Research Article

Novel Defense Schemes for Artificial Intelligence Deployed in Edge Computing Environment

Table 1

Payoff matrix of users.

User 1Action 1: normal Action 2: attack
User 2

Action 1: normal

Action 2: attack