{"id":"https://openalex.org/W4414535320","doi":"https://doi.org/10.1109/icc52391.2025.11161610","title":"Utility Maximization of Multi-Federated Learning in Edge Computing with Personalized Privacy Preservation","display_name":"Utility Maximization of Multi-Federated Learning in Edge Computing with Personalized Privacy Preservation","publication_year":2025,"publication_date":"2025-06-08","ids":{"openalex":"https://openalex.org/W4414535320","doi":"https://doi.org/10.1109/icc52391.2025.11161610"},"language":"en","primary_location":{"id":"doi:10.1109/icc52391.2025.11161610","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161610","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100428465","display_name":"Qian Chen","orcid":"https://orcid.org/0000-0002-3864-9783"},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qian Chen","raw_affiliation_strings":["School of Management, Hefei University of Technology,Hefei,P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Management, Hefei University of Technology,Hefei,P.R. China","institution_ids":["https://openalex.org/I16365422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031531881","display_name":"Zhiwei Ni","orcid":"https://orcid.org/0000-0002-3378-9779"},"institutions":[{"id":"https://openalex.org/I16365422","display_name":"Hefei University of Technology","ror":"https://ror.org/02czkny70","country_code":"CN","type":"education","lineage":["https://openalex.org/I16365422"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiwei Ni","raw_affiliation_strings":["School of Management, Hefei University of Technology,Hefei,P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Management, Hefei University of Technology,Hefei,P.R. China","institution_ids":["https://openalex.org/I16365422"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100336975","display_name":"Jing Li","orcid":"https://orcid.org/0000-0002-7027-5574"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Jing Li","raw_affiliation_strings":["City University of Hong Kong,Department of Computer Science,Hong Kong,P. R. China"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong,Department of Computer Science,Hong Kong,P. R. China","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077465517","display_name":"Weifa Liang","orcid":"https://orcid.org/0000-0002-8207-6740"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Weifa Liang","raw_affiliation_strings":["City University of Hong Kong,Department of Computer Science,Hong Kong,P. R. China"],"affiliations":[{"raw_affiliation_string":"City University of Hong Kong,Department of Computer Science,Hong Kong,P. R. China","institution_ids":["https://openalex.org/I168719708"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100428465"],"corresponding_institution_ids":["https://openalex.org/I16365422"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14443582,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2334","last_page":"2339"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9718999862670898,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12702","display_name":"Brain Tumor Detection and Classification","score":0.9060999751091003,"subfield":{"id":"https://openalex.org/subfields/2808","display_name":"Neurology"},"field":{"id":"https://openalex.org/fields/28","display_name":"Neuroscience"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.828000009059906},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7860000133514404},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6435999870300293},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5727999806404114},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5568000078201294},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.5128999948501587},{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.5055000185966492},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4885999858379364},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4803999960422516}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.857699990272522},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.828000009059906},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7860000133514404},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6435999870300293},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5727999806404114},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5568000078201294},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.5128999948501587},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.5055000185966492},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4885999858379364},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4803999960422516},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.47760000824928284},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4564000070095062},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.42559999227523804},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4081999957561493},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.39250001311302185},{"id":"https://openalex.org/C2776330181","wikidata":"https://www.wikidata.org/wiki/Q18358244","display_name":"Maximization","level":2,"score":0.37049999833106995},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36079999804496765},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.3564999997615814},{"id":"https://openalex.org/C2984842247","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep neural networks","level":3,"score":0.34049999713897705},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.3228999972343445},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3125999867916107},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.3125},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.31049999594688416},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.2896000146865845},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.28940001130104065},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.2863999903202057},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.28110000491142273},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27410000562667847},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.26840001344680786},{"id":"https://openalex.org/C2779582901","wikidata":"https://www.wikidata.org/wiki/Q21013010","display_name":"Distributed learning","level":2,"score":0.2667999863624573},{"id":"https://openalex.org/C206688291","wikidata":"https://www.wikidata.org/wiki/Q7617819","display_name":"Stochastic gradient descent","level":3,"score":0.2623000144958496},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.25690001249313354},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.2556999921798706}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc52391.2025.11161610","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161610","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1873763122","https://openalex.org/W3016632787","https://openalex.org/W3128515475","https://openalex.org/W4205228770","https://openalex.org/W4226249052","https://openalex.org/W4285260612","https://openalex.org/W4311167339","https://openalex.org/W4317038464","https://openalex.org/W4320009767","https://openalex.org/W4390603935","https://openalex.org/W4402156881"],"related_works":[],"abstract_inverted_index":{"Edge":[0],"intelligence":[1],"enables":[2],"mobile":[3,32],"users":[4,84],"to":[5,73,128,152,176],"benefit":[6],"from":[7],"real-time":[8,50],"inference":[9],"services":[10],"based":[11,117],"on":[12,118,155,163],"deep":[13,119,124],"neural":[14],"networks":[15],"(DNN).":[16],"Federated":[17,109],"learning":[18,110,126],"(FL)":[19],"provides":[20],"a":[21,104],"solution":[22],"for":[23,52,145],"using":[24,212],"DNN":[25],"training":[26],"while":[27,89,185],"protecting":[28],"privacy.":[29],"FL":[30,140],"over":[31,115],"edge":[33,41,56],"computing":[34,60,160],"(MEC)":[35],"can":[36,70,85],"aggregate":[37],"models":[38,150,175],"at":[39],"the":[40,92,130,134,192,195,204,208],"and":[42,62,64,96,159,179],"process":[43],"them":[44],"in":[45],"parallel,":[46],"providing":[47],"far":[48],"more":[49],"results":[51,201],"realworld":[53],"applications.":[54],"However,":[55],"nodes":[57],"have":[58],"limited":[59,153],"capacities":[61,162],"bandwidth,":[63],"not":[65],"all":[66,138],"user":[67],"equipments":[68],"(UEs)":[69],"be":[71,87],"selected":[72],"upload":[74],"their":[75,147],"trained":[76],"local":[77,149,174],"models.":[78],"In":[79],"addition,":[80],"private":[81,171],"information":[82],"of":[83,137,194],"still":[86],"leaked":[88],"attackers":[90],"analyze":[91],"uploaded":[93],"model":[94,187],"parameters,":[95],"users'":[97,181],"privacy":[98,114,178,183],"requirements":[99,184],"vary.":[100],"Thus,":[101],"we":[102,168],"proposed":[103,196,205],"novel":[105],"optimization":[106],"framework":[107],"-":[108],"with":[111],"personalized":[112,182],"differential":[113,170],"MEC":[116],"reinforcement":[120,125],"learning.":[121],"We":[122,189],"use":[123],"(DRL)":[127],"maximize":[129],"total":[131],"utility,":[132],"i.e.,":[133],"overall":[135],"accuracy":[136],"global":[139],"models,":[141],"by":[142],"choosing":[143],"UEs":[144],"uploading":[146],"updated":[148],"due":[151],"bandwidth":[154],"access":[156],"points":[157],"(APs)":[158],"resource":[161],"cloudlets":[164],"(edge":[165],"servers).":[166],"Then,":[167],"inject":[169],"noise":[172],"into":[173],"enhance":[177],"satisfy":[180],"guaranteeing":[186],"accuracy.":[188],"finally":[190],"evaluate":[191],"performance":[193],"approach":[197,206],"through":[198],"experiments.":[199],"Experimental":[200],"show":[202],"that":[203],"outperforms":[207],"comparison":[209],"counterparts":[210],"significantly,":[211],"public":[213],"accessible":[214],"datasets.":[215]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
