{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:22:52Z","timestamp":1742973772670,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615445"},{"type":"electronic","value":"9789819615452"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1545-2_13","type":"book-chapter","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:54:57Z","timestamp":1739379297000},"page":"208-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multiple-Round Aggregation of\u00a0Abstract Semantics for\u00a0Secure Heterogeneous Federated Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-4204-5883","authenticated-orcid":false,"given":"Jiao","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6619-554X","authenticated-orcid":false,"given":"Xiong","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5074-1363","authenticated-orcid":false,"given":"Wei","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,13]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","unstructured":"Jin, Y., Zhu, H., Xu, J., Chen, Y.: Federated Learning: Fundamentals and Advances. Springer Nature, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-19-7083-2","DOI":"10.1007\/978-981-19-7083-2"},{"issue":"3","key":"13_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3501296","volume":"55","author":"DC Nguyen","year":"2023","unstructured":"Nguyen, D.C., et al.: Federated learning for smart healthcare: a survey. ACM Comput. Surv. 55(3), 1\u201337 (2023)","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"13_CR3","doi-asserted-by":"publisher","first-page":"2508","DOI":"10.1109\/TCE.2023.3339702","volume":"70","author":"P Chatterjee","year":"2023","unstructured":"Chatterjee, P., Das, D., Rawat, D.B.: Federated learning empowered recommendation model for financial consumer services. IEEE Trans. Consum. Electron. 70(1), 2508\u20132516 (2023)","journal-title":"IEEE Trans. Consum. Electron."},{"issue":"14s","key":"13_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3596907","volume":"55","author":"K Pfeiffer","year":"2023","unstructured":"Pfeiffer, K., Rapp, M., Khalili, R., Henkel, J.: Federated learning for computationally constrained heterogeneous devices: a survey. ACM Comput. Surv. 55(14s), 1\u201327 (2023)","journal-title":"ACM Comput. Surv."},{"key":"13_CR5","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Advances in Neural Information Processing Systems, vol.\u00a032, pp. 14774\u201314784. Curran Associates, Inc. (2019)"},{"issue":"1","key":"13_CR6","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1109\/TNET.2023.3302016","volume":"32","author":"T Nguyen","year":"2024","unstructured":"Nguyen, T., Thai, M.T.: Preserving privacy and security in federated learning. IEEE\/ACM Trans. Networking 32(1), 833\u2013843 (2024)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Bonawitz, K., et al.: Practical secure aggregation for privacy-preserving machine learning. In: Proceedings ACM SIGSAC Conference on Computer and Communications Security, pp. 1175\u20131191. Dallas Texas USA (2017)","DOI":"10.1145\/3133956.3133982"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Bell, J.H., Bonawitz, K.A., Gasc\u00f3n, A., Lepoint, T., Raykova, M.: Secure single-server aggregation with (poly)logarithmic overhead. In: Proceedings ACM SIGSAC Conference on Computer and Communications Security, pp. 1253\u20131269. Virtual Event USA (2020)","DOI":"10.1145\/3372297.3417885"},{"issue":"4","key":"13_CR9","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1109\/JSAC.2023.3242702","volume":"41","author":"T Jahani-Nezhad","year":"2023","unstructured":"Jahani-Nezhad, T., Maddah-Ali, M.A., Li, S., Caire, G.: Swiftagg+: achieving asymptotically optimal communication loads in secure aggregation for federated learning. IEEE J. Sel. Areas Commun. 41(4), 977\u2013989 (2023)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"So, J., Ali, R.E., G\u00fcler, B., Jiao, J., Avestimehr, A.S.: Securing secure aggregation: mitigating multi-round privacy leakage in federated learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol.\u00a037, pp. 9864\u20139873 (2023)","DOI":"10.1609\/aaai.v37i8.26177"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Ma, Y., Woods, J., Angel, S., Polychroniadou, A., Rabin, T.: Flamingo: multi-round single-server secure aggregation with applications to private federated learning. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 477\u2013496 (2023)","DOI":"10.1109\/SP46215.2023.10179434"},{"key":"13_CR12","unstructured":"Cui, K., Feng, X., Wang, L., Wu, H., Zhang, X., D\u00fcdder, B.: Chu-ko-nu: a reliable, efficient, and anonymously authentication-enabled realization for multi-round secure aggregation in federated learning. arXiv preprint arXiv:2402.15111 (2024)"},{"issue":"10s","key":"13_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3505244","volume":"54","author":"S Khan","year":"2022","unstructured":"Khan, S., Naseer, M., Hayat, M., Zamir, S.W., Khan, F.S., Shah, M.: Transformers in vision: a survey. ACM Comput. Surv. (CSUR) 54(10s), 1\u201341 (2022)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"3","key":"13_CR14","doi-asserted-by":"publisher","first-page":"4289","DOI":"10.1109\/JIOT.2023.3302065","volume":"11","author":"NM Hijazi","year":"2024","unstructured":"Hijazi, N.M., Aloqaily, M., Guizani, M., Ouni, B., Karray, F.: Secure federated learning with fully homomorphic encryption for IoT communications. IEEE Internet Things J. 11(3), 4289\u20134300 (2024)","journal-title":"IEEE Internet Things J."},{"key":"13_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120481","volume":"667","author":"L Chen","year":"2024","unstructured":"Chen, L., Xiao, D., Yu, Z., Zhang, M.: Secure and efficient federated learning via novel multi-party computation and compressed sensing. Inf. Sci. 667, 120481 (2024)","journal-title":"Inf. Sci."},{"key":"13_CR16","doi-asserted-by":"publisher","first-page":"4488","DOI":"10.1109\/TIFS.2023.3293417","volume":"18","author":"K Wei","year":"2023","unstructured":"Wei, K., et al.: Personalized federated learning with differential privacy and convergence guarantee. IEEE Trans. Inf. Forensics Secur. 18, 4488\u20134503 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"24","key":"13_CR17","doi-asserted-by":"publisher","first-page":"21176","DOI":"10.1109\/JIOT.2023.3279926","volume":"10","author":"H Li","year":"2023","unstructured":"Li, H., Sun, Y., Yu, Y., Li, D., Guan, Z., Liu, J.: Privacy-preserving cross-silo federated learning atop blockchain for IoT. IEEE Internet Things J. 10(24), 21176\u201321186 (2023)","journal-title":"IEEE Internet Things J."},{"key":"13_CR18","unstructured":"Choi, B., Sohn, J.y., Han, D.J., Moon, J.: Communication-computation efficient secure aggregation for federated learning. arXiv preprint arXiv:1201.20543 (2021)"},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1109\/TIFS.2022.3221899","volume":"18","author":"Z Zhang","year":"2023","unstructured":"Zhang, Z., et al.: LSFL: a lightweight and secure federated learning scheme for edge computing. IEEE Trans. Inf. Forensics Secur. 18, 365\u2013379 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"2977","DOI":"10.1109\/TIFS.2023.3273914","volume":"18","author":"T Eltaras","year":"2023","unstructured":"Eltaras, T., Sabry, F., Labda, W., Alzoubi, K., Ahmedeltaras, Q.: Efficient verifiable protocol for privacy-preserving aggregation in federated learning. IEEE Trans. Inf. Forensics Secur. 18, 2977\u20132990 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"13_CR21","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/TDSC.2022.3146448","volume":"20","author":"Y Zheng","year":"2023","unstructured":"Zheng, Y., Lai, S., Liu, Y., Yuan, X., Yi, X., Wang, C.: Aggregation service for federated learning: an efficient, secure, and more resilient realization. IEEE Trans. Dependable Secure Comput. 20(2), 988\u20131001 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"13_CR22","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"13_CR23","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s00145-006-0347-3","volume":"20","author":"R Gennaro","year":"2007","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20, 51\u201383 (2007)","journal-title":"J. Cryptol."},{"issue":"11","key":"13_CR24","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"issue":"4","key":"13_CR25","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1137\/S0097539793244708","volume":"28","author":"J H\u00e5stad","year":"1999","unstructured":"H\u00e5stad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364\u20131396 (1999)","journal-title":"SIAM J. Comput."},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Rogaway, P.: Authenticated-encryption with associated-data. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, p. 98\u2013107. ACM (2002)","DOI":"10.1145\/586110.586125"},{"key":"13_CR27","doi-asserted-by":"publisher","unstructured":"Buchmann, J.: Introduction to cryptography, vol.\u00a0335. Springer, New York (2004). https:\/\/doi.org\/10.1007\/978-1-4419-9003-7","DOI":"10.1007\/978-1-4419-9003-7"},{"issue":"11","key":"13_CR28","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"13_CR29","unstructured":"Caldas, S., et al.: LEAF: a benchmark for federated settings. arXiv preprint arXiv:1812.01097 (2018)"},{"key":"13_CR30","doi-asserted-by":"publisher","first-page":"2175","DOI":"10.1109\/TIFS.2023.3263631","volume":"18","author":"D Kim","year":"2023","unstructured":"Kim, D., Guyot, C.: Optimized privacy-preserving CNN inference with fully homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 18, 2175\u20132187 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1545-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:55:08Z","timestamp":1739379308000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1545-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615445","9789819615452"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1545-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}