{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T05:26:49Z","timestamp":1766035609987,"version":"3.48.0"},"reference-count":35,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T00:00:00Z","timestamp":1765843200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61972096"],"award-info":[{"award-number":["61972096"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61771140"],"award-info":[{"award-number":["61771140"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61872088"],"award-info":[{"award-number":["61872088"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61872090"],"award-info":[{"award-number":["61872090"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"University-Industry Cooperation Project of Fujian Provincial Department of Science and Technology","award":["2022H60250"],"award-info":[{"award-number":["2022H60250"]}]},{"name":"Educational Science Research Fund of Fujian Province","award":["FJJKBK24-008"],"award-info":[{"award-number":["FJJKBK24-008"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>Historical inference attacks pose a critical privacy threat in mobile edge computing (MEC), where adversaries exploit long-term task and location patterns to infer users\u2019 sensitive information. To address this challenge, we propose a privacy-preserving task scheduling framework that adaptively balances privacy protection and system performance under dynamic vehicular environments. First, we introduce a dynamic privacy-aware adaptation mechanism that adjusts privacy levels in real time according to vehicle mobility and network dynamics. Second, we design a dual-algorithm framework composed of two complementary solutions: a Markov Approximation-Based Online Algorithm (MAOA) that achieves near-optimal scheduling with provable convergence, and a Privacy-Aware Deep Q-Network (PAT-DQN) algorithm that leverages deep reinforcement learning to enhance adaptability and long-term decision-making. Extensive simulations demonstrate that our proposed methods effectively mitigate privacy leakage while maintaining high task completion rates and low energy consumption. In particular, PAT-DQN achieves up to 14.2% lower privacy loss and 19% fewer handovers than MAOA in high-mobility scenarios, showing superior adaptability and convergence performance.<\/jats:p>","DOI":"10.3390\/computers14120558","type":"journal-article","created":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:47:26Z","timestamp":1765889246000},"page":"558","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dual-Algorithm Framework for Privacy-Preserving Task Scheduling Under Historical Inference Attacks"],"prefix":"10.3390","volume":"14","author":[{"given":"Exiang","family":"Chen","sequence":"first","affiliation":[{"name":"School of Technology, Fuzhou Technology and Business University, Fuzhou 350715, China"}]},{"given":"Ayong","family":"Ye","sequence":"additional","affiliation":[{"name":"The College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350007, China"}]},{"given":"Huina","family":"Deng","sequence":"additional","affiliation":[{"name":"The College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350007, China"}]}],"member":"1968","published-online":{"date-parts":[[2025,12,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"6206","DOI":"10.1109\/TITS.2021.3084396","article-title":"A Taxonomy and Survey of Edge Cloud Computing for Intelligent Transportation Systems and Connected Vehicles","volume":"23","author":"Arthurs","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_2","first-page":"2169","article-title":"Mobility-Aware Multi-Hop Task Offloading for Autonomous Driving in Vehicular Edge Computing and Networks","volume":"24","author":"Liu","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"10665","DOI":"10.1109\/TMC.2024.3383041","article-title":"Computation offloading in resource-constrained multi-access edge computing","volume":"23","author":"Li","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"13182","DOI":"10.1109\/TVT.2022.3196544","article-title":"Dependency-Aware Task Offloading and Service Caching in Vehicular Edge Computing","volume":"71","author":"Shen","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_5","first-page":"1","article-title":"Mobile edge computing\u2014A key technology towards 5G","volume":"11","author":"Hu","year":"2015","journal-title":"ETSI White Pap."},{"key":"ref_6","first-page":"907","article-title":"Edge Computing-An Emerging Computing Model for the Internet of Everything Era","volume":"54","author":"Shi","year":"2017","journal-title":"Jisuanji Yanjiu Yu Fazhan\/Comput. Res. Dev."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"19070","DOI":"10.1109\/JIOT.2024.3359297","article-title":"Edge computing for industry 5.0: Fundamental, applications, and research challenges","volume":"11","author":"Sharma","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3860","DOI":"10.1109\/TVT.2016.2532863","article-title":"Vehicular Fog Computing: A Viewpoint of Vehicles as the Infrastructures","volume":"65","author":"Hou","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"5505","DOI":"10.1109\/TII.2019.2948406","article-title":"Joint Computation and Communication Design for UAV-Assisted Mobile Edge Computing in IoT","volume":"16","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"16001","DOI":"10.1109\/TVT.2020.3040645","article-title":"Energy-Minimization Task Offloading and Resource Allocation for Mobile Edge Computing in NOMA Heterogeneous Networks","volume":"69","author":"Xu","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1000","DOI":"10.1109\/TNSM.2020.2985080","article-title":"Risk-Aware Edge Computation Offloading Using Bayesian Stackelberg Game","volume":"17","author":"Bai","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.future.2022.03.019","article-title":"Task offloading in vehicular fog computing: State-of-the-art and open issues","volume":"133","author":"Hamdi","year":"2022","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"103395","DOI":"10.1016\/j.jnca.2022.103395","article-title":"A survey of privacy-preserving offloading methods in mobile-edge computing","volume":"203","author":"Li","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"4150","DOI":"10.1109\/JIOT.2018.2875520","article-title":"Folo: Latency and Quality Optimized Task Allocation in Vehicular Fog Computing","volume":"6","author":"Zhu","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"9038","DOI":"10.1109\/TVT.2019.2924911","article-title":"Chameleon: Latency and Resolution Aware Task Offloading for Visual-Based Assisted Driving","volume":"68","author":"Zhu","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Liao, H., Zhou, Z., Zhao, Z., Ai, B., and Mumtaz, S. (2019, January 24\u201328). Task Offloading for Vehicular Fog Computing under Information Uncertainty: A Matching-Learning Approach. Proceedings of the 2019 15th International Wireless Communications Mobile Computing Conference (IWCMC), Tangier, Morocco.","DOI":"10.1109\/IWCMC.2019.8766579"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"8322","DOI":"10.1109\/TVT.2019.2926732","article-title":"Reliable Task Offloading for Vehicular Fog Computing Under Information Asymmetry and Information Uncertainty","volume":"68","author":"Zhou","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"3319","DOI":"10.1109\/ACCESS.2019.2963051","article-title":"Contract-Based Computing Resource Management via Deep Reinforcement Learning in Vehicular Fog Computing","volume":"8","author":"Zhao","year":"2020","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3113","DOI":"10.1109\/TVT.2019.2894851","article-title":"Computation Resource Allocation and Task Assignment Optimization in Vehicular Fog Computing: A Contract-Matching Approach","volume":"68","author":"Zhou","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"8380","DOI":"10.1109\/TITS.2021.3078913","article-title":"A Novel Contract Theory-Based Incentive Mechanism for Cooperative Task-Offloading in Electrical Vehicular Networks","volume":"23","author":"Kazmi","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"He, X., Liu, J., Jin, R., and Dai, H. (2017, January 4\u20138). Privacy-Aware Offloading in Mobile-Edge Computing. Proceedings of the GLOBECOM 2017\u20142017 IEEE Global Communications Conference, Singapore.","DOI":"10.1109\/GLOCOM.2017.8253985"},{"key":"ref_22","first-page":"244","article-title":"Privacy-Aware Online Task Offloading for Mobile-Edge Computing","volume":"12384","author":"Li","year":"2020","journal-title":"Wirel. Algorithms Syst. Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"4547","DOI":"10.1109\/JIOT.2018.2878718","article-title":"Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT","volume":"6","author":"He","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"8423","DOI":"10.1109\/TITS.2021.3081560","article-title":"Privacy-preserved federated learning for autonomous driving","volume":"23","author":"Li","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"115","DOI":"10.23919\/JCC.2021.04.009","article-title":"Secure and efficient computing resource management in blockchain-based vehicular fog computing","volume":"18","author":"Kong","year":"2021","journal-title":"China Commun."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"31561","DOI":"10.1109\/JIOT.2024.3418488","article-title":"Asynchronous Federated Deep-Reinforcement-Learning-Based Dependency Task Offloading for UAV-Assisted Vehicular Networks","volume":"11","author":"Shen","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.dcan.2022.05.020","article-title":"A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles","volume":"10","author":"Wang","year":"2024","journal-title":"Digit. Commun. Netw."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Zhang, T., Yang, B., Yu, Z., Cao, X., Alexandropoulos, G.C., Zhang, Y., and Yuen, C. (2024). Computation Pre-Offloading for MEC-Enabled Vehicular Networks via Trajectory Prediction. arXiv.","DOI":"10.1109\/SWC62898.2024.00158"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"4307","DOI":"10.1109\/JIOT.2018.2875926","article-title":"Learning-Based Privacy-Aware Offloading for Healthcare IoT With Energy Harvesting","volume":"6","author":"Min","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"7599","DOI":"10.1109\/TITS.2022.3169421","article-title":"PPO2: Location Privacy-Oriented Task Offloading to Edge Computing Using Reinforcement Learning for Intelligent Autonomous Transport Systems","volume":"24","author":"Gao","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_31","unstructured":"Ahmadvand, H., and Foroutan, F. (2025). Latency and Privacy-Aware Resource Allocation in Vehicular Edge Computing. arXiv."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Bashir, S.R., Raza, S., and Misic, V. (2024). A Narrative Review of Identity, Data, and Location Privacy Techniques in Edge Computing and Mobile Crowdsourcing. Electronics, 13.","DOI":"10.3390\/electronics13214228"},{"key":"ref_33","first-page":"3571","article-title":"Offloading in Mobile Edge Computing: Task Allocation and Computational Frequency Scaling","volume":"65","author":"Dinh","year":"2017","journal-title":"IEEE Trans. Commun."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Liu, J., Mao, Y., Zhang, J., and Letaief, K.B. (2016, January 10\u201315). Delay-optimal computation task scheduling for mobile-edge computing systems. Proceedings of the 2016 IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain.","DOI":"10.1109\/ISIT.2016.7541539"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"6301","DOI":"10.1109\/TIT.2013.2268923","article-title":"Markov Approximation for Combinatorial Network Optimization","volume":"59","author":"Chen","year":"2013","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/12\/558\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T05:24:58Z","timestamp":1766035498000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/12\/558"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,16]]},"references-count":35,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["computers14120558"],"URL":"https:\/\/doi.org\/10.3390\/computers14120558","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2025,12,16]]}}}