{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T03:34:40Z","timestamp":1758944080780,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T00:00:00Z","timestamp":1660867200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T00:00:00Z","timestamp":1660867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11036-022-02013-6","type":"journal-article","created":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T10:15:55Z","timestamp":1660904155000},"page":"2153-2162","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Differential Privacy Enabled Deep Neural Networks for Wireless Resource Management"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6750-9440","authenticated-orcid":false,"given":"Md Habibur","family":"Rahman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8883-5170","authenticated-orcid":false,"given":"Md Munjure","family":"Mowla","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6824-703X","authenticated-orcid":false,"given":"Shahriar","family":"Shanto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,19]]},"reference":[{"issue":"3","key":"2013_CR1","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1109\/COMST.2018.2867268","volume":"21","author":"Y Teng","year":"2018","unstructured":"Teng Y, Liu M, Yu FR, Leung VC, Song M, Zhang Y (2018) Resource allocation for ultra-dense networks: a survey, some research issues and challenges. IEEE Commun Surveys Tutor 21(3):2134\u20132168","journal-title":"IEEE Commun Surveys Tutor"},{"issue":"1","key":"2013_CR2","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/s11036-019-01288-6","volume":"25","author":"BM ElHalawany","year":"2020","unstructured":"ElHalawany BM, Hashad O, Wu K, Tag Eldien AS (2020) Uplink resource allocation for multi-cluster internet-of-things deployment underlaying cellular networks. Mob Netw Appl 25(1):300\u2013313","journal-title":"Mob Netw Appl"},{"issue":"1","key":"2013_CR3","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/JSTSP.2007.914876","volume":"2","author":"Z-Q Luo","year":"2008","unstructured":"Luo Z-Q, Zhang S (2008) Dynamic spectrum management: Complexity and duality. IEEE J Select Topics Signal Process 2(1):57\u201373","journal-title":"IEEE J Select Topics Signal Process"},{"issue":"6","key":"2013_CR4","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1007\/s11036-016-0713-9","volume":"21","author":"D Liu","year":"2016","unstructured":"Liu D, Cui H, Wu J, Luo C (2016) Resource allocation for uncoded multi-user video transmission over wireless networks. Mob Netw Appl 21(6):950\u2013961","journal-title":"Mob Netw Appl"},{"issue":"2","key":"2013_CR5","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s11036-014-0558-z","volume":"20","author":"X Zhang","year":"2015","unstructured":"Zhang X, Yang K, Wang P, Hong X (2015) Energy efficient bandwidth allocation in heterogeneous wireless networks. Mob Netw Appl 20(2):137\u2013146","journal-title":"Mob Netw Appl"},{"issue":"3","key":"2013_CR6","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1109\/TGCN.2017.2700855","volume":"1","author":"MM Mowla","year":"2017","unstructured":"Mowla MM, Ahmad I, Habibi D, Phung QV (2017) A green communication model for 5G systems. IEEE Trans Green Commun Netw 1(3):264\u2013280","journal-title":"IEEE Trans Green Commun Netw"},{"issue":"2","key":"2013_CR7","doi-asserted-by":"publisher","first-page":"670","DOI":"10.1109\/TGCN.2021.3067374","volume":"5","author":"Y Huang","year":"2021","unstructured":"Huang Y, Xu H, Gao H, Ma X, Hussain W (2021) SSUR: An approach to optimizing virtual machine allocation strategy based on user requirements for cloud data center. IEEE Trans Green Commun Netw 5(2):670\u2013681","journal-title":"IEEE Trans Green Commun Netw"},{"issue":"1","key":"2013_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1605-z","volume":"2019","author":"Y Zhu","year":"2019","unstructured":"Zhu Y, Zhang W, Chen Y, Gao H (2019) A novel approach to workload prediction using attention-based LSTM encoder-decoder network in cloud environment. EURASIP J Wirel Commun Netw 2019(1):1\u201318","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"2013_CR9","doi-asserted-by":"crossref","unstructured":"Sarker IH, Khan AI, Abushark YB, Alsolami F (2022) Internet of things (IoT) security intelligence: a comprehensive overview, machine learning solutions and research directions. Mob Netw Appl 1\u201317","DOI":"10.1007\/s11036-022-01937-3"},{"issue":"2","key":"2013_CR10","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s13042-020-01178-4","volume":"12","author":"H Fourati","year":"2021","unstructured":"Fourati H, Maaloul R, Chaari L (2021) A survey of 5G network systems: challenges and machine learning approaches. Int J Machine Learn Cybern 12(2):385\u2013431","journal-title":"Int J Machine Learn Cybern"},{"key":"2013_CR11","doi-asserted-by":"publisher","unstructured":"Gao H, Liu C, Yin Y, Xu Y, Li Y (2021) A\u00a0hybrid approach to trust node assessment and\u00a0management for VANETs cooperative data\u00a0communication: historical interaction\u00a0perspective. IEEE Trans Intell Transp Syst.\u00a0https:\/\/doi.org\/10.1109\/TITS.2021.3129458","DOI":"10.1109\/TITS.2021.3129458"},{"key":"2013_CR12","doi-asserted-by":"publisher","unstructured":"Rahman MH, Mowla MM (2020) A deep neural network based optimization approach for wireless resource management, 803\u2013806. https:\/\/doi.org\/10.1109\/TENSYMP50017.2020.9230822","DOI":"10.1109\/TENSYMP50017.2020.9230822"},{"issue":"9","key":"2013_CR13","doi-asserted-by":"publisher","first-page":"1942","DOI":"10.1109\/LCOMM.2018.2859392","volume":"22","author":"W Lee","year":"2018","unstructured":"Lee W (2018) Resource allocation for multi-channel underlay cognitive radio network based on deep neural network. IEEE Commun Lett 22(9):1942\u20131945","journal-title":"IEEE Commun Lett"},{"issue":"16","key":"2013_CR14","doi-asserted-by":"publisher","first-page":"12983","DOI":"10.1109\/JIOT.2021.3064150","volume":"8","author":"M-L Ku","year":"2021","unstructured":"Ku M-L, Lin T-J (2021) Neural-network-based power control prediction for solar-powered energy harvesting communications. IEEE Int Things J 8(16):12983\u201312998. https:\/\/doi.org\/10.1109\/JIOT.2021.3064150","journal-title":"IEEE Int Things J"},{"issue":"20","key":"2013_CR15","doi-asserted-by":"publisher","first-page":"5438","DOI":"10.1109\/TSP.2018.2866382","volume":"66","author":"H Sun","year":"2018","unstructured":"Sun H, Chen X, Shi Q, Hong M, Fu X, Sidiropoulos ND (2018) Learning to optimize: Training deep neural networks for interference management. IEEE Trans Signal Process 66(20):5438\u20135453","journal-title":"IEEE Trans Signal Process"},{"key":"2013_CR16","doi-asserted-by":"publisher","unstructured":"Rahman MH, Mowla MM, Shanto S (2020) Convolutional neural network based optimization approach for wireless resource management, 280\u2013285. https:\/\/doi.org\/10.1109\/ICAICT51780.2020.9333532","DOI":"10.1109\/ICAICT51780.2020.9333532"},{"issue":"9","key":"2013_CR17","doi-asserted-by":"publisher","first-page":"4331","DOI":"10.1109\/TSP.2011.2147784","volume":"59","author":"Q Shi","year":"2011","unstructured":"Shi Q, Razaviyayn M, Luo Z-Q, He C (2011) An iteratively weighted mmse approach to distributed sum-utility maximization for a mimo interfering broadcast channel. IEEE Trans Signal Process 59 (9):4331\u20134340","journal-title":"IEEE Trans Signal Process"},{"key":"2013_CR18","first-page":"3","volume-title":"Membership inference attacks against machine learning models","author":"R Shokri","year":"2017","unstructured":"Shokri R, Stronati M, Song C, Shmatikov V (2017) Membership inference attacks against machine learning models. IEEE, New Jersey, pp 3\u201318"},{"key":"2013_CR19","doi-asserted-by":"crossref","unstructured":"Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L (2016) Deep learning with differential privacy. 308\u2013318","DOI":"10.1145\/2976749.2978318"},{"key":"2013_CR20","unstructured":"Chaudhuri K, Monteleoni C, Sarwate AD (2011) Differentially private empirical risk minimization. Journal of Machine Learning Research 12(3)"},{"key":"2013_CR21","doi-asserted-by":"crossref","unstructured":"Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. 1310\u20131321","DOI":"10.1145\/2810103.2813687"},{"key":"2013_CR22","doi-asserted-by":"publisher","unstructured":"Gao H, Qiu B, Barroso RJD, Hussain W, Xu Y, Wang X (2022) TSMAE: a novel anomaly detection approach for internet of things time series data using memory-augmented autoencoder. IEEE Trans Netw Sci Eng.\u00a0https:\/\/doi.org\/10.1109\/TNSE.2022.3163144","DOI":"10.1109\/TNSE.2022.3163144"},{"key":"2013_CR23","first-page":"449","volume-title":"A deep learning approach for optimizing content delivering in cache-enabled hetnet","author":"L Lei","year":"2017","unstructured":"Lei L, You L, Dai G, Vu TX, Yuan D, Chatzinotas S (2017) A deep learning approach for optimizing content delivering in cache-enabled hetnet. IEEE, New York, pp 449\u2013453"},{"issue":"6","key":"2013_CR24","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1109\/MNET.2019.1900029","volume":"33","author":"KI Ahmed","year":"2019","unstructured":"Ahmed KI, Tabassum H, Hossain E (2019) Deep learning for radio resource allocation in multi-cell networks. IEEE Netw 33(6):188\u2013195","journal-title":"IEEE Netw"},{"key":"2013_CR25","doi-asserted-by":"crossref","unstructured":"Fredrikson M, Jha S, Ristenpart T (2015) Model inversion attacks that exploit confidence information and basic countermeasures, 1322\u20131333","DOI":"10.1145\/2810103.2813677"},{"key":"2013_CR26","doi-asserted-by":"crossref","unstructured":"Cort\u00e9s J, Dullerud GE, Han S, Le Ny J, Mitra S, Pappas GJ (2016) Differential privacy in control and network systems. In: 2016 IEEE 55th Conference on Decision and Control (CDC). IEEE, pp 4252\u20134272","DOI":"10.1109\/CDC.2016.7798915"},{"issue":"6","key":"2013_CR27","doi-asserted-by":"publisher","first-page":"2421","DOI":"10.1007\/s11036-020-01586-4","volume":"25","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zhao Y, Wang J, Chen B (2020) Fedmec: improving efficiency of differentially private federated learning via mobile edge computing. Mob Netw Appl 25(6):2421\u20132433","journal-title":"Mob Netw Appl"},{"issue":"2","key":"2013_CR28","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s11036-019-01448-8","volume":"25","author":"X Xu","year":"2020","unstructured":"Xu X, Liu X, Xu Z, Wang C, Wan S, Yang X (2020) Joint optimization of resource utilization and load balance with privacy preservation for edge services in 5G networks. Mob Netw Appl 25(2):713\u2013724","journal-title":"Mob Netw Appl"},{"issue":"1","key":"2013_CR29","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1109\/TCSS.2021.3074949","volume":"9","author":"S Wang","year":"2022","unstructured":"Wang S, Li J, Wu G, Chen H, Sun S (2022) Joint optimization of task offloading and resource allocation based on differential privacy in vehicular edge computing. IEEE Transactions on Computational Social Systems 9(1):109\u2013119. https:\/\/doi.org\/10.1109\/TCSS.2021.3074949","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"6","key":"2013_CR30","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MSP.2014.2335237","volume":"31","author":"H Baligh","year":"2014","unstructured":"Baligh H, Hong M, Liao W-C, Luo Z-Q, Razaviyayn M, Sanjabi M, Sun R (2014) Cross-layer provision of future cellular networks: a wmmse-based approach. IEEE Signal Proc Mag 31(6):56\u201368","journal-title":"IEEE Signal Proc Mag"},{"key":"2013_CR31","unstructured":"Verdu S, et al. (1998) Multiuser detection, 57\u201373"},{"issue":"3","key":"2013_CR32","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1515\/popets-2016-0015","volume":"2016","author":"G Fanti","year":"2016","unstructured":"Fanti G, Pihur V, Erlingsson \u00da (2016) Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries. Proceedings on Privacy Enhancing Technologies 2016(3):41\u201361","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"2013_CR33","doi-asserted-by":"publisher","first-page":"102303","DOI":"10.1016\/j.adhoc.2020.102303","volume":"110","author":"B Ning","year":"2021","unstructured":"Ning B, Sun Y, Tao X, Li G (2021) Differential privacy protection on weighted graph in wireless networks. Ad Hoc Netw 110:102303. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102303","journal-title":"Ad Hoc Netw"},{"key":"2013_CR34","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1016\/j.future.2020.08.014","volume":"114","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Pan J, Qi L, He Q (2021) Privacy-preserving quality prediction for edge-based IoT services. Futur Gener Comput Syst 114:336\u2013348. https:\/\/doi.org\/10.1016\/j.future.2020.08.014","journal-title":"Futur Gener Comput Syst"},{"key":"2013_CR35","first-page":"15479","volume":"32","author":"E Bagdasaryan","year":"2019","unstructured":"Bagdasaryan E, Poursaeed O, Shmatikov V (2019) Differential privacy has disparate impact on model accuracy. Adv Neural Inf Process Syst 32:15479\u201315488","journal-title":"Adv Neural Inf Process Syst"},{"key":"2013_CR36","doi-asserted-by":"publisher","unstructured":"Nicolas P, Shuang S, Ilya M, Ananth R,\u00a0Kunal T, \u00dalfar E (2018) Scalable private\u00a0learning with pate. In: 6th International\u00a0Conference on Learning Representations, ICLR.\u00a0https:\/\/doi.org\/10.48550\/arXiv.1802.08908","DOI":"10.48550\/arXiv.1802.08908"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-02013-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-022-02013-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-02013-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T09:24:02Z","timestamp":1666603442000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-022-02013-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,19]]},"references-count":36,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["2013"],"URL":"https:\/\/doi.org\/10.1007\/s11036-022-02013-6","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2022,8,19]]},"assertion":[{"value":"9 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests that are relevant to the contents of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interests"}}]}}