{"id":"https://openalex.org/W4408124986","doi":"https://doi.org/10.1109/tmc.2025.3546910","title":"Privacy Preservation Strategies for Malware-Infected Edge Intelligence Systems: A Bayesian Stochastic Game-Based Approach","display_name":"Privacy Preservation Strategies for Malware-Infected Edge Intelligence Systems: A Bayesian Stochastic Game-Based Approach","publication_year":2025,"publication_date":"2025-03-03","ids":{"openalex":"https://openalex.org/W4408124986","doi":"https://doi.org/10.1109/tmc.2025.3546910"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2025.3546910","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3546910","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021656350","display_name":"Yizhou Shen","orcid":"https://orcid.org/0000-0002-3769-7193"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Yizhou Shen","raw_affiliation_strings":["School of Computing, Newcastle University, Newcastle upon Tyne, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne, U.K","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065644902","display_name":"Carlton Shepherd","orcid":"https://orcid.org/0000-0002-7366-9034"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Carlton Shepherd","raw_affiliation_strings":["School of Computing, Newcastle University, Newcastle upon Tyne, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne, U.K","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077409980","display_name":"Chuadhry Mujeeb Ahmed","orcid":"https://orcid.org/0000-0003-3644-0465"},"institutions":[{"id":"https://openalex.org/I84884186","display_name":"Newcastle University","ror":"https://ror.org/01kj2bm70","country_code":"GB","type":"education","lineage":["https://openalex.org/I84884186"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Chuadhry Mujeeb Ahmed","raw_affiliation_strings":["School of Computing, Newcastle University, Newcastle upon Tyne, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University, Newcastle upon Tyne, U.K","institution_ids":["https://openalex.org/I84884186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030903260","display_name":"Shigen Shen","orcid":"https://orcid.org/0000-0002-7558-5379"},"institutions":[{"id":"https://openalex.org/I3018263800","display_name":"Huzhou University","ror":"https://ror.org/04mvpxy20","country_code":"CN","type":"education","lineage":["https://openalex.org/I3018263800"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shigen Shen","raw_affiliation_strings":["School of Information Engineering, Huzhou University, Huzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Huzhou University, Huzhou, China","institution_ids":["https://openalex.org/I3018263800"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5021656350"],"corresponding_institution_ids":["https://openalex.org/I84884186"],"apc_list":null,"apc_paid":null,"fwci":12.6898,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.98910664,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"24","issue":"8","first_page":"7121","last_page":"7135"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9829999804496765,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8166061639785767},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7209538221359253},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.5383393168449402},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4726124107837677},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.437593013048172},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3464491069316864},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.32583534717559814}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8166061639785767},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7209538221359253},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.5383393168449402},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4726124107837677},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.437593013048172},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3464491069316864},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32583534717559814}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2025.3546910","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2025.3546910","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W2046376809","https://openalex.org/W2065192516","https://openalex.org/W2773056406","https://openalex.org/W2911667635","https://openalex.org/W2918005896","https://openalex.org/W2951270751","https://openalex.org/W2959623371","https://openalex.org/W2973605088","https://openalex.org/W2992059036","https://openalex.org/W3043466729","https://openalex.org/W3046337608","https://openalex.org/W3117926661","https://openalex.org/W3126700118","https://openalex.org/W3134731360","https://openalex.org/W3137833558","https://openalex.org/W3153562009","https://openalex.org/W3162695382","https://openalex.org/W3172224943","https://openalex.org/W3172744943","https://openalex.org/W3206972316","https://openalex.org/W4210529452","https://openalex.org/W4212773425","https://openalex.org/W4213222909","https://openalex.org/W4252284432","https://openalex.org/W4280572029","https://openalex.org/W4283160467","https://openalex.org/W4283210780","https://openalex.org/W4285130686","https://openalex.org/W4285251950","https://openalex.org/W4285321140","https://openalex.org/W4286210752","https://openalex.org/W4288057781","https://openalex.org/W4297359315","https://openalex.org/W4311187132","https://openalex.org/W4312620418","https://openalex.org/W4363647237","https://openalex.org/W4365131452","https://openalex.org/W4366286067","https://openalex.org/W4377079722","https://openalex.org/W4379929549","https://openalex.org/W4383503710","https://openalex.org/W4385834387","https://openalex.org/W4385975893","https://openalex.org/W4386090462","https://openalex.org/W4386261508","https://openalex.org/W4386914101","https://openalex.org/W4391097173","https://openalex.org/W4392397286","https://openalex.org/W4392904828","https://openalex.org/W4393170806","https://openalex.org/W6741651652","https://openalex.org/W6781255394"],"related_works":["https://openalex.org/W2097492617","https://openalex.org/W2753240997","https://openalex.org/W1764168690","https://openalex.org/W2537959205","https://openalex.org/W2740895074","https://openalex.org/W2772446090","https://openalex.org/W4284893819","https://openalex.org/W3152891574","https://openalex.org/W4316881845","https://openalex.org/W2975527072"],"abstract_inverted_index":{"Malware":[0],"in":[1,64,142,158],"the":[2,41,88,95,100,114,136,154,161,179,182],"Internet":[3],"of":[4,43,103,117,139,181],"Things":[5],"(IoT)":[6],"is":[7,85,91],"prone":[8],"to":[9,21,70,98,152],"contaminating":[10],"various":[11],"IoT":[12,59,68,118,144],"end-points":[13,60],"through":[14],"network":[15],"communication":[16],"and":[17,25,36,61,76,168,177],"information":[18],"transfer,":[19],"leading":[20],"surreptitious":[22],"privacy":[23,38,78,105,125],"leakage":[24,79,106],"data":[26,33],"theft.":[27],"The":[28],"existing":[29],"privacy-preserving":[30,145],"approaches":[31],"including":[32],"masking,":[34],"anonymization,":[35],"differential":[37],"always":[39],"lack":[40],"consideration":[42],"strategic":[44],"interactions":[45],"among":[46,160],"rational":[47],"agents.":[48],"Inspired":[49],"by":[50,81],"Bayesian":[51,130],"games,":[52],"we":[53,121,148],"model":[54],"incomplete":[55,104],"stochastic":[56],"games":[57],"between":[58],"edge":[62,65],"nodes":[63],"intelligence":[66],"(EI)-enabled":[67],"systems":[69],"conduct":[71,149],"probability":[72,90],"analysis":[73],"for":[74,135],"predicting":[75],"defending":[77],"caused":[80],"malware":[82],"infection.":[83],"It":[84],"notable":[86],"that":[87],"posterior":[89],"defined":[92],"based":[93],"on":[94],"Bayes\u2019":[96],"rule":[97],"reflect":[99],"statistical":[101],"inference":[102],"information.":[107],"Such":[108],"a":[109,123],"method":[110],"can":[111],"intrinsically":[112],"characterize":[113],"actual":[115],"situations":[116],"end-points.":[119],"Further,":[120],"propose":[122],"novel":[124],"preservation":[126],"optimization":[127,140],"approach":[128],"named":[129],"advantage":[131],"actor":[132],"critic":[133],"(BA2C)":[134],"practical":[137],"implementation":[138],"decision":[141],"EI-enabled":[143],"systems.":[146],"Eventually,":[147],"experimental":[150],"simulations":[151],"understand":[153],"most":[155],"effective":[156],"parameters":[157],"decision-making":[159],"successful":[162,165],"detection":[163],"rate,":[164,167],"infection":[166],"false":[169],"alarm":[170],"rate.":[171],"We":[172],"also":[173],"compare":[174],"traditional":[175],"algorithms":[176],"validate":[178],"efficacy":[180],"proposed":[183],"approach.":[184]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6}],"updated_date":"2026-03-15T09:29:46.208133","created_date":"2025-10-10T00:00:00"}
