence.":[170],"Numerical":[171],"results":[172],"show":[173],"that":[174],"proposed":[176],"algorithm":[177],"is":[178],"suitable":[179],"for":[180],"service":[181],"failure":[182],"effectively":[184],"meeting":[185],"reliability":[187],"requirements":[188],"simultaneously":[192],"reducing":[193],"latency.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":2}],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-10-10T00:00:00"}
