{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T23:56:02Z","timestamp":1769039762789,"version":"3.49.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031776090","type":"print"},{"value":"9783031776106","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-77610-6_18","type":"book-chapter","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T04:09:42Z","timestamp":1737000582000},"page":"191-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Complex-Valued Federated Learning with\u00a0Differential Privacy and\u00a0MRI Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-7087-7864","authenticated-orcid":false,"given":"Anneliese","family":"Riess","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Ziller","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Kolek","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Rueckert","sequence":"additional","affiliation":[]},{"given":"Julia","family":"Schnabel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8382-8062","authenticated-orcid":false,"given":"Georgios","family":"Kaissis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,17]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"18_CR2","unstructured":"Antonelli, M., et\u00a0al.: The medical segmentation decathlon. arXiv preprint arXiv:2106.05735 (2021)"},{"key":"18_CR3","unstructured":"Beutel, D.J., et al.: Flower: a friendly federated learning research framework. arXiv preprint arXiv:2007.14390 (2020)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Boenisch, F., Dziedzic, A., Schuster, R., Shamsabadi, A.S., Shumailov, I., Papernot, N.: When the curious abandon honesty: federated learning is not private (2023)","DOI":"10.1109\/EuroSP57164.2023.00020"},{"issue":"1","key":"18_CR5","first-page":"251","volume":"11","author":"A Chatalic","year":"2022","unstructured":"Chatalic, A., Schellekens, V., Houssiau, F., De Montjoye, Y.A., Jacques, L., Gribonval, R.: Compressive learning with privacy guarantees. Inf. Infer. J. IMA 11(1), 251\u2013305 (2022)","journal-title":"Inf. Infer. J. IMA"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Cole, E.K., Cheng, J.Y., Pauly, J.M., Vasanawala, S.S.: Analysis of deep complex-valued convolutional neural networks for MRI reconstruction. arXiv preprint arXiv:2004.01738 (2020)","DOI":"10.1002\/mrm.28733"},{"key":"18_CR7","unstructured":"Dong, J., Roth, A., Su, W.J.: Gaussian differential privacy. arXiv preprint arXiv:1905.02383 (2019)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"D\u00f6rmann, F., Frisk, O., Andersen, L.N., Pedersen, C.F.: Not all noise is accounted equally: how differentially private learning benefits from large sampling rates. In: 2021 IEEE 31st International Workshop on Machine Learning for Signal Processing (MLSP), pp.\u00a01\u20136. IEEE (2021)","DOI":"10.1109\/MLSP52302.2021.9596307"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"issue":"3\u20134","key":"18_CR10","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"issue":"9","key":"18_CR11","doi-asserted-by":"crossref","first-page":"2094","DOI":"10.1109\/TKDE.2013.96","volume":"26","author":"L Fan","year":"2013","unstructured":"Fan, L., Xiong, L.: Adaptively sharing real-time aggregate with differential privacy. IEEE Trans. Knowl. Data Eng. (TKDE) 26(9), 2094\u20132106 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng. (TKDE)"},{"key":"18_CR12","unstructured":"Feng, S., Tram\u00e8r, F.: Privacy backdoors: stealing data with corrupted pretrained models (2024)"},{"issue":"2","key":"18_CR13","doi-asserted-by":"publisher","first-page":"1356","DOI":"10.1109\/TSG.2019.2936712","volume":"11","author":"F Fioretto","year":"2019","unstructured":"Fioretto, F., Mak, T.W., Van Hentenryck, P.: Differential privacy for power grid obfuscation. IEEE Trans. Smart Grid 11(2), 1356\u20131366 (2019)","journal-title":"IEEE Trans. Smart Grid"},{"key":"18_CR14","unstructured":"Fowl, L., Geiping, J., Czaja, W., Goldblum, M., Goldstein, T.: Robbing the fed: Directly obtaining private data in federated learning with modified models (2022)"},{"key":"18_CR15","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International Conference on Machine Learning, pp. 448\u2013456. PMLR (2015)"},{"issue":"9","key":"18_CR16","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1038\/s42256-019-0088-2","volume":"1","author":"A Jobin","year":"2019","unstructured":"Jobin, A., Ienca, M., Vayena, E.: The global landscape of AI ethics guidelines. Nat. Mach. Intell. 1(9), 389\u2013399 (2019)","journal-title":"Nat. Mach. Intell."},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/978-3-030-88210-5_26","volume-title":"Deep Generative Models, and Data Augmentation, Labelling, and Imperfections","author":"T Kart","year":"2021","unstructured":"Kart, T., Bai, W., Glocker, B., Rueckert, D.: DeepMCAT: large-scale deep clustering for medical image categorization. In: Engelhardt, S., et al. (eds.) DGM4MICCAI\/DALI -2021. LNCS, vol. 13003, pp. 259\u2013267. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88210-5_26"},{"key":"18_CR18","unstructured":"Koskela, A., J\u00e4lk\u00f6, J., Honkela, A.: Computing tight differential privacy guarantees using FFT. In: International Conference on Artificial Intelligence and Statistics, pp. 2560\u20132569. PMLR (2020)"},{"key":"18_CR19","unstructured":"Kreutz-Delgado, K.: The complex gradient operator and the CR-calculus. arXiv preprint arXiv:0906.4835 (2009)"},{"issue":"1","key":"18_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-70551-8","volume":"10","author":"T K\u00fcstner","year":"2020","unstructured":"K\u00fcstner, T., et al.: CINENet: deep learning-based 3D cardiac CINE MRI reconstruction with multi-coil complex-valued 4D spatio-temporal convolutions. Sci. Rep. 10(1), 1\u201313 (2020)","journal-title":"Sci. Rep."},{"key":"18_CR21","doi-asserted-by":"publisher","unstructured":"de\u00a0Mello, et al.: Deep learning-based type identification of volumetric MRI sequences. In: 2020 25th International Conference on Pattern Recognition (ICPR). IEEE (2021). https:\/\/doi.org\/10.1109\/icpr48806.2021.9413120","DOI":"10.1109\/icpr48806.2021.9413120"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Mironov, I.: R\u00e9nyi differential privacy. 2017 IEEE 30th Computer Security Foundations Symposium (CSF) (2017)","DOI":"10.1109\/CSF.2017.11"},{"key":"18_CR23","unstructured":"Misra, D.: Mish: a self regularized non-monotonic activation function. arXiv preprint arXiv:1908.08681 (2019)"},{"key":"18_CR24","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.neucom.2016.04.049","volume":"207","author":"M Peker","year":"2016","unstructured":"Peker, M.: An efficient sleep scoring system based on EEG signal using complex-valued machine learning algorithms. Neurocomputing 207, 165\u2013177 (2016)","journal-title":"Neurocomputing"},{"key":"18_CR25","unstructured":"Reddi, S., et al.: Adaptive federated optimization (2021). https:\/\/arxiv.org\/abs\/2003.00295"},{"key":"18_CR26","unstructured":"Salimans, T., Kingma, D.P.: Weight normalization: a simple reparameterization to accelerate training of deep neural networks. In: Advances in Neural Information Processing Systems, vol. 29 (2016)"},{"key":"18_CR27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815911","volume-title":"Statistical Signal Processing of Complex-valued Data: The Theory of Improper and Noncircular Signals","author":"PJ Schreier","year":"2010","unstructured":"Schreier, P.J., Scharf, L.L.: Statistical Signal Processing of Complex-valued Data: The Theory of Improper and Noncircular Signals. Cambridge University Press, Cambridge (2010)"},{"key":"18_CR28","unstructured":"Trabelsi, C., et al.: Deep complex networks. arXiv preprint arXiv:1705.09792 (2017)"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Virtue, P., Yu, S., Lustig, M.: Better than real: complex-valued neural nets for MRI fingerprinting. In: 2017 IEEE International Conference on Image Processing (ICIP), pp. 3953\u20133957. IEEE (2017)","DOI":"10.1109\/ICIP.2017.8297024"},{"issue":"1","key":"18_CR30","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/BF01447872","volume":"97","author":"W Wirtinger","year":"1927","unstructured":"Wirtinger, W.: Zur formalen Theorie der Funktionen von mehr komplexen Ver\u00e4nderlichen. Math. Ann. 97(1), 357\u2013375 (1927)","journal-title":"Math. Ann."},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Wu, Y., He, K.: Group normalization. In: Proceedings of the European Conference on Computer Vision (ECCV), pp. 3\u201319 (2018)","DOI":"10.1007\/978-3-030-01261-8_1"},{"key":"18_CR32","unstructured":"Yousefpour, A., et al.: Opacus: user-friendly differential privacy library in PyTorch. arXiv preprint arXiv:2109.12298 (2021)"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Yu, H., Liu, Y., Chen, M.: Complex-valued neural network based federated learning for multi-user indoor positioning performance optimization. IEEE Internet Things J. (2024)","DOI":"10.1109\/JIOT.2024.3379872"}],"container-title":["Lecture Notes in Computer Science","Medical Image Computing and Computer Assisted Intervention \u2013 MICCAI 2024 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-77610-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T17:27:33Z","timestamp":1746725253000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-77610-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031776090","9783031776106"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-77610-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that\u00a0are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"MICCAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Medical Image Computing and Computer-Assisted Intervention","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakesh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"miccai2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conferences.miccai.org\/2024\/en\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}