{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T07:40:34Z","timestamp":1768808434753,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819756056","type":"print"},{"value":"9789819756063","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5606-3_6","type":"book-chapter","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T09:03:33Z","timestamp":1722243813000},"page":"61-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Differential Privacy Federated Learning Scheme with Improved Noise Perturbation"],"prefix":"10.1007","author":[{"given":"Chang","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xiaowei","family":"He","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xinru","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yixuan","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Yiji","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Xinyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianhang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Haofei","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"issue":"2","key":"6_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSP.2020.3016905","volume":"38","author":"V Monga","year":"2021","unstructured":"Monga, V., Li, Y., Eldar, Y.C.: Algorithm unrolling: Interpretable, efficient deep learning for signal and image processing. IEEE Signal Process. Mag. 38(2), 18\u201344 (2021)","journal-title":"IEEE Signal Process. Mag."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Phong, L.T., Aono, Y., Hayashi, T., Wang, L., Moriai, S.: Privacy-preserving deep learning: Revisited and enhanced. In: International Conference on Applications and Techniques in Information Security, pp. 100\u2013110. Auckland, New Zealand (2017)","DOI":"10.1007\/978-981-10-5421-1_9"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"4574","DOI":"10.1109\/TIFS.2021.3108434","volume":"16","author":"X Liu","year":"2021","unstructured":"Liu, X., Li, H., Xu, G., Chen, Z., Huang, X., Lu, R.: Privacy-enhanced federated learning against poisoning adversaries. IEEE Trans. Inf. Forensics Secur. 16, 4574\u20134588 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"10","key":"6_CR4","doi-asserted-by":"publisher","first-page":"9530","DOI":"10.1109\/JIOT.2020.2991416","volume":"7","author":"R Hu","year":"2020","unstructured":"Hu, R., Guo, Y., Li, H., Pei, Q., Gong, Y.: Personalized federated learning with differential privacy. IEEE Internet Things J. 7(10), 9530\u20139539 (2020)","journal-title":"IEEE Internet Things J."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Seif, M., Tandon, R., Li, M.: Wireless federated learning with local differential privacy. In: Proceedings of the IEEE International Symposium on Information Theory (ISIT), pp. 2604\u20132609 (2020)","DOI":"10.1109\/ISIT44484.2020.9174426"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Sun, L., Qian, J., Chen, X.: LDP-FL: practical private aggregation in federated learning with local differential privacy. In: Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, IJCAI-21, pp. 1571\u20131578 (2021)","DOI":"10.24963\/ijcai.2021\/217"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"1884","DOI":"10.1109\/TIFS.2023.3258255","volume":"18","author":"X Yuan","year":"2023","unstructured":"Yuan, X., Ni, W., Ding, M., Wei, K., Li, J., Poor, H.V.: Amplitude-varying perturbation for balancing privacy and utility in federated learning. IEEE Trans. Inf. Forensics Secur. 18, 1884\u20131897 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Theory of Cryptography Conference, pp. 265\u2013284. Springer (2006)","DOI":"10.1007\/11681878_14"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS), pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Mironov, I.: R\u00e9nyi differential privacy. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp. 263\u2013275 (2017)","DOI":"10.1109\/CSF.2017.11"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"1905","DOI":"10.1109\/TIFS.2022.3174394","volume":"17","author":"H Zhou","year":"2022","unstructured":"Zhou, H., Yang, G., Dai, H., Liu, G.: PFLF: privacy-preserving federated learning framework for edge computing. IEEE Trans. Inf. Forensics Secur. 17, 1905\u20131918 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1016\/j.future.2021.09.015","volume":"127","author":"X Wu","year":"2022","unstructured":"Wu, X., Zhang, Y., Shi, M., Li, P., Li, R., Xiong, N.N.: An adaptive federated learning scheme with differential privacy preserving. Futur. Gener. Comput. Syst. 127, 362\u2013372 (2022)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"2","key":"6_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T.J., et al.: Federated machine learning: concept and applications. ACM Trans. Intellig. Sys. Technol. 10(2), 1\u201319 (2019)","journal-title":"ACM Trans. Intellig. Sys. Technol."},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei, K., Li, J., Ding, M., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454\u20133469 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"Liu, Z., et al.: A ConvNet for the 2020s. In: 2022 IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 11966\u201311976 (2022). https:\/\/doi.org\/10.1109\/CVPR52688.2022.01167","DOI":"10.1109\/CVPR52688.2022.01167"},{"key":"6_CR16","unstructured":"Yu, D., Zhang, H., Chen, W.: Improve the gradient perturbation approach for differentially private optimization. In: Privacy Preserving Machine Learning (NeurIPS 2018 Workshop) (2018)"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5606-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T09:05:01Z","timestamp":1722243901000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5606-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819756056","9789819756063"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5606-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}