{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T10:00:11Z","timestamp":1774173611701,"version":"3.50.1"},"reference-count":56,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100017691","name":"Guangxi Key Research and Development Program","doi-asserted-by":"publisher","award":["AB25069178"],"award-info":[{"award-number":["AB25069178"]}],"id":[{"id":"10.13039\/501100017691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62162018"],"award-info":[{"award-number":["62162018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61861013"],"award-info":[{"award-number":["61861013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.comnet.2026.112184","type":"journal-article","created":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T02:50:41Z","timestamp":1772851841000},"page":"112184","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Privacy-preserving multi-agent bitrate allocation for 360\u00b0 video streaming"],"prefix":"10.1016","volume":"280","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1379-440X","authenticated-orcid":false,"given":"Shijia","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5383-5736","authenticated-orcid":false,"given":"Yong","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0486-7328","authenticated-orcid":false,"given":"Yangfan","family":"Liang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7995-0847","authenticated-orcid":false,"given":"Yuming","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3438-0393","authenticated-orcid":false,"given":"Junqi","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3020-2896","authenticated-orcid":false,"given":"Qian","family":"He","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"12","key":"10.1016\/j.comnet.2026.112184_bib0001","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2025.3545803","article-title":"Next-gen metaverse security through intrusion detection enhanced by transformers and gans","volume":"12","author":"Djenouri","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112184_bib0002","unstructured":"T. Alsop, Extended reality (xr) market size worldwide from 2021 to 2026.Online. 2023. Available: https:\/\/www.statista.com\/statistics\/591181\/global-augmented-virtual-reality-market-size\/."},{"key":"10.1016\/j.comnet.2026.112184_bib0003","unstructured":"Cisco, Cisco visual networking index: Global mobile data traffic forecast update,Online. 2017. Available: https:\/\/s3.amazonaws.com\/media.mediapost.com\/uploads\/CiscoForecast.pdf."},{"issue":"13","key":"10.1016\/j.comnet.2026.112184_bib0004","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2025.3555978","article-title":"Dynamic service caching aided computation offloading optimization algorithm for mobile edge networks","volume":"12","author":"Xie","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112184_bib0005","series-title":"IEEE INFOCOM","first-page":"1252","article-title":"Drl360: 360-degree video streaming with deep reinforcement learning","author":"Zhang","year":"2019"},{"issue":"2","key":"10.1016\/j.comnet.2026.112184_bib0006","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1109\/TBC.2020.3028286","article-title":"Reinforcement learning based rate adaptation for 360-degree video streaming","volume":"67","author":"Jiang","year":"2020","journal-title":"IEEE Trans. Broadcast."},{"key":"10.1016\/j.comnet.2026.112184_bib0007","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.1109\/TCSVT.2021.3076585","article-title":"Rapt360: reinforcement learning-based rate adaptation for 360-degree video streaming with adaptive prediction and tiling","volume":"32","author":"Kan","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.comnet.2026.112184_bib0008","series-title":"Proceedings of the ACM Special Interest Group on Data Communication","first-page":"408","article-title":"End-to-end transport for video qoe fairness","author":"Nathan","year":"2019"},{"issue":"3","key":"10.1016\/j.comnet.2026.112184_bib0009","doi-asserted-by":"crossref","first-page":"17","DOI":"10.29012\/jpc.v7i3.405","article-title":"Calibrating noise to sensitivity in private data analysis","volume":"7","author":"Dwork","year":"2016","journal-title":"J. Privacy Confidentiality"},{"key":"10.1016\/j.comnet.2026.112184_bib0010","series-title":"International Conference on Machine Learning","first-page":"9754","article-title":"Private reinforcement learning with pac and regret guarantees","author":"Vietri","year":"2020"},{"key":"10.1016\/j.comnet.2026.112184_bib0011","first-page":"10","article-title":"Local differential privacy for regret minimization in reinforcement learning","volume":"34","author":"Garcelon","year":"2021","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"15","key":"10.1016\/j.comnet.2026.112184_bib0012","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/JIOT.2024.3398548","article-title":"Madrl-based rate adaptation for 360\u2218 video streaming with multiviewpoint prediction","volume":"11","author":"Wang","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"10.1016\/j.comnet.2026.112184_bib0013","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3640312","article-title":"Security and privacy issues in deep reinforcement learning: threats and countermeasures","volume":"56","author":"Mo","year":"2024","journal-title":"ACM Comput. Surv."},{"issue":"6","key":"10.1016\/j.comnet.2026.112184_bib0014","doi-asserted-by":"crossref","first-page":"4009","DOI":"10.1109\/TWC.2021.3126147","article-title":"Cooperative multigroup broadcast 360\u2218 video delivery network: a hierarchical federated deep reinforcement learning approach","volume":"21","author":"Hu","year":"2022","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.comnet.2026.112184_bib0015","series-title":"Fedabr: A personalized federated reinforcement learning approach for adaptive video streaming","author":"Xu","year":"2023"},{"issue":"12","key":"10.1016\/j.comnet.2026.112184_bib0016","doi-asserted-by":"crossref","DOI":"10.1109\/TMC.2024.3452510","article-title":"Privacy-preserving gaze-assisted immersive video streaming","volume":"23","author":"Jin","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"5","key":"10.1016\/j.comnet.2026.112184_bib0017","doi-asserted-by":"crossref","first-page":"2555","DOI":"10.1109\/TVCG.2021.3067787","article-title":"A privacy-preserving approach to streaming eye-tracking data","volume":"27","author":"David-John","year":"2021","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"10.1016\/j.comnet.2026.112184_bib0018","unstructured":"A. Mukherjee, P. Kumar, B. Yang, N. Chandran, D. Gupta, Privacy preserving multi-agent reinforcement learning in supply chains, arXiv preprint arXiv: 2312.05686. 2023."},{"issue":"2","key":"10.1016\/j.comnet.2026.112184_bib0019","doi-asserted-by":"crossref","first-page":"1618","DOI":"10.1109\/TII.2023.3280314","article-title":"Secure video offloading in mec-enabled iiot networks: a multicell federated deep reinforcement learning approach","volume":"20","author":"Zhao","year":"2024","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.comnet.2026.112184_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.csi.2023.103827","article-title":"Local differential privacy and its applications: a comprehensive survey","volume":"89","author":"Yang","year":"2024","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.comnet.2026.112184_bib0021","series-title":"Proceedings of the 24th Annual International Conference on Mobile Computing and Networking","first-page":"99","article-title":"Flare: practical viewport-adaptive 360-degree video streaming for mobile devices","author":"Qian","year":"2018"},{"key":"10.1016\/j.comnet.2026.112184_bib0022","series-title":"Proceedings of the 28th ACM International Conference on Multimedia","first-page":"3724","article-title":"Tile rate allocation for 360-degree tiled adaptive video streaming","author":"Yadav","year":"2020"},{"key":"10.1016\/j.comnet.2026.112184_bib0023","series-title":"2018 25th IEEE International Conference on Image Processing(ICIP)","first-page":"3264","article-title":"Server-side rate adaptation for multi-user 360-degree video streaming","author":"Liu","year":"2018"},{"issue":"1","key":"10.1016\/j.comnet.2026.112184_bib0024","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1109\/JSTSP.2019.2956716","article-title":"Probabilistic tile visibility-based server-side rate adaptation for adaptive 360-degree video streaming","volume":"14","author":"Zou","year":"2020","journal-title":"IEEE J. Sel. Top. Signal Process."},{"key":"10.1016\/j.comnet.2026.112184_bib0025","first-page":"1","article-title":"Multi-agent deep reinforcement learning based live 360-degree video streaming on edge","volume":"360","author":"Ban","year":"2020","journal-title":"2020 IEEE Int. Conf. Multimedia Expo (ICME)"},{"key":"10.1016\/j.comnet.2026.112184_bib0026","doi-asserted-by":"crossref","first-page":"1169","DOI":"10.1109\/TMM.2023.3277286","article-title":"Achieving qoe fairness in bitrate allocation of 360\u2218 video streaming","volume":"26","author":"Li","year":"2024","journal-title":"IEEE Trans. Multimedia"},{"issue":"1","key":"10.1016\/j.comnet.2026.112184_bib0027","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3508028","article-title":"Differentially private reinforcement learning with linear function approximation","volume":"6","author":"Zhou","year":"2022","journal-title":"Proc. ACM Meas. Anal. Comput. Syst."},{"key":"10.1016\/j.comnet.2026.112184_bib0028","series-title":"Local differential privacy preserving mechanisms for multi-agent reinforcement learning","author":"Prashant","year":"2024"},{"issue":"2","key":"10.1016\/j.comnet.2026.112184_bib0029","first-page":"1212","article-title":"Differentially private multi-agent planning for logistic-like problems","volume":"19","author":"Ye","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.comnet.2026.112184_bib0030","series-title":"Australasian Joint Conference on Artificial Intelligence","first-page":"15","article-title":"Privacy-preserving in double deep-q-network with differential privacy in continuous spaces","author":"Abahussein","year":"2022"},{"key":"10.1016\/j.comnet.2026.112184_bib0031","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1007\/s12083-021-01256-6","article-title":"A privacy-preserving multi-agent updating framework for self-adaptive tree model","volume":"15","author":"Li","year":"2022","journal-title":"Peer to Peer Netw. Appl."},{"issue":"11","key":"10.1016\/j.comnet.2026.112184_bib0032","doi-asserted-by":"crossref","first-page":"13108","DOI":"10.1109\/TITS.2022.3202196","article-title":"Privacy-aware multiagent deep reinforcement learning for task offloading in vanet","volume":"24","author":"Wei","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.comnet.2026.112184_bib0033","series-title":"2023 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS)","first-page":"9269","article-title":"Brnes: enabling security and privacy-aware experience sharing in multiagent robotic and autonomous systems","author":"Hossain","year":"2023"},{"key":"10.1016\/j.comnet.2026.112184_bib0034","series-title":"Artificial Intelligence and Statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"Mcmahan","year":"2017"},{"key":"10.1016\/j.comnet.2026.112184_bib0035","unstructured":"Z. Peng. \u201cVatp360: Viewport adaptive 360-degree video streaming based on tile priority\u201d, arXiv preprint arXiv: 2307.15984, 2023. 2023."},{"key":"10.1016\/j.comnet.2026.112184_bib0036","unstructured":"J. Ackermann, V. Gabler, T. Osa, M. Sugiyama, Reducing overestimation bias in multi-agent domains using double centralized critics, arXiv preprint arXiv: 1910.01465, 2019."},{"key":"10.1016\/j.comnet.2026.112184_bib0037","series-title":"Asian Conference on Machine Learning","first-page":"627","article-title":"Locally differentially private reinforcement learning for linear mixture markov decision processes","author":"Liao","year":"2023"},{"issue":"3\u20134","key":"10.1016\/j.comnet.2026.112184_bib0038","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Found. Trends\u00ae in Theor. Comput. Sci."},{"key":"10.1016\/j.comnet.2026.112184_bib0039","series-title":"Proceedings of the 8th ACM on Multimedia Systems Conference","first-page":"193","article-title":"A dataset for exploring user behaviors in vr spherical video streaming","author":"Wu","year":"2017"},{"key":"10.1016\/j.comnet.2026.112184_bib0040","series-title":"Proceedings of the 24th ACM International Conference on Multimedia","first-page":"1179","article-title":"Open-source hevc\/h. 265 encoder","author":"Viitanen","year":"2016"},{"issue":"1","key":"10.1016\/j.comnet.2026.112184_bib0041","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3603146","article-title":"Advanced predictive tile selection using dynamic tiling for prioritized 360\u2218 video vr streaming","volume":"20","author":"Yaqoob","year":"2023","journal-title":"ACM Trans. Multimedia Comput. Commun. Appl."},{"key":"10.1016\/j.comnet.2026.112184_bib0042","series-title":"Ultramedia open source infrastructure for video streaming and next-gen multimedia transcoding, packaging and delivery","author":"Gpac","year":"2024"},{"issue":"1","key":"10.1016\/j.comnet.2026.112184_bib0043","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1109\/TNSM.2021.3053183","article-title":"Mosaic: advancing user quality of experience in 360-degree video streaming with machine learning","volume":"18","author":"Park","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"11","key":"10.1016\/j.comnet.2026.112184_bib0044","doi-asserted-by":"crossref","first-page":"2177","DOI":"10.1109\/LCOMM.2016.2601087","article-title":"Http\/2-based adaptive streaming of hevc video over 4g\/lte networks","volume":"20","author":"Hooft","year":"2016","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.comnet.2026.112184_bib0045","series-title":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","first-page":"1","article-title":"Boosting privately: federated extreme gradient boosting for mobile crowdsensing","author":"Liu","year":"2020"},{"issue":"6","key":"10.1016\/j.comnet.2026.112184_bib0046","doi-asserted-by":"crossref","first-page":"5185","DOI":"10.1109\/TSG.2021.3103917","article-title":"A scalable privacy-preserving multi-agent deep reinforcement learning approach for large-scale peer-to-peer transactive energy trading","volume":"12","author":"Ye","year":"2021","journal-title":"IEEE Trans. Smart Grid"},{"issue":"4","key":"10.1016\/j.comnet.2026.112184_bib0047","doi-asserted-by":"crossref","first-page":"2903","DOI":"10.1109\/JIOT.2021.3118003","article-title":"DeepView: deep-learning-based users field of view selection in 360\u2218 videos for industrial environments","volume":"10","author":"Irfan","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.comnet.2026.112184_bib0048","doi-asserted-by":"crossref","first-page":"10058","DOI":"10.1109\/JIOT.2024.3508804","article-title":"Preserving privacy in fine-grained data distillation with sparse answers for efficient edge computing","volume":"12","author":"Pan","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2026.112184_bib0049","doi-asserted-by":"crossref","unstructured":"M.A. Jalil, Enhancing privacy in artificial intelligence services using hybrid homomorphic encryption, Babylonian J. Artif. Intell. 2024. [Online]. 168\u2013174. Available:https:\/\/mesopotamian.press\/journals\/index.php\/BJAI\/article\/view\/686.","DOI":"10.58496\/BJAI\/2024\/018"},{"key":"10.1016\/j.comnet.2026.112184_bib0050","series-title":"Optimizing qoe-privacy tradeoff for proactive vr streaming","author":"Wei","year":"2025"},{"issue":"5","key":"10.1016\/j.comnet.2026.112184_bib0051","doi-asserted-by":"crossref","first-page":"2774","DOI":"10.1109\/TVCG.2023.3247048","article-title":"Privacy-preserving datasets of eye-tracking samples with applications in xr","volume":"29","author":"David-John","year":"2023","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"10.1016\/j.comnet.2026.112184_bib0052","doi-asserted-by":"crossref","first-page":"148","DOI":"10.58496\/BJN\/2024\/015","article-title":"Robust color image encryption using 3d chaotic maps and s-box algorithms","volume":"2024","author":"Ayad","year":"2024","journal-title":"Babylonian J. Netw."},{"key":"10.1016\/j.comnet.2026.112184_bib0053","doi-asserted-by":"crossref","first-page":"67","DOI":"10.70470\/SHIFRA\/2024\/008","article-title":"Recent advances in digital image masking techniques future challenges and trends: a review","volume":"2024","author":"Hammad","year":"2024","journal-title":"SHIFRA"},{"issue":"8","key":"10.1016\/j.comnet.2026.112184_bib0054","doi-asserted-by":"crossref","first-page":"7742","DOI":"10.1109\/TCSVT.2024.3376999","article-title":"Quality of experience oriented cross-layer optimization for real-time xr video transmission","volume":"34","author":"Pan","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"1","key":"10.1016\/j.comnet.2026.112184_bib0055","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1109\/TNSM.2024.3471632","article-title":"Qoe-fairness-aware bandwidth allocation design for mec-assisted abr video transmission","volume":"22","author":"Xiao","year":"2025","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"10","key":"10.1016\/j.comnet.2026.112184_bib0056","article-title":"Security and privacy in virtual reality: a literature survey","volume":"29","author":"Giaretta","year":"2025","journal-title":"Virtual Real."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626001969?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128626001969?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T09:43:37Z","timestamp":1774172617000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128626001969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":56,"alternative-id":["S1389128626001969"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112184","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Privacy-preserving multi-agent bitrate allocation for 360\u00b0 video streaming","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2026.112184","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112184"}}