Dual-Algorithm Framework for Privacy-Preserving Task Scheduling Under Historical Inference Attacks.
Saved in:
| Title: | Dual-Algorithm Framework for Privacy-Preserving Task Scheduling Under Historical Inference Attacks. |
|---|---|
| Authors: | Chen, Exiang, Ye, Ayong, Deng, Huina |
| Source: | Computers (2073-431X); Dec2025, Vol. 14 Issue 12, p558, 27p |
| Subject Terms: | EDGE computing, REINFORCEMENT learning, ADAPTIVE control systems, ALGORITHMS, DATA security, MOBILE computing, SCHEDULING |
| Abstract: | Historical inference attacks pose a critical privacy threat in mobile edge computing (MEC), where adversaries exploit long-term task and location patterns to infer users' sensitive information. To address this challenge, we propose a privacy-preserving task scheduling framework that adaptively balances privacy protection and system performance under dynamic vehicular environments. First, we introduce a dynamic privacy-aware adaptation mechanism that adjusts privacy levels in real time according to vehicle mobility and network dynamics. Second, we design a dual-algorithm framework composed of two complementary solutions: a Markov Approximation-Based Online Algorithm (MAOA) that achieves near-optimal scheduling with provable convergence, and a Privacy-Aware Deep Q-Network (PAT-DQN) algorithm that leverages deep reinforcement learning to enhance adaptability and long-term decision-making. Extensive simulations demonstrate that our proposed methods effectively mitigate privacy leakage while maintaining high task completion rates and low energy consumption. In particular, PAT-DQN achieves up to 14.2% lower privacy loss and 19% fewer handovers than MAOA in high-mobility scenarios, showing superior adaptability and convergence performance. [ABSTRACT FROM AUTHOR] |
| Copyright of Computers (2073-431X) is the property of MDPI and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Database: | Complementary Index |
Be the first to leave a comment!
Full Text Finder
Nájsť tento článok vo Web of Science