{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T08:00:30Z","timestamp":1769846430053,"version":"3.49.0"},"reference-count":41,"publisher":"MDPI AG","issue":"23","license":[{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902291"],"award-info":[{"award-number":["61902291"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["XJS201503"],"award-info":[{"award-number":["XJS201503"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"China Postdoctoral Science Foundation Funded Project","award":["2019M653567"],"award-info":[{"award-number":["2019M653567"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Remote Sensing"],"abstract":"<jats:p>Unmanned aerial vehicle (UAV) plays a more and more important role in Internet of Things (IoT) for remote sensing and device interconnecting. Due to the limitation of computing capacity and energy, the UAV cannot handle complex tasks. Recently, computation offloading provides a promising way for the UAV to handle complex tasks by deep reinforcement learning (DRL)-based methods. However, existing DRL-based computation offloading methods merely protect usage pattern privacy and location privacy. In this paper, we consider a new privacy issue in UAV-assisted IoT, namely computation offloading preference leakage, which lacks through study. To cope with this issue, we propose a novel privacy-preserving online computation offloading method for UAV-assisted IoT. Our method integrates the differential privacy mechanism into deep reinforcement learning (DRL), which can protect UAV\u2019s offloading preference. We provide the formal analysis on security and utility loss of our method. Extensive real-world experiments are conducted. Results demonstrate that, compared with baseline methods, our method can learn cost-efficient computation offloading policy without preference leakage and a priori knowledge of the wireless channel model.<\/jats:p>","DOI":"10.3390\/rs13234853","type":"journal-article","created":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T01:45:02Z","timestamp":1638323102000},"page":"4853","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["UAV-Assisted Privacy-Preserving Online Computation Offloading for Internet of Things"],"prefix":"10.3390","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1134-6165","authenticated-orcid":false,"given":"Dawei","family":"Wei","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Ning","family":"Xi","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Jianfeng","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China"}]},{"given":"Lei","family":"He","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Xidian University, Xi\u2019an 710071, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,11,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Fraga-Lamas, P., Ramos, L., Mond\u00e9jar-Guerra, V.M., and Fern\u00e1ndez-Caram\u00e9s, T.M. (2019). A Review on IoT Deep Learning UAV Systems for Autonomous Obstacle Detection and Collision Avoidance. Remote Sens., 11.","DOI":"10.3390\/rs11182144"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2462","DOI":"10.1109\/COMST.2020.3009103","article-title":"Edge Computing in Industrial Internet of Things: Architecture, Advances and Challenges","volume":"22","author":"Qiu","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1109\/MWC.001.1800594","article-title":"Mobile Edge Computing in Unmanned Aerial Vehicle Networks","volume":"27","author":"Zhou","year":"2020","journal-title":"IEEE Wirel. Commun."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2759","DOI":"10.1109\/TPDS.2019.2926979","article-title":"Multi-Hop Cooperative Computation Offloading for Industrial IoT-Edge-Cloud Computing Environments","volume":"30","author":"Hong","year":"2019","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"8433","DOI":"10.1109\/JIOT.2019.2918296","article-title":"Cooperative and Distributed Computation Offloading for Blockchain-Empowered Industrial Internet of Things","volume":"6","author":"Chen","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"4968","DOI":"10.1109\/TII.2020.3016320","article-title":"Deep Reinforcement Learning for Stochastic Computation Offloading in Digital Twin Networks","volume":"17","author":"Dai","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"4978","DOI":"10.1109\/TII.2020.3021024","article-title":"Deep Reinforcement Learning Based Computation Offloading in Fog Enabled Industrial Internet of Things","volume":"17","author":"Ren","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2318","DOI":"10.1109\/JIOT.2020.3030646","article-title":"Energy-Efficient Resource Allocation for Blockchain-Enabled Industrial Internet of Things with Deep Reinforcement Learning","volume":"8","author":"Yang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_9","unstructured":"Pan, X., Wang, W., Zhang, X., Li, B., Yi, J., and Song, D. (2019, January 13\u201317). How You Act Tells a Lot: Privacy-Leaking Attack on Deep Reinforcement Learning. Proceedings of the International Foundation for Autonomous Agents and Multiagent Systems, AAMAS 2019, Montreal, QC, Canada."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TWC.2020.3029143","article-title":"Deep Reinforcement Learning for Delay-Oriented IoT Task Scheduling in SAGIN","volume":"20","author":"Zhou","year":"2021","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"108397","DOI":"10.1016\/j.comnet.2021.108397","article-title":"Task offloading optimization of cruising UAV with fixed trajectory","volume":"199","author":"Liu","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"108439","DOI":"10.1016\/j.comnet.2021.108439","article-title":"Computation offloading over multi-UAV MEC network: A distributed deep reinforcement learning approach","volume":"199","author":"Wei","year":"2021","journal-title":"Comput. Netw."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"928","DOI":"10.1109\/TVT.2020.3048938","article-title":"Learning-Based Computation Offloading Approaches in UAVs-Assisted Edge Computing","volume":"70","author":"Zhu","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"12203","DOI":"10.1109\/JIOT.2021.3063188","article-title":"Collaborative Computation Offloading and Resource Allocation in Multi-UAV-Assisted IoT Networks: A Deep Reinforcement Learning Approach","volume":"8","author":"Seid","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"5003","DOI":"10.1109\/TVT.2021.3074304","article-title":"Sustainable Task Offloading in UAV Networks via Multi-Agent Reinforcement Learning","volume":"70","author":"Sacco","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2629","DOI":"10.1109\/LCOMM.2021.3078469","article-title":"Multi-UAV Assisted Offloading Optimization: A Game Combined Reinforcement Learning Approach","volume":"25","author":"Gao","year":"2021","journal-title":"IEEE Commun. Lett."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"He, X., Liu, J., Jin, R., and Dai, H. (2017, January 4\u20138). Privacy-Aware Offloading in Mobile-Edge Computing. Proceedings of the 2017 IEEE Global Communications Conference (GLOBECOM 2017), Singapore.","DOI":"10.1109\/GLOCOM.2017.8253985"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"He, X., Jin, R., and Dai, H. (2019, January 20\u201324). Physical-Layer Assisted Privacy-Preserving Offloading in Mobile-Edge Computing. Proceedings of the 2019 IEEE International Conference on Communications (ICC 2019), Shanghai, China.","DOI":"10.1109\/ICC.2019.8761166"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"4307","DOI":"10.1109\/JIOT.2018.2875926","article-title":"Learning-Based Privacy-Aware Offloading for Healthcare IoT with Energy Harvesting","volume":"6","author":"Min","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"4547","DOI":"10.1109\/JIOT.2018.2878718","article-title":"Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT","volume":"6","author":"He","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_21","unstructured":"Schaul, T., Quan, J., Antonoglou, I., and Silver, D. (2016, January 2\u20134). Prioritized Experience Replay. Proceedings of the 4th International Conference on Learning Representations, (ICLR 2016), San Juan, Puerto Rico."},{"key":"ref_22","first-page":"265","article-title":"Calibrating Noise to Sensitivity in Private Data Analysis. Lecture Notes in Computer Science","volume":"Volume 3876","author":"Dwork","year":"2006","journal-title":"Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"Mnih","year":"2015","journal-title":"Nature"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"4964","DOI":"10.1109\/TVT.2019.2902318","article-title":"A Game Theory Based Efficient Computation Offloading in an UAV Network","volume":"68","author":"Messous","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"4563","DOI":"10.1109\/TWC.2020.2985039","article-title":"Exploiting Computation Replication for Mobile Edge Computing: A Fundamental Computation-Communication Tradeoff Study","volume":"19","author":"Li","year":"2020","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"3170","DOI":"10.1109\/TWC.2020.2970920","article-title":"Computation Efficiency Maximization in Wireless-Powered Mobile Edge Computing Networks","volume":"19","author":"Zhou","year":"2020","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Tiwari, N., Bellur, U., Sarkar, S., and Indrawan, M. (2016, January 13\u201316). CPU Frequency Tuning to Improve Energy Efficiency of MapReduce Systems. Proceedings of the 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS), Wuhan, China.","DOI":"10.1109\/ICPADS.2016.0135"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1814","DOI":"10.1109\/TWC.2019.2958091","article-title":"Peace: Privacy-Preserving and Cost-Efficient Task Offloading for Mobile-Edge Computing","volume":"19","author":"He","year":"2020","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1930","DOI":"10.1109\/TVT.2018.2890685","article-title":"Learning-Based Computation Offloading for IoT Devices with Energy Harvesting","volume":"68","author":"Min","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2795","DOI":"10.1109\/TNET.2015.2487344","article-title":"Efficient Multi-User Computation Offloading for Mobile-Edge Cloud Computing","volume":"24","author":"Chen","year":"2016","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_32","unstructured":"Wang, B., and Hegde, N. (2019). Privacy-Preserving Q-Learning with Functional Noise in Continuous Spaces. arXiv."},{"key":"ref_33","unstructured":"Silver, D., Lever, G., Heess, N., Degris, T., Wierstra, D., and Riedmiller, M.A. (2014, January 21\u201326). Deterministic Policy Gradient Algorithms. Proceedings of the 31st International Conference on Machine Learning, Beijing, China."},{"key":"ref_34","first-page":"133","article-title":"Introduction to Gaussian processes","volume":"168","author":"MacKay","year":"1998","journal-title":"NATO ASI Ser. F Comput. Syst. Sci."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Wei, D., Xi, N., Ma, J., and Li, J. (2021, January 25\u201328). Protecting Your Offloading Preference: Privacy-aware Online Computation Offloading in Mobile Blockchain. Proceedings of the 2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS), Tokyo, Japan.","DOI":"10.1109\/IWQOS52092.2021.9521307"},{"key":"ref_36","first-page":"703","article-title":"Differential privacy for functions and functional data","volume":"14","author":"Hall","year":"2013","journal-title":"J. Mach. Learn. Res."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"4037","DOI":"10.1109\/TIT.2017.2685505","article-title":"The Composition Theorem for Differential Privacy","volume":"63","author":"Kairouz","year":"2017","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Patel, A., Shah, N., Limbasiya, T., and Das, D. (2019, January 6\u20139). VehicleChain: Blockchain-based Vehicular Data Transmission Scheme for Smart City. Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy.","DOI":"10.1109\/SMC.2019.8914391"},{"key":"ref_39","first-page":"131","article-title":"Performance Evaluation of Improved V2X Wireless Communication Based on Gigabit WLAN. Lecture Notes in Networks and Systems","volume":"Volume 159","author":"Sakuraba","year":"2020","journal-title":"Proceedings of the International Conference on Broadband and Wireless Computing, Communication and Applications"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.1109\/TWC.2016.2633522","article-title":"Energy-Efficient Resource Allocation for Mobile-Edge Computation Offloading","volume":"16","author":"You","year":"2017","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1117","DOI":"10.1109\/JSAC.2019.2906789","article-title":"Space\/Aerial-Assisted Computing Offloading for IoT Applications: A Learning-Based Approach","volume":"37","author":"Cheng","year":"2019","journal-title":"IEEE J. Sel. Areas Commun."}],"container-title":["Remote Sensing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2072-4292\/13\/23\/4853\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:37:36Z","timestamp":1760168256000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2072-4292\/13\/23\/4853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,29]]},"references-count":41,"journal-issue":{"issue":"23","published-online":{"date-parts":[[2021,12]]}},"alternative-id":["rs13234853"],"URL":"https:\/\/doi.org\/10.3390\/rs13234853","relation":{},"ISSN":["2072-4292"],"issn-type":[{"value":"2072-4292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,29]]}}}