1. Armbrust, M., Fox, A., Griffith, R., et al.: A view of cloud computing[J]. Communications of the ACM. 53(4), 50–58 (2010)
2. Azrour, M., Mabrouki, J., Guezzaz, A., et al.: New enhanced authentication protocol for internet of things[J]. Big Data Mining and Analytics. 4(1), 1–9 (2021)
3. Bengio, Y., Ducharme, R., Vincent, P., et al.: A neural probabilistic language model[J]. The journal of Machine Learning Research. 3, 1137–1155 (2003)
4. Bi, R., Liu, Q., Ren, J., et al.: Utility aware offloading for mobile-edge computing[J]. Tsinghua Science and Technology. 26(2), 239–250 (2020)
5. Blitzer, J., Dredze, M., Pereira, F., et al.: Boom-Boxes and Blenders: domain adaptation for sentiment classification[C]//Proceedings of the 45th Annual Meeting of the Association for Computational Linguistics (ACL’07), Pereira. 2007, 447.