{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T15:54:14Z","timestamp":1778860454381,"version":"3.51.4"},"reference-count":124,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T00:00:00Z","timestamp":1736380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Shenzhen Science and Technology Program","award":["KJZD20230923113901004"],"award-info":[{"award-number":["KJZD20230923113901004"]}]},{"DOI":"10.13039\/501100012245","name":"Science and Technology Planning Project of Guangdong Province","doi-asserted-by":"crossref","award":["2023A0505020006"],"award-info":[{"award-number":["2023A0505020006"]}],"id":[{"id":"10.13039\/501100012245","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Science and Technology Development Fund, Macau SAR","award":["0008\/2022\/AGJ"],"award-info":[{"award-number":["0008\/2022\/AGJ"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U2001209 and 62072486"],"award-info":[{"award-number":["U2001209 and 62072486"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2025,5,31]]},"abstract":"<jats:p>Caching content at the edge network is a popular and effective technique widely deployed to alleviate the burden of network backhaul, shorten service delay, and improve service quality. However, there has been some controversy over privacy violations in caching content at the edge network. On the one hand, the multi-access open edge network provides an ideal entrance or interface for external attackers to obtain private data from edge caches by extracting sensitive information. On the other hand, privacy can be infringed on by curious edge caching providers through caching trace analysis targeting the achievement of better caching performance or higher profits. Therefore, an in-depth understanding of privacy issues in edge caching networks is vital and indispensable for creating a privacy-preserving caching service at the edge network. In this article, we are among the first to fill this gap by examining privacy-preserving techniques for caching content at the edge network. First, we provide an introduction to the background of privacy-preserving edge caching. Next, we summarize the key privacy issues and present a taxonomy for caching at the edge network from the perspective of private information. Additionally, we conduct a retrospective review of the state-of-the-art countermeasures against privacy leakage from content caching at the edge network. Finally, we conclude the survey and envision challenges for future research.<\/jats:p>","DOI":"10.1145\/3706630","type":"journal-article","created":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T10:37:41Z","timestamp":1733827061000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["A Survey on Privacy-Preserving Caching at Network Edge: Classification, Solutions, and Challenges"],"prefix":"10.1145","volume":"57","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2332-7941","authenticated-orcid":false,"given":"Xianzhi","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China and School of Computing, Macquarie University, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1533-0865","authenticated-orcid":false,"given":"Yipeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computing, Macquarie University, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9433-7725","authenticated-orcid":false,"given":"Di","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3326-4147","authenticated-orcid":false,"given":"Quan Z.","family":"Sheng","sequence":"additional","affiliation":[{"name":"School of Computing, Macquarie University, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9016-0478","authenticated-orcid":false,"given":"Shazia","family":"Riaz","sequence":"additional","affiliation":[{"name":"School of Computing, Macquarie University, Sydney, Australia and Department of Computer Science, Government College Women University Faisalabad. Pakistan, Faisalabad, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1518-002X","authenticated-orcid":false,"given":"Miao","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6428-4888","authenticated-orcid":false,"given":"Linchang","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-Sen University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,1,9]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2679711"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000015"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2019.8807997"},{"key":"e_1_3_2_6_2","first-page":"1","volume-title":"Proceedings of the IEEE Global Communications Conference (GLOBECOM\u201918)","author":"Andreoletti Davide","year":"2018","unstructured":"Davide Andreoletti, Silvia Giordano, Giacomo Verticale, and Massimo Tornatore. 2018. Discovering the geographic distribution of live videos\u2019 users: A privacy-preserving approach. In Proceedings of the IEEE Global Communications Conference (GLOBECOM\u201918). IEEE, 1\u20136."},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761596"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2018.2793892"},{"key":"e_1_3_2_9_2","first-page":"38","article-title":"Decentralised learning in federated deployment environments: A system-level survey","volume":"54","author":"Bellavista Paolo","year":"2021","unstructured":"Paolo Bellavista, Luca Foschini, and Alessio Mora. 2021. Decentralised learning in federated deployment environments: A system-level survey. ACM Computing Surveys 54, 1 (Februar 2021), Article 15, 38 pages.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_2_10_2","first-page":"1273","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics","author":"McMahan H. Brendan","year":"2017","unstructured":"H. Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. 1273\u20131282."},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2993886"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD54268.2022.9776185"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS54832.2022.9812874"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685849"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986617"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2021.3125803"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3014370"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2833110"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20164651"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2973705"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1941487.1941515"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.08.014"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013376"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3558779"},{"key":"e_1_3_2_25_2","volume-title":"Web Cache Deception Attack","author":"Gil Omer","year":"2017","unstructured":"Omer Gil. 2017. Web Cache Deception Attack. Technical Report. Black Hat USA."},{"issue":"5","key":"e_1_3_2_26_2","first-page":"122","article-title":"Pre-cache based privacy protection mechanism in continuous LBS queries","volume":"46","author":"Hu Yi-Ming Gu, Guang-Wei Bai, Hang Shen, and Yu-Jia","year":"2019","unstructured":"Yi-Ming Gu, Guang-Wei Bai, Hang Shen, and Yu-Jia Hu. 2019. Pre-cache based privacy protection mechanism in continuous LBS queries. Computer Science 46, 5 (May2019), 122\u2013128.","journal-title":"Computer Science"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.05.128"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.3021919"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.109654"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11518-007-5058-2"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/Mwc.2017.1800127"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3131175"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148755"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2597851"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2888854"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3132048"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2906229"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996866"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-020-09531-1"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3224395"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120616"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488920"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885819"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7565183"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3003700"},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3142348"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942179"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2680958"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2745201"},{"key":"e_1_3_2_50_2","first-page":"665","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920)","author":"Mirheidari Seyed Ali","year":"2020","unstructured":"Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, and William Robertson. 2020. Cached and confused: Web cache deception in the wild. In Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920). 665\u2013682."},{"key":"e_1_3_2_51_2","first-page":"179","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security\u201922)","author":"Mirheidari Seyed Ali","year":"2022","unstructured":"Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, and Bruno Crispo. 2022. Web cache deception escalates! In Proceedings of the 31st USENIX Security Symposium (USENIX Security\u201922). 179\u2013196."},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2636139"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103720"},{"key":"e_1_3_2_54_2","doi-asserted-by":"crossref","unstructured":"Duong Thuy Anh Nguyen Jiaming Cheng Duong Tung Nguyen and Angelia Nedich. 2023. CrowdCache: A decentralized game-theoretic framework for mobile edge content sharing. arxiv:cs.GT\/2304.13246 (2023). https:\/\/arxiv.org\/abs\/2304.13246","DOI":"10.23919\/WiOpt58741.2023.10349816"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000329"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2425398"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109107"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3654663"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796748"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23597-0_20"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120586"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900161"},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3201983"},{"key":"e_1_3_2_64_2","first-page":"36","article-title":"A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet","volume":"52","author":"Ren Ju","year":"2019","unstructured":"Ju Ren, Deyu Zhang, Shiwen He, Yaoxue Zhang, and Tao Li. 2019. A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet. ACM Computing Surveys 52, 6 (October 2019), Article 125, 36 pages.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9839229"},{"key":"e_1_3_2_66_2","first-page":"39","article-title":"A survey on privacy preservation in fog-enabled Internet of Things","volume":"55","author":"Sarwar Kinza","year":"2021","unstructured":"Kinza Sarwar, Sira Yongchareon, Jian Yu, and Saeed Ur Rehman. 2021. A survey on privacy preservation in fog-enabled Internet of Things. ACM Computing Surveys 55, 1 (November 2021), Article 2, 39 pages.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3142295"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4607464"},{"key":"e_1_3_2_69_2","doi-asserted-by":"crossref","unstructured":"M. Zubair Shafiq Alex X. Liu and Amir R. Khakpour. 2014. Revisiting caching in content delivery networks. ACM SIGMETRICS Performance Evaluation Review 42 1 (2014) 567\u2013568.","DOI":"10.1145\/2637364.2592021"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2104162"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3097536"},{"key":"e_1_3_2_73_2","unstructured":"Splunk Inc.2023. Internet Trends in 2024: Mary Meeker Stats & Predictions. Retrieved July 21 2024 from https:\/\/www.splunk.com\/en_us\/blog\/learn\/internet-trends.html"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.1998.712192"},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511934"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3174867"},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2749508"},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885904"},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1002\/int.23036"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3179413"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3176360"},{"key":"e_1_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2892561"},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241247"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800286"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2986803"},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2577321"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2022.3221271"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700291"},{"key":"e_1_3_2_89_2","article-title":"History-aware privacy budget allocation for model training on evolving data-sharing platforms","author":"Xiao Linchang","year":"2024","unstructured":"Linchang Xiao, Xianzhi Zhang, Di Wu, Miao Hu, Yipeng Zhou, and Shui Yu. 2024. History-aware privacy budget allocation for model training on evolving data-sharing platforms. IEEE Transactions on Services Computing. Preprint.","journal-title":"IEEE Transactions on Services Computing."},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900463"},{"key":"e_1_3_2_91_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3140174"},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3353265"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10436771"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2980823"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2876417"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2914189"},{"key":"e_1_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486407"},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3053372"},{"key":"e_1_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2870521"},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2016.0067"},{"key":"e_1_3_2_101_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647616"},{"key":"e_1_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3081480"},{"key":"e_1_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS51040.2020.00083"},{"key":"e_1_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3017474"},{"key":"e_1_3_2_105_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2577301"},{"key":"e_1_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00106"},{"key":"e_1_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD53861.2021.00032"},{"key":"e_1_3_2_108_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796969"},{"key":"e_1_3_2_109_2","first-page":"36","article-title":"Edge learning: The enabling technology for distributed big data analytics in the edge","volume":"54","author":"Zhang Jie","year":"2021","unstructured":"Jie Zhang, Zhihao Qu, Chenxi Chen, and Wang Haozhao. 2021. Edge learning: The enabling technology for distributed big data analytics in the edge. ACM Computing Surveys 54, 7 (July 2021), Article 151, 36 pages.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3235707"},{"key":"e_1_3_2_111_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.10.053"},{"key":"e_1_3_2_112_2","first-page":"1","volume-title":"Proceedings of the IEEE Global Communications Conference (GLOBECOM\u201918)","author":"Zhang Xinyue","year":"2018","unstructured":"Xinyue Zhang, Jingyi Wang, Hongning Li, Yuanxiong Guo, Qingpi Pei, and Pan Li. 2018. Data-driven caching with users\u2019 local differential privacy in information-centric networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM\u201918). IEEE, 1\u20136."},{"key":"e_1_3_2_113_2","unstructured":"Xianzhi Zhang Linchang Xiao Yipeng Zhou Miao Hu Di Wu John C. S. Lui and Quan Z. Sheng. 2023. cRVR: A Stackelberg game approach for joint privacy-aware video requesting and edge caching. arxiv:cs.NI\/2310.12622 (2023). https:\/\/arxiv.org\/abs\/2310.12622"},{"key":"e_1_3_2_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3174389"},{"issue":"10","key":"e_1_3_2_115_2","first-page":"2597","article-title":"Optimizing video caching at the edge: A hybrid multi-point process approach","volume":"33","author":"Zhang Xianzhi","year":"2022","unstructured":"Xianzhi Zhang, Yipeng Zhou, Di Wu, Miao Hu, James Xi Zheng, Min Chen, and Song Guo. 2022. Optimizing video caching at the edge: A hybrid multi-point process approach. IEEE Transactions on Parallel and Distributed Systems 33, 10 (October2022), 2597\u20132611.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_3_2_116_2","unstructured":"Xianzhi Zhang Yipeng Zhou Di Wu Quan Z. Sheng Miao Hu and Linchang Xiao. 2024. PPVF: An efficient privacy-preserving online video fetching framework with correlated differential privacy. arxiv:cs.MM\/2408.14735 (2024) https:\/\/arxiv.org\/abs\/2408.14735"},{"key":"e_1_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3195926"},{"key":"e_1_3_2_118_2","unstructured":"Bo Zhao Konda Reddy Mopuri and Hakan Bilen. 2020. iDLG: Improved deep leakage from gradients. arxiv:cs.LG\/2001.02610 (2020) https:\/\/arxiv.org\/abs\/2001.02610"},{"key":"e_1_3_2_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3189186"},{"key":"e_1_3_2_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3348165"},{"key":"e_1_3_2_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3189055"},{"key":"e_1_3_2_122_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6696149"},{"key":"e_1_3_2_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2885509"},{"key":"e_1_3_2_124_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3234599"},{"key":"e_1_3_2_125_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2000331"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706630","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706630","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:46Z","timestamp":1750295926000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706630"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,9]]},"references-count":124,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,5,31]]}},"alternative-id":["10.1145\/3706630"],"URL":"https:\/\/doi.org\/10.1145\/3706630","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,9]]},"assertion":[{"value":"2023-08-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}