{"id":"https://openalex.org/W4414140582","doi":"https://doi.org/10.1109/apwcs67981.2025.11151868","title":"Differential Privacy Federated Edge Learning-assisted for Securing RAN Intelligent Controller in O-RAN 6G Communications","display_name":"Differential Privacy Federated Edge Learning-assisted for Securing RAN Intelligent Controller in O-RAN 6G Communications","publication_year":2025,"publication_date":"2025-08-20","ids":{"openalex":"https://openalex.org/W4414140582","doi":"https://doi.org/10.1109/apwcs67981.2025.11151868"},"language":"en","primary_location":{"id":"doi:10.1109/apwcs67981.2025.11151868","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apwcs67981.2025.11151868","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004177684","display_name":"Timothius Victorio Yasin","orcid":null},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Timothius Victorio Yasin","raw_affiliation_strings":["National Yang Ming Chiao Tung University,Department of Electrical and Computer Engineering,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Yang Ming Chiao Tung University,Department of Electrical and Computer Engineering,Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085568918","display_name":"Chia-Mu Yu","orcid":"https://orcid.org/0000-0002-1677-2131"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chia-Mu Yu","raw_affiliation_strings":["National Yang Ming Chiao Tung University,Department of Electrical and Computer Engineering,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Yang Ming Chiao Tung University,Department of Electrical and Computer Engineering,Taiwan","institution_ids":["https://openalex.org/I148366613"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100661626","display_name":"Li\u2010Chun Wang","orcid":"https://orcid.org/0000-0002-7883-6217"},"institutions":[{"id":"https://openalex.org/I148366613","display_name":"National Yang Ming Chiao Tung University","ror":"https://ror.org/00se2k293","country_code":"TW","type":"education","lineage":["https://openalex.org/I148366613"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Li-Chun Wang","raw_affiliation_strings":["National Yang Ming Chiao Tung University,Department of Electrical and Computer Engineering,Taiwan"],"affiliations":[{"raw_affiliation_string":"National Yang Ming Chiao Tung University,Department of Electrical and Computer Engineering,Taiwan","institution_ids":["https://openalex.org/I148366613"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5004177684"],"corresponding_institution_ids":["https://openalex.org/I148366613"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13275584,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9882000088691711,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.9017000198364258},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.6237999796867371},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.487199991941452},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4846000075340271},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.44999998807907104},{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.4487999975681305},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.4083999991416931},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.39250001311302185}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.9017000198364258},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7703999876976013},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.6237999796867371},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.487199991941452},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4846000075340271},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.44999998807907104},{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.4487999975681305},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.4083999991416931},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.39250001311302185},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.3734000027179718},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.3677999973297119},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36719998717308044},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3357999920845032},{"id":"https://openalex.org/C112313634","wikidata":"https://www.wikidata.org/wiki/Q7886648","display_name":"Complement (music)","level":5,"score":0.3246000111103058},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.32429999113082886},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.3091000020503998},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3028999865055084},{"id":"https://openalex.org/C97937538","wikidata":"https://www.wikidata.org/wiki/Q199691","display_name":"Laplace transform","level":2,"score":0.3005000054836273},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.2948000133037567},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2802000045776367},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.27559998631477356},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.27320000529289246},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.272599995136261},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.2678000032901764}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/apwcs67981.2025.11151868","is_oa":false,"landing_page_url":"https://doi.org/10.1109/apwcs67981.2025.11151868","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2053637704","https://openalex.org/W2970606380","https://openalex.org/W2996366116","https://openalex.org/W3013124972","https://openalex.org/W3016632787","https://openalex.org/W3045991950","https://openalex.org/W3130806609","https://openalex.org/W4280588735","https://openalex.org/W4283214234","https://openalex.org/W4313639536","https://openalex.org/W4317796310"],"related_works":["https://openalex.org/W2885627391","https://openalex.org/W4401508502","https://openalex.org/W4324323655","https://openalex.org/W2922954044","https://openalex.org/W4408041959","https://openalex.org/W3037103914","https://openalex.org/W1982654631","https://openalex.org/W3018338683","https://openalex.org/W3197340217","https://openalex.org/W4389104756"],"abstract_inverted_index":{"Privacy":[0,23,59],"Preserving":[1],"technique":[2],"becomes":[3],"an":[4],"important":[5],"factor":[6],"especially":[7],"in":[8,24,77,124],"the":[9,25,97],"Federated":[10,40],"Learning":[11,41],"for":[12,44,52,61,119],"Open-RAN\u2019s":[13],"Radio":[14],"Intelligent":[15],"Controller":[16],"(RICs).":[17],"Existing":[18],"method":[19],"that":[20,85],"integrates":[21],"Differential":[22,58],"present":[26],"AI/ML":[27],"Model":[28],"training":[29],"faces":[30],"privacy":[31,70,110],"protection":[32],"challenges.":[33],"This":[34],"paper":[35],"proposes":[36],"a":[37,116],"hybrid":[38,98],"privacy-preserving":[39],"(FL)":[42],"framework":[43,114],"O-RAN":[45,126],"RICs,":[46],"integrating":[47],"Secure":[48],"Multi-Party":[49],"Computation":[50],"(SMC)":[51],"secure":[53],"gradient":[54],"aggregation":[55],"and":[56,73,96,121],"distributed":[57,125],"(DP)":[60],"local":[62,106],"model":[63,74],"update":[64],"perturbation.":[65],"Adaptive":[66],"parameter":[67],"tuning":[68],"balances":[69],"(\u03f5,":[71],"\u03b4)":[72],"accuracy,":[75],"particularly":[76],"non-IID":[78],"scenarios.":[79],"Our":[80,112],"experiments":[81],"on":[82],"MNIST":[83],"demonstrate":[84],"Gaussian":[86],"DP":[87,107],"outperforms":[88],"Laplace":[89],"(O(T)":[90],"vs.":[91],"O(T<sup":[92],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[93],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sup>)":[94],"noise),":[95],"approach":[99],"achieves":[100],"6-12%":[101],"higher":[102],"accuracy":[103],"than":[104],"pure":[105],"under":[108],"equivalent":[109],"guarantees.":[111],"proposed":[113],"offers":[115],"practical":[117],"solution":[118],"privacy-assured":[120],"effective":[122],"FL":[123],"environments.":[127]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
