{"id":"https://openalex.org/W4415366858","doi":"https://doi.org/10.1109/tifs.2025.3622076","title":"Task-Oriented Cloud-Edge-Device Collaborative Semantic Communication: Trade-off Between Privacy-Preserving and QoAIS","display_name":"Task-Oriented Cloud-Edge-Device Collaborative Semantic Communication: Trade-off Between Privacy-Preserving and QoAIS","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4415366858","doi":"https://doi.org/10.1109/tifs.2025.3622076"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2025.3622076","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3622076","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111151839","display_name":"Guanwu Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guanwu Jiang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059295869","display_name":"Shujun Han","orcid":"https://orcid.org/0000-0002-6257-7732"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shujun Han","raw_affiliation_strings":["National Engineering Research Center for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Mobile Network Technologies, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061030501","display_name":"Xiaodong Xu","orcid":"https://orcid.org/0000-0003-4245-5989"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaodong Xu","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085873947","display_name":"Wenzhao Zhang","orcid":"https://orcid.org/0009-0009-9313-4801"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenzhao Zhang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100405787","display_name":"Ping Zhang","orcid":"https://orcid.org/0000-0002-0269-104X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ping Zhang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5111151839"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1540738,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"20","issue":null,"first_page":"11134","last_page":"11149"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9491000175476074,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9491000175476074,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9488999843597412,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9316999912261963,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantization","display_name":"Quantization (signal processing)","score":0.6759999990463257},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.48899999260902405},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46239998936653137},{"id":"https://openalex.org/keywords/vector-quantization","display_name":"Vector quantization","score":0.41819998621940613},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.40450000762939453},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.353300005197525},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.33640000224113464},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.3273000121116638},{"id":"https://openalex.org/keywords/semantic-interoperability","display_name":"Semantic interoperability","score":0.3147999942302704}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9068999886512756},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.6759999990463257},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.48899999260902405},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46239998936653137},{"id":"https://openalex.org/C199833920","wikidata":"https://www.wikidata.org/wiki/Q612536","display_name":"Vector quantization","level":2,"score":0.41819998621940613},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.40450000762939453},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.38440001010894775},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.353300005197525},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.33640000224113464},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.3273000121116638},{"id":"https://openalex.org/C192800085","wikidata":"https://www.wikidata.org/wiki/Q5258530","display_name":"Semantic interoperability","level":3,"score":0.3147999942302704},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.30329999327659607},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.30300000309944153},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.298799991607666},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.2987000048160553},{"id":"https://openalex.org/C511149849","wikidata":"https://www.wikidata.org/wiki/Q7449051","display_name":"Semantic computing","level":3,"score":0.2985000014305115},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.28839999437332153},{"id":"https://openalex.org/C90312973","wikidata":"https://www.wikidata.org/wiki/Q7449052","display_name":"Semantic data model","level":2,"score":0.288100004196167},{"id":"https://openalex.org/C130318100","wikidata":"https://www.wikidata.org/wiki/Q2268914","display_name":"Semantic similarity","level":2,"score":0.2791999876499176},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.27880001068115234},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.27869999408721924},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.2745000123977661},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2736999988555908},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.26589998602867126},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.265500009059906},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.25619998574256897},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2538999915122986}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2025.3622076","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2025.3622076","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2384402234","display_name":null,"funder_award_id":"62201079","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3544979120","display_name":null,"funder_award_id":"62401074","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8351887730","display_name":null,"funder_award_id":"U24B20131","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8518403084","display_name":null,"funder_award_id":"L242012","funder_id":"https://openalex.org/F4320334977","funder_display_name":"Beijing Municipal Natural Science Foundation"},{"id":"https://openalex.org/G8829899243","display_name":null,"funder_award_id":"L232051","funder_id":"https://openalex.org/F4320334977","funder_display_name":"Beijing Municipal Natural Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320334977","display_name":"Beijing Municipal Natural Science Foundation","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W54872605","https://openalex.org/W2101241495","https://openalex.org/W2113158412","https://openalex.org/W2133665775","https://openalex.org/W2160245619","https://openalex.org/W2207266352","https://openalex.org/W2535690855","https://openalex.org/W2781896769","https://openalex.org/W2895432151","https://openalex.org/W2950143435","https://openalex.org/W2989885118","https://openalex.org/W2999803881","https://openalex.org/W3111192549","https://openalex.org/W3113050802","https://openalex.org/W3164477047","https://openalex.org/W3177281136","https://openalex.org/W3184606595","https://openalex.org/W4312739039","https://openalex.org/W4365420366","https://openalex.org/W4366957333","https://openalex.org/W4381748177","https://openalex.org/W4386453479","https://openalex.org/W4387869747","https://openalex.org/W4387870828","https://openalex.org/W4392397456","https://openalex.org/W4392544406","https://openalex.org/W4392824743","https://openalex.org/W4393062373","https://openalex.org/W4399310691","https://openalex.org/W4401536718","https://openalex.org/W4402129406","https://openalex.org/W4404914557","https://openalex.org/W4406858660","https://openalex.org/W4410639149"],"related_works":[],"abstract_inverted_index":{"In":[0,40],"this":[1],"paper,":[2],"we":[3,25,73,112,143],"formulate":[4],"a":[5,27,42,56,75,93,114,131,145],"Secure":[6],"Hierarchical":[7],"Semantic":[8,136],"Communication":[9,137],"(SH-SC)":[10],"framework":[11],"that":[12,170],"leverages":[13],"cloud-edge-device":[14],"collaboration":[15],"to":[16,48,64,102],"enable":[17],"efficient,":[18],"robust,":[19],"and":[20,55,84,107,163,182,189],"privacy-preserving":[21],"semantic":[22,30,43],"communications.":[23],"Firstly,":[24],"propose":[26,74,113],"quantization-aware":[28,57],"efficient":[29],"communication":[31],"(SemCom)":[32],"model":[33,78,116,158],"pre-training":[34],"scheme":[35,139,156,174],"running":[36],"in":[37,81,186],"the":[38,50,66,98,104,149,153],"cloud.":[39],"particular,":[41],"quantization":[44,95,155,164],"method":[45,61,96],"is":[46,62,100,140],"applied":[47],"reduce":[49,103],"data":[51],"required":[52],"for":[53,90,123],"transmission,":[54],"multi-splitting":[58],"points":[59],"training":[60],"proposed":[63,101,154,172],"mitigate":[65],"accuracy":[67],"loss":[68],"caused":[69],"by":[70],"quantization.":[71],"Secondly,":[72],"robust":[76],"SemCom":[77,115,124],"deployment":[79],"strategy":[80],"local":[82],"device":[83,99],"honest":[85],"but":[86],"curious":[87],"edge":[88],"server":[89],"privacy-preserving,":[91],"where":[92,130],"post-training":[94],"on":[97],"computational":[105],"overhead":[106],"enhance":[108],"privacy":[109,150,177],"preservation.":[110],"Thirdly,":[111],"based":[117],"adaptive":[118],"device-edge":[119],"collaborative":[120],"inferencing":[121],"mechanism":[122],"quality":[125],"of":[126,148,152],"AI":[127],"services":[128],"(QoAIS),":[129],"Joint":[132],"Quantization":[133],"Device-Edge":[134],"Collaboration":[135],"(JQDESC)":[138],"formulated.":[141],"Moreover,":[142],"provide":[144],"theoretical":[146],"analysis":[147],"preservation":[151],"against":[157],"inversion":[159],"attack":[160],"through":[161],"back-propagation":[162],"error":[165],"accumulation.":[166],"Experimental":[167],"results":[168],"demonstrate":[169],"our":[171],"JQDESC":[173],"effectively":[175],"protects":[176],"under":[178],"various":[179],"adversarial":[180],"capabilities,":[181],"has":[183],"better":[184],"performance":[185],"memory":[187],"usage":[188],"end-to-end":[190],"latency":[191],"while":[192],"maintaining":[193],"similar":[194],"accuracy.":[195]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-21T00:00:00"}
