{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:04:31Z","timestamp":1775228671626,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Australian Research Council Discovery Project","award":["DP220100215"],"award-info":[{"award-number":["DP220100215"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645329","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"2735-2746","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["GEES: Enabling Location Privacy-Preserving Energy Saving in Multi-Access Edge Computing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4485-5583","authenticated-orcid":false,"given":"Ziqi","family":"Wang","sequence":"first","affiliation":[{"name":"RMIT University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3526-3217","authenticated-orcid":false,"given":"Xiaoyu","family":"Xia","sequence":"additional","affiliation":[{"name":"RMIT University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9172-4252","authenticated-orcid":false,"given":"Minhui","family":"Xue","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5512-114X","authenticated-orcid":false,"given":"Ibrahim","family":"Khalil","sequence":"additional","affiliation":[{"name":"RMIT University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1289-0130","authenticated-orcid":false,"given":"Minghui","family":"Liwang","sequence":"additional","affiliation":[{"name":"Tongji University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7351-5724","authenticated-orcid":false,"given":"Xun","family":"Yi","sequence":"additional","affiliation":[{"name":"RMIT University, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.3390\/challe6010117"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3087360"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737574"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3184026"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378600.1378624"},{"key":"e_1_3_2_2_8_1","volume-title":"Demand response in noma-based mobile edge computing: A twophase game-theoretical approach","author":"Cui Guangming","year":"2021","unstructured":"Guangming Cui, Qiang He, Xiaoyu Xia, Feifei Chen, Tao Gu, Hai Jin, and Yun Yang. 2021. Demand response in noma-based mobile edge computing: A twophase game-theoretical approach. IEEE Transactions on Mobile Computing (2021)."},{"key":"e_1_3_2_2_9_1","volume-title":"EESaver: Saving Energy Dynamically for Green Multi-access Edge Computing","author":"Cui Guangming","year":"2023","unstructured":"Guangming Cui, Qiang He, Xiaoyu Xia, Feifei Chen, and Yun Yang. 2023. EESaver: Saving Energy Dynamically for Green Multi-access Edge Computing. IEEE Transactions on Parallel and Distributed Systems (2023)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01225-0_28"},{"key":"e_1_3_2_2_11_1","first-page":"1","article-title":"Differential privacy for Bayesian inference through posterior sampling","volume":"18","author":"Dimitrakakis Christos","year":"2017","unstructured":"Christos Dimitrakakis, Blaine Nelson, Zuhe Zhang, Aikateirni Mitrokotsa, and Benjamin IP Rubinstein. 2017. Differential privacy for Bayesian inference through posterior sampling. Journal of machine learning research 18, 11 (2017), 1--39.","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00923"},{"key":"e_1_3_2_2_13_1","volume-title":"International colloquium on automata, languages, and programming","author":"Dwork Cynthia","unstructured":"Cynthia Dwork. 2006. Differential privacy. In International colloquium on automata, languages, and programming. Springer, 1--12."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3--4 (2014) 211--407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568038"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7422408"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Nicola Jones et al. 2018. How to stop data centres from gobbling up the world's electricity. Nature 561 7722 (2018) 163--166.","DOI":"10.1038\/d41586-018-06610-y"},{"key":"e_1_3_2_2_19_1","volume-title":"International conference on machine learning. PMLR","author":"Laclau Charlotte","year":"2017","unstructured":"Charlotte Laclau, Ievgen Redko, Basarab Matei, Younes Bennani, and Vincent Brault. 2017. Co-clustering through optimal transport. In International conference on machine learning. PMLR, 1955--1964."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03596-9_15"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-018-0544-7"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155242"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3106401"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512252"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512146"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Gabriel Peyr\u00e9 Marco Cuturi et al. 2019. Computational optimal transport: With applications to data science. Foundations and Trends\u00ae in Machine Learning 11 5--6 (2019) 355--607.","DOI":"10.1561\/2200000073"},{"key":"e_1_3_2_2_27_1","volume-title":"Particle swarm optimization: An overview. Swarm intelligence 1","author":"Poli Riccardo","year":"2007","unstructured":"Riccardo Poli, James Kennedy, and Tim Blackwell. 2007. Particle swarm optimization: An overview. Swarm intelligence 1 (2007), 33--57."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2014.15"},{"key":"e_1_3_2_2_29_1","volume-title":"Matching-Based Hybrid Service Trading for Task Assignment Over Dynamic Mobile Crowdsensing Networks","author":"Qi Houyi","year":"2023","unstructured":"Houyi Qi, Minghui Liwang, Seyyedali Hosseinalipour, Xiaoyu Xia, Zhipeng Cheng, Xianbin Wang, and Zhenzhen Jiao. 2023. Matching-Based Hybrid Service Trading for Task Assignment Over Dynamic Mobile Crowdsensing Networks. IEEE Transactions on Services Computing (2023), 1--14. https:\/\/doi.org\/10.1109\/ TSC.2023.3333832"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382312"},{"key":"e_1_3_2_2_31_1","volume-title":"Privacy games: Optimal user-centric data obfuscation. arXiv preprint arXiv:1402.3426","author":"Shokri Reza","year":"2014","unstructured":"Reza Shokri. 2014. Privacy games: Optimal user-centric data obfuscation. arXiv preprint arXiv:1402.3426 (2014)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"C\u00e9dric Villani et al. 2009. Optimal transport: old and new. Vol. 338. Springer.","DOI":"10.1007\/978-3-540-71050-9"},{"key":"e_1_3_2_2_34_1","volume-title":"IEEE INFOCOM 2023-IEEE Conference on Computer Communications. IEEE, 1--10","author":"Jiao Lei","year":"2023","unstructured":"FeiWang, Lei Jiao, Konglin Zhu, Xiaojun Lin, and Lei Li. 2023. Toward Sustainable AI: Federated Learning Demand Response in Cloud-Edge Systems via Auctions. In IEEE INFOCOM 2023-IEEE Conference on Computer Communications. IEEE, 1--10."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583264"},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the 26th International Conference on World Wide Web. 627--636","author":"Yang Dingqi","year":"2017","unstructured":"LeyeWang, Dingqi Yang, Xiao Han, TianbenWang, Daqing Zhang, and Xiaojuan Ma. 2017. Location privacy-preserving task allocation for mobile crowdsensing with differential geo-obfuscation. In Proceedings of the 26th International Conference on World Wide Web. 627--636."},{"key":"e_1_3_2_2_37_1","volume-title":"Elements of statistical disclosure control","author":"Willenborg Leon","unstructured":"Leon Willenborg and Ton De Waal. 2012. Elements of statistical disclosure control. Vol. 155. Springer Science & Business Media."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3062017"},{"key":"e_1_3_2_2_39_1","volume-title":"OL-MEDC: An online approach for cost-effective data caching in mobile edge computing systems","author":"Xia Xiaoyu","year":"2021","unstructured":"Xiaoyu Xia, Feifei Chen, Qiang He, Guangming Cui, John Grundy, Mohamed Abdelrazek, Athman Bouguettaya, and Hai Jin. 2021. OL-MEDC: An online approach for cost-effective data caching in mobile edge computing systems. IEEE Transactions on Mobile Computing (2021)."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3104241"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3185250"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3530815"},{"key":"e_1_3_2_2_43_1","volume-title":"2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 751--761","author":"Xiao Huizi","year":"2021","unstructured":"Huizi Xiao, Qingyang Zhang, Qingqi Pei, and Weisong Shi. 2021. Privacypreserving neural network inference framework via homomorphic encryption and sgx. In 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 751--761."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813640"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2021.3119950"},{"key":"e_1_3_2_2_46_1","volume-title":"Homomorphic encryption","author":"Yi Xun","unstructured":"Xun Yi, Russell Paulet, and Elisa Bertino. 2014. Homomorphic encryption. Springer."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460427"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"Lei Yu Ling Liu and Calton Pu. 2017. Dynamic Differential Location Privacy with Personalized Error Bounds.. In NDSS.","DOI":"10.14722\/ndss.2017.23241"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.58"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3207905"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450051"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218654"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056976"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218656"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313428"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645329","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:30:56Z","timestamp":1755822656000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645329"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":55,"alternative-id":["10.1145\/3589334.3645329","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645329","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}