{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:33:57Z","timestamp":1774121637450,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T00:00:00Z","timestamp":1592438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T00:00:00Z","timestamp":1592438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2017YFB0802303"],"award-info":[{"award-number":["2017YFB0802303"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672283"],"award-info":[{"award-number":["61672283"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602238"],"award-info":[{"award-number":["61602238"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postgraduate Research & Practice Innovation Program of Jiangsu Province","award":["KYCX18\u02d90308"],"award-info":[{"award-number":["KYCX18\u02d90308"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1007\/s11036-020-01586-4","type":"journal-article","created":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T22:02:19Z","timestamp":1592517739000},"page":"2421-2433","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":42,"title":["FedMEC: Improving Efficiency of Differentially Private Federated Learning via Mobile Edge Computing"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2143-5666","authenticated-orcid":false,"given":"Jiale","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yanchao","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Junyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,18]]},"reference":[{"key":"1586_CR1","doi-asserted-by":"crossref","unstructured":"Hesamifard E, Takabi H, Ghasemi M, Wright RN (2018) Privacy-preserving machine learning as a service. In: Proc. of 19th Privacy enhancing technologies symposium (PETS), pp 123\u2013142","DOI":"10.1515\/popets-2018-0024"},{"key":"1586_CR2","doi-asserted-by":"crossref","unstructured":"Cao B, Zheng L, Zhang C, Yu PS, Piscitello A, Zulueta J, Ajilore O, Ryan K, Leow AD (2017) DeepMood: Modeling mobile phone typing dynamics for mood detection. In: Proc. of 23rd ACM International conference on knowledge discovery and data mining (SIGKDD), pp 747\u2013755","DOI":"10.1145\/3097983.3098086"},{"key":"1586_CR3","doi-asserted-by":"crossref","unstructured":"Schroff F, Kalenichenko D, Philbin J (2015) Facenet: A Unified Embedding for Face Recognition and Clustering. In: Proc. of 28th IEEE Conference on computer vision and pattern recognition (CVPR), pp 815\u2013823","DOI":"10.1109\/CVPR.2015.7298682"},{"issue":"3","key":"1586_CR4","doi-asserted-by":"publisher","first-page":"1739","DOI":"10.1109\/JIOT.2018.2792300","volume":"5","author":"X Zhai","year":"2018","unstructured":"Zhai X, Guan X, Zhu C, Shu L, Yuan J (2018) Optimization algorithms for Multi-access green communications in internet of things. IEEE Internet of Things J 5(3):1739\u20131748","journal-title":"IEEE Internet of Things J"},{"key":"1586_CR5","doi-asserted-by":"publisher","first-page":"18209","DOI":"10.1109\/ACCESS.2018.2820162","volume":"6","author":"J Zhang","year":"2018","unstructured":"Zhang J, Chen B, Zhao Y, Cheng X, Hu F (2018) Data security and Privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6:18209\u201318237","journal-title":"IEEE Access"},{"issue":"3","key":"1586_CR6","doi-asserted-by":"publisher","first-page":"1628","DOI":"10.1109\/COMST.2017.2682318","volume":"19","author":"P Mach","year":"2017","unstructured":"Mach P, Becvar Z (2017) Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun Surv & Tut 19(3):1628\u20131656","journal-title":"IEEE Commun Surv & Tut"},{"key":"1586_CR7","doi-asserted-by":"crossref","unstructured":"Zhai XB, Liu X, Zhu C, Zhu K, Chen B (2019) Fast admission control and power optimization with adaptive rates for communication fairness in wireless networks. IEEE Transactions on Mobile Computing, to appear, 2019","DOI":"10.1109\/TMC.2019.2954126"},{"issue":"9","key":"1586_CR8","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/TPDS.2012.264","volume":"24","author":"Y Li","year":"2017","unstructured":"Li Y, Qi X, Keally M, Ren Z, Zhou G, Xiao D, Deng S (2017) Communication energy modeling and optimization through joint packet size analysis of bsn and wifi networks. IEEE Trans Parall Distr Syst 24(9):1741\u20131751","journal-title":"IEEE Trans Parall Distr Syst"},{"key":"1586_CR9","unstructured":"Kone\u010dny\u0300 J., McMahan HB, Yu FX, Richt\u00e1rik P., Suresh AT, Bacon D (2016) Federated Learning: Strategies for Improving Communication Efficiency. [Online]. Available: arXiv:1610.05492"},{"key":"1586_CR10","unstructured":"Smith V, Chiang C.-K., Sanjabi M, Talwalkar AS (2017) Federated Multi-task learning. In: Proc. of 32nd Annual conference on neural information processing systems (NIPS), pp 4427\u20134437"},{"key":"1586_CR11","doi-asserted-by":"crossref","unstructured":"Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proc. of 22nd ACM Conference on computer and communications security (CCS), pp 1310\u20131321","DOI":"10.1145\/2810103.2813687"},{"issue":"2","key":"1586_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. ACM Trans Intell Syst Technol 10(2):1\u201319","journal-title":"ACM Trans Intell Syst Technol"},{"key":"1586_CR13","unstructured":"McMahan HB, Moore E, Ramage D, Hampson S, y Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Proc. of 20th International conference on artificial intelligence and statistics (AISTATS), pp 1\u201310"},{"key":"1586_CR14","doi-asserted-by":"crossref","unstructured":"Wang J, Zhang J, Bao W, Zhu X, Cao B, Yu PS (2018) Not Just Privacy: Improving Performance of Private Deep Learning in Mobile Cloud. In: Proc. of 24th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pp 2407\u20132416","DOI":"10.1145\/3219819.3220106"},{"key":"1586_CR15","doi-asserted-by":"crossref","unstructured":"Mao Y, Yi S, Li Q, Feng J, Xu F, Zhong S (2018) Learning from differentially private neural activations with edge computing. In: Proc. of 3rd IEEE\/ACM Symposium on edge computing (SEC), pp 90\u2013102","DOI":"10.1109\/SEC.2018.00014"},{"key":"1586_CR16","unstructured":"Han S, Pool J, Tran J, Dally W (2015) Learning both weights and connections for efficient neural networks. In: Proc. of 30th Annual conference on neural information processing systems (NIPS), pp 1135\u20131143"},{"issue":"1","key":"1586_CR17","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/JIOT.2018.2851185","volume":"6","author":"Y Li","year":"2018","unstructured":"Li Y, Hu H, Zhou G (2018) Using data augmentation in continuous authentication on smartphones. IEEE Internet of Things J 6(1):628\u2013640","journal-title":"IEEE Internet of Things J"},{"key":"1586_CR18","unstructured":"Hayes J, Ohrimenko O (2018) Contamination Attacks and Mitigation in Multi-Party Machine Learning. In: Proc. of 33th annual conference on neural information processing systems (NIPS), pp 6604\u20136616"},{"key":"1586_CR19","doi-asserted-by":"publisher","first-page":"32554","DOI":"10.1109\/ACCESS.2018.2841347","volume":"6","author":"Y Li","year":"2018","unstructured":"Li Y, Hu H, Zhou G, Deng S (2018) Sensor-based continuous authentication using cost-effective kernel ridge regression. IEEE Access 6:32554\u201332565","journal-title":"IEEE Access"},{"key":"1586_CR20","doi-asserted-by":"crossref","unstructured":"Fredrikson F, Jha S, Ristenpart T (2015) Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures. In: Proc. of 22th ACM Conference on computer and communications security (CCS), pp 1322\u20131333","DOI":"10.1145\/2810103.2813677"},{"issue":"5","key":"1586_CR21","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","volume":"13","author":"LT Phong","year":"2018","unstructured":"Phong LT, Aono Y, Wang T, Hayashi L, Moriai S (2018) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inf Forensics Secur 13(5):1333\u20131345","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"1586_CR22","first-page":"1","volume":"1","author":"SA Osia","year":"2018","unstructured":"Osia SA, Shamsabadi AS, Taheri A, Katevas K, Sajadmanesh S, Rabiee HR, Lane ND, Haddadi H (2018) A hybrid deep learning architecture for Privacy-preserving mobile analytics. ACM Trans Knowl Discov Data 1(1):1\u201321","journal-title":"ACM Trans Knowl Discov Data"},{"key":"1586_CR23","unstructured":"Dean J, Corrado G, Monga R, Chen K, Devin M, Mao M, Ranzato M, Senior A, Tucker P, Yang K, Le QV, Ng AY (2012) Large scale distributed deep networks. In: Proc. of 27th Annual conference on neural information processing systems (NIPS), pp 1223\u20131231"},{"key":"1586_CR24","doi-asserted-by":"crossref","unstructured":"Zhang J, Wang J, Zhao Y, Chen B (2019) An Efficient Federated Learning Scheme with differential privacy in mobile edge computing. In: Proc. of 4th EAI International conference on machine learning and intelligent communications (MLICOM), pp 538\u2013550","DOI":"10.1007\/978-3-030-32388-2_46"},{"key":"1586_CR25","doi-asserted-by":"crossref","unstructured":"Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L (2016) Deep Learning with Differential Privacy. In: Proc. of 23th ACM Conference on computer and communications security (CCS), pp 308\u2013318","DOI":"10.1145\/2976749.2978318"},{"issue":"3","key":"1586_CR26","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork C, Roth A (2014) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3):211\u2013407","journal-title":"Found Trends Theor Comput Sci"},{"key":"1586_CR27","unstructured":"Geyer RC, Klein T, Nabi M (2017) Differentially private federated learning: A client level perspective. In: Proc. of 32nd annual conference on neural information processing systems (NIPS), pp 1\u20137"},{"key":"1586_CR28","doi-asserted-by":"crossref","unstructured":"Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proc. of 24th ACM conference on computer and communications security (CCS), pp 1175\u20131191","DOI":"10.1145\/3133956.3133982"},{"issue":"3","key":"1586_CR29","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s10994-013-5404-1","volume":"94","author":"A Beimel","year":"2014","unstructured":"Beimel A, Brenner H, Kasiviswanathan SP, Nissim K (2014) Bounds on the sample complexity for private learning and private data release. Machine Learning 94(3):401\u2013437","journal-title":"Machine Learning"},{"issue":"1","key":"1586_CR30","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MNET.2018.1700202","volume":"32","author":"H Li","year":"2018","unstructured":"Li H, Ota K, Dong M (2018) Learning IoT in edge: Deep learning for the internet of things with edge computing. IEEE Network 32(1):96\u2013101","journal-title":"IEEE Network"},{"issue":"4","key":"1586_CR31","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MNET.2018.1700447","volume":"32","author":"S Chang","year":"2018","unstructured":"Chang S, Li C (2018) Privacy in neural network learning: threats and countermeasures. IEEE Network 32 (4):61\u201367","journal-title":"IEEE Network"},{"key":"1586_CR32","doi-asserted-by":"crossref","unstructured":"Lane ND, Georgiev P (2015) Can Deep Learning Revolutionize Mobile Sensing?. In: Proc. of 16th International workshop on mobile computing systems and applications (HotMobile), pp 117\u2013122","DOI":"10.1145\/2699343.2699349"},{"key":"1586_CR33","doi-asserted-by":"crossref","unstructured":"Friedman A, Schuster A (2010) Data mining with differential privacy. In: Proc. of 16th ACM International conference on knowledge discovery and data mining (SIGKDD), pp 25\u201328","DOI":"10.1145\/1835804.1835868"},{"key":"1586_CR34","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","volume":"61","author":"J Schmidhuber","year":"2015","unstructured":"Schmidhuber J (2015) Deep learning in neural networks: an overview. Neural networks 61:85\u2013117","journal-title":"Neural networks"},{"issue":"2","key":"1586_CR35","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1109\/TPAMI.2015.2439281","volume":"38","author":"C Dong","year":"2016","unstructured":"Dong C, Loy CC, He K, Tang X (2016) Image Super-resolutio using deep convolutional networks. IEEE Trans Pattern Anal Machine Intell 38(2):295\u2013307","journal-title":"IEEE Trans Pattern Anal Machine Intell"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-020-01586-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-020-01586-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-020-01586-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,17]],"date-time":"2021-06-17T23:30:53Z","timestamp":1623972653000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-020-01586-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,18]]},"references-count":35,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1586"],"URL":"https:\/\/doi.org\/10.1007\/s11036-020-01586-4","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,18]]},"assertion":[{"value":"18 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}