{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T19:15:53Z","timestamp":1776453353332,"version":"3.51.2"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100021171","name":"Guangdong Basic and Applied Basic Research Foundation","doi-asserted-by":"crossref","award":["2021A1515110027"],"award-info":[{"award-number":["2021A1515110027"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shenzhen Science and Technology Program","award":["RCBS20210609103056041"],"award-info":[{"award-number":["RCBS20210609103056041"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002167"],"award-info":[{"award-number":["62002167"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010229","name":"Natural Science Foundation of Tianjin Municipal Science and Technology Commission","doi-asserted-by":"publisher","award":["BK20200461"],"award-info":[{"award-number":["BK20200461"]}],"id":[{"id":"10.13039\/501100010229","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Grants Council of Hong Kong","award":["CityU 11217819"],"award-info":[{"award-number":["CityU 11217819"]}]},{"name":"Research Grants Council of Hong Kong","award":["11217620"],"award-info":[{"award-number":["11217620"]}]},{"name":"Research Grants Council of Hong Kong","award":["RFS2122-1S04"],"award-info":[{"award-number":["RFS2122-1S04"]}]},{"name":"Research Grants Council of Hong Kong","award":["N_CityU139\/21"],"award-info":[{"award-number":["N_CityU139\/21"]}]},{"name":"Research Grants Council of Hong Kong","award":["C2004-21GF"],"award-info":[{"award-number":["C2004-21GF"]}]},{"name":"Research Grants Council of Hong Kong","award":["R1012-21"],"award-info":[{"award-number":["R1012-21"]}]},{"name":"Research Grants Council of Hong Kong","award":["R6021-20F"],"award-info":[{"award-number":["R6021-20F"]}]},{"name":"Shenzhen Municipality Science and Technology Innovation Commission","award":["SGDX20201103093004019"],"award-info":[{"award-number":["SGDX20201103093004019"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11276-022-03113-7","type":"journal-article","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T13:04:55Z","timestamp":1662383095000},"page":"4713-4733","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Can differential privacy practically protect collaborative deep learning inference for IoT?"],"prefix":"10.1007","volume":"30","author":[{"given":"Jihyeon","family":"Ryu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7852-6051","authenticated-orcid":false,"given":"Yifeng","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yansong","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Alsharif","family":"Abuadbba","sequence":"additional","affiliation":[]},{"given":"Junyaup","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Dongho","family":"Won","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Cong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,5]]},"reference":[{"key":"3113_CR1","doi-asserted-by":"crossref","unstructured":"Yao, S., Hu, S., Zhao, Y., Zhang, A., & Abdelzaher, T. F. (2017). Deepsense: A unified deep learning framework for time-series mobile sensing data processing. In Proceedings of WWW.","DOI":"10.1145\/3038912.3052577"},{"key":"3113_CR2","doi-asserted-by":"crossref","unstructured":"Radu, V., Tong, C., Bhattacharya, S., Lane, N. D., Mascolo, C., Marina, M. K., & Kawsar, F. (2017). Multimodal deep learning for activity and context recognition. In Proceedings of the ACM on interactive, mobile, wearable and ubiquitous technologies, Vol.\u00a01, no.\u00a04, pp. 157:1\u2013157:27.","DOI":"10.1145\/3161174"},{"key":"3113_CR3","doi-asserted-by":"crossref","unstructured":"Yao, S., Zhao, Y., Shao, H., Zhang, A., Zhang, C., Li, S., & Abdelzaher, T. F. (2017) \u201cRdeepsense: Reliable deep mobile computing models with uncertainty estimations,\u201d Proceedings of the ACM on interactive, mobile, wearable and ubiquitous technologies, Vol.\u00a01, no.\u00a04, pp. 173:1\u2013173:26.","DOI":"10.1145\/3161181"},{"key":"3113_CR4","doi-asserted-by":"crossref","unstructured":"Yao, S., Zhao, Y., Shao, H., Zhang, C., Zhang, A., Hu, S., Liu, D., Liu, S., Su, L., & Abdelzaher, T. F. (2018). Sensegan: Enabling deep learning for internet of things with a semi-supervised framework. In Proceedings of the ACM on interactive, mobile, wearable and ubiquitous technologies, Vol.\u00a02, no.\u00a03, pp. 144:1\u2013144:21.","DOI":"10.1145\/3264954"},{"issue":"5","key":"3113_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MC.2018.2381131","volume":"51","author":"S Yao","year":"2018","unstructured":"Yao, S., Zhao, Y., Zhang, A., Hu, S., Shao, H., Zhang, C., Su, L., & Abdelzaher, T. (2018). Deep learning for the internet of things. Computer, 51(5), 32\u201341.","journal-title":"Computer"},{"key":"3113_CR6","doi-asserted-by":"crossref","unstructured":"Yao, S., Zhao, Y., Shao, H., Liu, S., Liu, D., Su, L., & Abdelzaher, T. F. (2018). Fastdeepiot: Towards understanding and optimizing neural network execution time on mobile and embedded devices. In Proceedings of ACM SenSys.","DOI":"10.1145\/3274783.3274840"},{"key":"3113_CR7","doi-asserted-by":"crossref","unstructured":"Teerapittayanon, S., McDanel, B., & Kung, H. T. (2017). Distributed deep neural networks over the cloud, the edge and end devices. In Proceedings of IEEE ICDCS.","DOI":"10.1109\/ICDCS.2017.226"},{"key":"3113_CR8","doi-asserted-by":"crossref","unstructured":"Ko, J. H., Na, T., Amir, M. F., & Mukhopadhyay, S. (2018). Edge-host partitioning of deep neural networks with feature space encoding for resource-constrained internet-of-things platforms. In Proceedings of IEEE international conference on advanced video and signal based surveillance.","DOI":"10.1109\/AVSS.2018.8639121"},{"key":"3113_CR9","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhang, J., Bao, W., Zhu, X., Cao, B., & Yu, P. S. (2018). Not just privacy: Improving performance of private deep learning in mobile cloud. In Proceedings of KDD.","DOI":"10.1145\/3219819.3220106"},{"key":"3113_CR10","doi-asserted-by":"crossref","unstructured":"He, Z., Zhang, T., & Lee, R. B. (2019). Model inversion attacks against collaborative inference. In Proceedings of ACSAC.","DOI":"10.1145\/3359789.3359824"},{"key":"3113_CR11","doi-asserted-by":"crossref","unstructured":"Dwork, C. (2006). Differential privacy. In Proceedings of ICALP.","DOI":"10.1007\/11787006_1"},{"key":"3113_CR12","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., & Smith, A. D. (2006). Calibrating noise to sensitivity in private data analysis. In Proceedings of TCC.","DOI":"10.1007\/11681878_14"},{"key":"3113_CR13","doi-asserted-by":"publisher","first-page":"108331","DOI":"10.1016\/j.patcog.2021.108331","volume":"122","author":"J Bai","year":"2022","unstructured":"Bai, J., Li, Y., Li, J., Yang, X., Jiang, Y., & Xia, S. (2022). Multinomial random forest. Pattern Recognition, 122, 108331.","journal-title":"Pattern Recognition"},{"key":"3113_CR14","unstructured":"Netzer, Y., Wang, T., Coates, A., Bissacco, A., Wu, B., & Ng, A. Y. (2011). Reading digits in natural images with unsupervised feature learning. In ICLR AI for social good workshop."},{"key":"3113_CR15","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1016\/j.neunet.2012.02.016","volume":"32","author":"J Stallkamp","year":"2012","unstructured":"Stallkamp, J., Schlipsing, M., Salmen, J., & Igel, C. (2012). Man vs. computer: Benchmarking machine learning algorithms for traffic sign recognition. Neural Networks, 32, 323\u2013332.","journal-title":"Neural Networks"},{"key":"3113_CR16","unstructured":"Krizhevsky, A. (2009). Learning multiple layers of features from tiny images. Tech. Rep."},{"key":"3113_CR17","unstructured":"Coates, A., Ng, A. Y., & Lee, H. (2011). An analysis of single-layer networks in unsupervised feature learning. In Proceedings of AISTATS."},{"key":"3113_CR18","unstructured":"Jayaraman, B., & Evans, D. (2019). Evaluating differentially private machine learning in practice. In Proceedings of USENIX security."},{"issue":"4","key":"3113_CR19","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing, 13(4), 600\u2013612.","journal-title":"IEEE Transactions on Image Processing"},{"key":"3113_CR20","unstructured":"Dosovitskiy, A., Springenberg, J. T., Riedmiller, M., & Brox, T. (2014). Discriminative unsupervised feature learning with convolutional neural networks. In Proceedings of NeurlPS, pp. 766\u2013774."},{"issue":"2","key":"3113_CR21","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1109\/TNSM.2020.2982555","volume":"17","author":"H Huang","year":"2020","unstructured":"Huang, H., Zhang, D., Xiao, F., Wang, K., Gu, J., & Wang, R. (2020). Privacy-preserving approach pbcn in social network with differential privacy. IEEE Transactions on Network and Service Management, 17(2), 931\u2013945.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"4","key":"3113_CR22","doi-asserted-by":"publisher","first-page":"2536","DOI":"10.1109\/TNSM.2020.3010967","volume":"17","author":"DC Nguyen","year":"2020","unstructured":"Nguyen, D. C., Pathirana, P. N., Ding, M., & Seneviratne, A. (2020). Privacy-preserved task offloading in mobile blockchain with deep reinforcement learning. IEEE Transactions on Network and Service Management, 17(4), 2536\u20132549.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"4","key":"3113_CR23","doi-asserted-by":"publisher","first-page":"2291","DOI":"10.1109\/TNSM.2020.3022278","volume":"17","author":"D Andreoletti","year":"2020","unstructured":"Andreoletti, D., Velichkova, T., Verticale, G., Tornatore, M., & Giordano, S. (2020). A privacy-preserving reinforcement learning algorithm for multi-domain virtual network embedding. IEEE Transactions on Network and Service Management, 17(4), 2291\u20132304.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"3113_CR24","doi-asserted-by":"crossref","unstructured":"Dong, S., Xia, Y., & Peng, T. (2021). Network abnormal traffic detection model based on semi-supervised deep reinforcement learning. IEEE Transactions on Network and Service Management.","DOI":"10.1109\/TNSM.2021.3120804"},{"key":"3113_CR25","doi-asserted-by":"crossref","unstructured":"Khan, L. U., Han, Z., Niyato, D., & Hong, C. S. (2021). Socially-aware-clustering-enabled federated learning for edge networks. IEEE Transactions on Network and Service Management.","DOI":"10.1109\/TNSM.2021.3090446"},{"issue":"2","key":"3113_CR26","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/TNSM.2016.2559448","volume":"13","author":"L Zhang","year":"2016","unstructured":"Zhang, L., Cai, Z., & Wang, X. (2016). Fakemask: A novel privacy preserving approach for smartphones. IEEE Transactions on Network and Service Management, 13(2), 335\u2013348.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"1","key":"3113_CR27","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TNSM.2021.3050955","volume":"18","author":"T Subramanya","year":"2021","unstructured":"Subramanya, T., & Riggio, R. (2021). Centralized and federated learning for predictive vnf autoscaling in multi-domain 5g networks and beyond. IEEE Transactions on Network and Service Management, 18(1), 63\u201378.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"2","key":"3113_CR28","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/TNSM.2019.2952462","volume":"17","author":"W Ding","year":"2019","unstructured":"Ding, W., Hu, R., Yan, Z., Qian, X., Deng, R. H., Yang, L. T., & Dong, M. (2019). An extended framework of privacy-preserving computation with flexible access control. IEEE Transactions on Network and Service Management, 17(2), 918\u2013930.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"4","key":"3113_CR29","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1109\/TNSM.2012.072012.110185","volume":"9","author":"T Groleat","year":"2012","unstructured":"Groleat, T., & Pouyllau, H. (2012). Distributed learning algorithms for inter-nsp sla negotiation management. IEEE Transactions on Network and Service Management, 9(4), 433\u2013445.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"3113_CR30","doi-asserted-by":"publisher","unstructured":"Zheng, Y., Lai, S., Liu, Y., Yuan, X., Yi, X., & Wang, C. (2022). Aggregation service for federated learning: An efficient, secure, and more resilient realization. IEEE Transactions on Dependable and Secure Computing. https:\/\/doi.org\/10.1109\/TDSC.2022.3146448.","DOI":"10.1109\/TDSC.2022.3146448"},{"key":"3113_CR31","doi-asserted-by":"crossref","unstructured":"Zhu, L., Liu, X., Li, Y., Yang, X., Xia, S., & Lu, R. (2022)\u201cA fine-grained differentially private federated learning against leakage from gradients,\u201d IEEE Internet of Things Journal, vol.\u00a09, no.\u00a013, pp. 11\u00a0500\u201311\u00a0512.","DOI":"10.1109\/JIOT.2021.3131258"},{"issue":"3","key":"3113_CR32","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1109\/TDSC.2019.2907081","volume":"18","author":"Y Zheng","year":"2021","unstructured":"Zheng, Y., Duan, H., Tang, X., Wang, C., & Zhou, J. (2021). Denoising in the dark: Privacy-preserving deep neural network-based image denoising. IEEE Transactions on Dependable and Secure Computing, 18(3), 1261\u20131275.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"3113_CR33","doi-asserted-by":"crossref","unstructured":"Liu, X., Zheng, Y., Yuan, X., & Yi, X. (2021). Medisc: Towards secure and lightweight deep learning as a medical diagnostic service. In Proceedings of ESORICS.","DOI":"10.1007\/978-3-030-88418-5_25"},{"issue":"1","key":"3113_CR34","first-page":"61","volume":"11","author":"MA Rahman","year":"2018","unstructured":"Rahman, M. A., Rahman, T., Lagani\u00e8re, R., & Mohammed, N. (2018). Membership inference attack against differentially private deep learning model. Transactions on Data Privacy, 11(1), 61\u201379.","journal-title":"Transactions on Data Privacy"},{"key":"3113_CR35","doi-asserted-by":"crossref","unstructured":"Abadi, M., Chu, A., Goodfellow, I. J., McMahan, H. B., Mironov, I., Talwar, K., & Zhang, L. (2016). Deep learning with differential privacy. In Proceedings of ACM CCS.","DOI":"10.1145\/2976749.2978318"},{"key":"3113_CR36","unstructured":"Bernau, D., Grassal, P., Robl, J., & Kerschbaum, F. (2019). Assessing differentially private deep learning with membership inference. CoRR, Vol. abs\/1912.11328."}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03113-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-022-03113-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-022-03113-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T16:14:49Z","timestamp":1722615289000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-022-03113-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,5]]},"references-count":36,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["3113"],"URL":"https:\/\/doi.org\/10.1007\/s11276-022-03113-7","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,5]]},"assertion":[{"value":"18 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}}]}}