{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T19:54:58Z","timestamp":1759694098012,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672296","61872196"],"award-info":[{"award-number":["61672296","61872196"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004610","name":"Science and Technology Support Program of Jiangsu Province","doi-asserted-by":"publisher","award":["BE2017166","BE2019740"],"award-info":[{"award-number":["BE2017166","BE2019740"]}],"id":[{"id":"10.13039\/501100004610","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s00607-020-00853-2","type":"journal-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T14:02:45Z","timestamp":1604066565000},"page":"449-472","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Differential privacy distributed learning under chaotic quantum particle swarm optimization"],"prefix":"10.1007","volume":"103","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4938-1230","authenticated-orcid":false,"given":"Yun","family":"Xie","sequence":"first","affiliation":[]},{"given":"Peng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jindan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Marek R.","family":"Ogiela","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,30]]},"reference":[{"key":"853_CR1","unstructured":"Chen J, Pan X, Monga R, Bengio S, Jozefowicz R (2017) Revisiting distributed synchronous SGD. arXiv Learning"},{"key":"853_CR2","doi-asserted-by":"publisher","first-page":"2628","DOI":"10.1109\/TPAMI.2018.2858249","volume":"41","author":"Q Yao","year":"2019","unstructured":"Yao Q, Kwok JT, Wang T, Liu T (2019) Large-scale low-rank matrix learning with nonconvex regularizers. IEEE Trans Pattern Anal Mach Intell 41:2628\u20132643","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"853_CR3","unstructured":"Meng Q, Chen W, Wang Y, Ma Z, Liu T (2017) Convergence analysis of distributed stochastic gradient descent with shuffling. arXiv Machine Learning"},{"key":"853_CR4","unstructured":"Crandall PE, Quinn MJ (1993) Block data decomposition for data-parallel programming on a heterogeneous workstation network. In: High performance distributed computing, pp 42\u201349"},{"issue":"1","key":"853_CR5","first-page":"165","volume":"13","author":"D Ofer","year":"2010","unstructured":"Ofer D, Ran G-B, Ohad S, Lin X (2010) Optimal distributed online prediction using mini-batches. J Mach Learn Res 13(1):165\u2013202","journal-title":"J Mach Learn Res"},{"key":"853_CR6","doi-asserted-by":"crossref","unstructured":"Bonomi F, Milito RA, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: IEEE international conference on cloud computing technology and science, pp 13\u201316","DOI":"10.1145\/2342509.2342513"},{"issue":"1","key":"853_CR7","first-page":"2905","volume":"14","author":"K Chaudhuri","year":"2013","unstructured":"Chaudhuri K, Sarwate AD, Sinha K (2013) A near-optimal algorithm for differentially-private principal components. J Mach Learn Res 14(1):2905\u20132943","journal-title":"J Mach Learn Res"},{"key":"853_CR8","doi-asserted-by":"crossref","unstructured":"Bassily R, Smith A, Thakurta A (2014) Private empirical risk minimization: efficient algorithms and tight error bounds. In: 2014 IEEE 55th annual symposium on foundations of computer science, pp 464\u2013473","DOI":"10.1109\/FOCS.2014.56"},{"key":"853_CR9","unstructured":"Jain P, Kulkarni V, Thakurta A, Williams O (2015) To drop or not to drop: robustness, consistency and differential privacy properties of dropout. arXiv Learning"},{"key":"853_CR10","first-page":"S09252312173180","volume":"281","author":"Y Ming","year":"2017","unstructured":"Ming Y, Zhao Y, Wu C, Li K, Yin J (2017) Distributed and asynchronous stochastic gradient descent with variance reduction. Neurocomputing 281:S0925231217318039","journal-title":"Neurocomputing"},{"issue":"2","key":"853_CR11","first-page":"20","volume":"7","author":"I Heged\u00fcs","year":"2016","unstructured":"Heged\u00fcs I, Berta A, Jelasity M (2016) Robust decentralized differentially private stochastic gradient descent. J Wirel Mob Netw Ubiquitous Comput Depend Appl 7(2):20\u201340","journal-title":"J Wirel Mob Netw Ubiquitous Comput Depend Appl"},{"key":"853_CR12","doi-asserted-by":"crossref","unstructured":"Song S, Chaudhuri K, Sarwate AD (2013) Stochastic gradient descent with differentially private updates. In: 2013 IEEE global conference on signal and information processing, pp 245\u2013248","DOI":"10.1109\/GlobalSIP.2013.6736861"},{"key":"853_CR13","doi-asserted-by":"crossref","unstructured":"Abadi M, Chu A, Goodfellow I, Brendan McMahan H, Mironov I, Talwar K, Zhang L (2016) Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, CCS 16, New York, NY, USA. Association for Computing Machinery, p 308318","DOI":"10.1145\/2976749.2978318"},{"key":"853_CR14","doi-asserted-by":"crossref","unstructured":"Hegedus I, Jelasity M (2016) Distributed differentially private stochastic gradient descent: an empirical study. In: 2016 24th Euromicro international conference on parallel, distributed, and network-based processing (PDP), pp 566\u2013573","DOI":"10.1109\/PDP.2016.19"},{"key":"853_CR15","doi-asserted-by":"crossref","unstructured":"Bassily R, Smith A, Thakurta A (2014) Private empirical risk minimization: efficient algorithms and tight error bounds. In: Foundations of computer science, pp 464\u2013473","DOI":"10.1109\/FOCS.2014.56"},{"issue":"5","key":"853_CR16","doi-asserted-by":"publisher","first-page":"237","DOI":"10.2307\/3029337","volume":"21","author":"MH Stone","year":"1948","unstructured":"Stone MH (1948) The generalized weierstrass approximation theorem. Math Mag 21(5):237","journal-title":"Math Mag"},{"issue":"1","key":"853_CR17","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/4235.985692","volume":"6","author":"M Clerc","year":"2002","unstructured":"Clerc M, Kennedy J (2002) The particle swarm\u2013explosion, stability, and convergence in a multidimensional complex space. IEEE Trans Evol Comput 6(1):58\u201373","journal-title":"IEEE Trans Evol Comput"},{"issue":"1","key":"853_CR18","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1186\/1471-2105-7-125","volume":"7","author":"M Michael","year":"2006","unstructured":"Michael M, Michael S, Gisbert S (2006) Optimized particle swarm optimization (OPSO) and its application to artificial neural network training. BMC Bioinform 7(1):125\u2013125","journal-title":"BMC Bioinform"},{"issue":"20","key":"853_CR19","doi-asserted-by":"publisher","first-page":"e5342","DOI":"10.1002\/cpe.5342","volume":"31","author":"J Zhang","year":"2019","unstructured":"Zhang J, Xue F, Cai X, Zhihua CY, Chang WZ, Li W (2019) Privacy protection based on manyoptimization algorithm. Concurr Comput Pract Exp 31(20):e5342","journal-title":"Concurr Comput Pract Exp"},{"issue":"8","key":"853_CR20","doi-asserted-by":"publisher","first-page":"4161","DOI":"10.1007\/s13369-017-2834-2","volume":"43","author":"G Kalyani","year":"2018","unstructured":"Kalyani G, ChandraSekharaRao MVP, Janakiramaiah B (2018) Particle swarm intelligence and impact factor-based privacy preserving association rule mining for balancing data utility and knowledge privacy. Arab J Sci Eng 43(8):4161\u20134178","journal-title":"Arab J Sci Eng"},{"key":"853_CR21","unstructured":"Clerc M (1999) The swarm and the queen: towards a deterministic and adaptive particle swarm optimization. In: Proceedings of the 1999 congress on evolutionary computation-CEC99 (Cat. No. 99TH8406), vol 3, pp 1951\u20131957"},{"key":"853_CR22","first-page":"81","volume":"193","author":"J Sun","year":"2012","unstructured":"Sun J, Wu X, Palade V, Fang W, Lai CH, Xu W (2012) Convergence analysis and improvements of quantum-behaved particle swarm optimization. Inf ENCES 193:81\u2013103","journal-title":"Inf ENCES"},{"issue":"8","key":"853_CR23","doi-asserted-by":"publisher","first-page":"3628","DOI":"10.1109\/TII.2017.2773646","volume":"14","author":"C Yin","year":"2018","unstructured":"Yin C, Xi J, Sun R, Wang J (2018) Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Trans Ind Inf 14(8):3628\u20133636","journal-title":"IEEE Trans Ind Inf"},{"key":"853_CR24","doi-asserted-by":"crossref","unstructured":"Nissim K, Raskhodnikova S, Smith A (2007) Smooth sensitivity and sampling in private data analysis. In: Proceedings of the thirty-ninth annual ACM symposium on theory of computing, STOC 07, New York, NY, USA. Association for Computing Machinery, p 7584","DOI":"10.1145\/1250790.1250803"},{"issue":"10","key":"853_CR25","first-page":"313","volume":"10","author":"S Berthold","year":"1960","unstructured":"Berthold S, Abe S (1960) Statistical metric spaces. Pac J Math 10(10):313\u2013334","journal-title":"Pac J Math"},{"key":"853_CR26","unstructured":"Geyer RC, Klein T, Nabi M (2017) Differentially private federated learning: a client level perspective. arXiv Cryptography and Security"},{"key":"853_CR27","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1162\/EVCO_a_00049","volume":"20","author":"J Sun","year":"2012","unstructured":"Sun J, Fang W, Wu X, Palade V (2012) evolutionary computation, quantum-behaved particle swarm optimization: analysis of individual particle behavior and parameter selection. Evol Comput 20:349\u2013393","journal-title":"Evol Comput"},{"issue":"12","key":"853_CR28","first-page":"3372","volume":"33","author":"K Tang","year":"2013","unstructured":"Tang K, Jun WU, Zhao J (2013) Adaptive particle swarm optimization algorithm based on diversity feedback. J Comput Appl 33(12):3372\u20133374","journal-title":"J Comput Appl"},{"key":"853_CR29","unstructured":"Wang YB (2010) An colony entropy-based adaptive genetic algorithm. Microcomput Inf"},{"issue":"12","key":"853_CR30","first-page":"272","volume":"32","author":"X Sun","year":"2010","unstructured":"Sun X, Zhou DW, Zhang XW (2010) A chaos particle swarm optimization algorithm. Comput Eng Sci 32(12):272\u2013277","journal-title":"Comput Eng Sci"},{"key":"853_CR31","first-page":"725","volume":"130\u2013134","author":"A Paranya","year":"2012","unstructured":"Paranya A, Phayung M (2012) A multi-objective memetic algorithm based on chaos optimization. Appl Mech Mater 130\u2013134:725\u2013729","journal-title":"Appl Mech Mater"},{"issue":"2","key":"853_CR32","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1016\/j.cam.2006.09.008","volume":"206","author":"MS Tavazoei","year":"2007","unstructured":"Tavazoei MS, Haeri M (2007) An optimization algorithm based on chaotic behavior and fractal nature. J Comput Appl Math 206(2):1070\u20131081","journal-title":"J Comput Appl Math"},{"key":"853_CR33","doi-asserted-by":"crossref","unstructured":"Lin J, Yang D, Li M, Xu J, Xue G (2016) Bidguard: a framework for privacy-preserving crowdsensing incentive mechanisms. In: 2016 IEEE conference on communications and network security (CNS), pp 145\u2013153","DOI":"10.1109\/CNS.2016.7860480"},{"key":"853_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1089\/big.2018.29025.bba","volume":"6","author":"M Du","year":"2018","unstructured":"Du M, Wang K, Xia Z, Zhang Y (2018) Differential privacy preserving of training model in wireless big data with edge computing. IEEE Trans Big Data 6:1","journal-title":"IEEE Trans Big Data"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-020-00853-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-020-00853-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-020-00853-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,27]],"date-time":"2021-02-27T17:06:57Z","timestamp":1614445617000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-020-00853-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["853"],"URL":"https:\/\/doi.org\/10.1007\/s00607-020-00853-2","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"15 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}