{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:24:30Z","timestamp":1740108270933,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T00:00:00Z","timestamp":1715126400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T00:00:00Z","timestamp":1715126400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872196","61902196","61872194","62102196"],"award-info":[{"award-number":["61872196","61902196","61872194","62102196"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012154","name":"Graduate Research and Innovation Projects of Jiangsu Province","doi-asserted-by":"publisher","award":["KYCX22_1019"],"award-info":[{"award-number":["KYCX22_1019"]}],"id":[{"id":"10.13039\/501100012154","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s00607-024-01257-2","type":"journal-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T15:01:51Z","timestamp":1715180511000},"page":"2459-2488","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Differentially private federated learning with non-IID data"],"prefix":"10.1007","volume":"106","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4533-5942","authenticated-orcid":false,"given":"Shuyan","family":"Cheng","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5026-5347","authenticated-orcid":false,"given":"Peng","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ruchuan","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"He","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,5,8]]},"reference":[{"key":"1257_CR1","doi-asserted-by":"publisher","first-page":"6038","DOI":"10.1109\/TNNLS.2018.2817540","volume":"29","author":"G Li","year":"2018","unstructured":"Li G, Yu Y (2018) Contrast-oriented deep neural networks for salient object detection. IEEE Trans Neural Netw Learn Syst 29:6038\u20136051","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1257_CR2","doi-asserted-by":"publisher","first-page":"3212","DOI":"10.1109\/TNNLS.2018.2876865","volume":"30","author":"Z Zhao","year":"2019","unstructured":"Zhao Z, Zheng P, Xu S, Wu X (2019) Object detection with deep learning: a review. IEEE Trans Neural Netw Learn Syst 30:3212\u20133232","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"1257_CR3","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1038\/s42256-021-00337-8","volume":"3","author":"G Kaissis","year":"2021","unstructured":"Kaissis G, Ziller A, Passerat-Palmbach J et al (2021) End-to-end privacy preserving deep learning on multi-institutional medical imaging. Nat Mach Intell 3:473\u2013484","journal-title":"Nat Mach Intell"},{"key":"1257_CR4","doi-asserted-by":"crossref","unstructured":"Ziller A, Usynin D, Braren R, et al. (2021) Medical imaging deep learning with differential privacy. Scientific Reports 11","DOI":"10.1038\/s41598-021-93030-0"},{"key":"1257_CR5","first-page":"1273","volume":"54","author":"B McMahan","year":"2017","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, Arcas B (2017) Communication-efficient learning of deep networks from decentralized data. Proc Mach Learn Res 54:1273\u20131282","journal-title":"Proc Mach Learn Res"},{"key":"1257_CR6","doi-asserted-by":"crossref","unstructured":"Kairouz P, McMahan H, Avent B, et al (2021) Advances and open problems in federated learning. Found Trends\u00ae Mach Learn 14(1\u20132):1\u2013210","DOI":"10.1561\/9781680837896"},{"issue":"3","key":"1257_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","volume":"37","author":"T Li","year":"2020","unstructured":"Li T, Sahu A, Talwalkar A, Smith V (2020) Federated learning: challenges, methods, and future directions. IEEE Signal Process Mag 37(3):50\u201360","journal-title":"IEEE Signal Process Mag"},{"key":"1257_CR8","doi-asserted-by":"crossref","unstructured":"Jamali-Rad H, Abdizadeh M, Singh A (2022) Federated learning with taskonomy for non-IID data. arXiv:2103.15947","DOI":"10.1109\/TNNLS.2022.3152581"},{"key":"1257_CR9","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1038\/d41586-019-03013-5","volume":"574","author":"D Heaven","year":"2019","unstructured":"Heaven D (2019) Why deep-learning is are so easy to fool. Nature 574:163\u2013166","journal-title":"Nature"},{"key":"1257_CR10","doi-asserted-by":"crossref","unstructured":"Shokri R, Stronati M, Song C, Shmatikov V (2017) membership inference attacks against machine learning models. In: 2017 IEEE symposium on security and privacy (SP), pp 3\u201318","DOI":"10.1109\/SP.2017.41"},{"key":"1257_CR11","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TEVC.2019.2890858","volume":"23","author":"J Su","year":"2019","unstructured":"Su J, Vargas D, Sakurai K (2019) One pixel attack for fooling deep neural networks. IEEE Trans Evolut Comput 23:828\u2013841","journal-title":"IEEE Trans Evolut Comput"},{"key":"1257_CR12","doi-asserted-by":"publisher","first-page":"2555","DOI":"10.1109\/JIOT.2021.3089713","volume":"9","author":"X Yuan","year":"2022","unstructured":"Yuan X, Ma X, Zhang L, Fang Y, Wu D (2022) Beyond class-level privacy leakage: breaking record-level privacy in federated learning. IEEE Internet Things J 9:2555\u20132565","journal-title":"IEEE Internet Things J"},{"key":"1257_CR13","doi-asserted-by":"crossref","unstructured":"Zhu L, Liu Z, Han S (2019) Deep leakage from gradients. arXiv:2301.02621","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"1257_CR14","unstructured":"Zhao B, Mopuri K, Bilen H (2020) iDLG: improved deep leakage from gradients. arXiv:2001.02610"},{"key":"1257_CR15","doi-asserted-by":"crossref","unstructured":"Zheng W, Popa R, Gonzalez J, Stoica I (2019) Helen: maliciously secure coopetitive learning for linear models. In: 2019 IEEE symposium on security and privacy (SP), pp 724\u2013738","DOI":"10.1109\/SP.2019.00045"},{"issue":"3","key":"1257_CR16","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1109\/TII.2019.2942179","volume":"16","author":"Y Lu","year":"2020","unstructured":"Lu Y, Huang X, Dai Y, Maharjan S, Zhang Y (2020) Differentially private asynchronous federated learning for mobile edge computing in urban informatics. IEEE Trans Ind Inf 16(3):2134\u20132143","journal-title":"IEEE Trans Ind Inf"},{"issue":"4","key":"1257_CR17","doi-asserted-by":"publisher","first-page":"2529","DOI":"10.1007\/s11280-020-00780-4","volume":"23","author":"X Huang","year":"2020","unstructured":"Huang X, Ding Y, Jiang Z et al (2020) DP-FL: a novel differentially private federated learning framework for the unbalanced data. World Wide Web 23(4):2529\u20132545","journal-title":"World Wide Web"},{"key":"1257_CR18","first-page":"2251","volume":"130","author":"Q Zheng","year":"2021","unstructured":"Zheng Q, Chen S, Long Q, Su W (2021) Federated f-differential privacy. Proc Mach Learn Res 130:2251\u20132259","journal-title":"Proc Mach Learn Res"},{"key":"1257_CR19","doi-asserted-by":"crossref","unstructured":"Bonawitz K, Ivanov V, Kreuter B, et al (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC conference on computer and communications security, pp 1175\u20131191","DOI":"10.1145\/3133956.3133982"},{"key":"1257_CR20","unstructured":"Chase M, Ran G, Laine K, Lauter K, Rindal P (2017) Private collaborative neural network learning. IACR Cryptol. ePrint Arch"},{"key":"1257_CR21","doi-asserted-by":"crossref","unstructured":"Fereidooni H, Marchal S, Miettinen M (2021) SAFELearn: secure aggregation for private FEderated learning. In: 2021 IEEE security and privacy workshops (SPW), pp 56\u201362","DOI":"10.1109\/SPW53761.2021.00017"},{"key":"1257_CR22","unstructured":"Geyer C, Klein T, Nabi M (2017) Differentially private federated learning: a client level perspective. arXiv1712.07557"},{"key":"1257_CR23","unstructured":"Li T, Sahu A, Zaheer M et al (2020) Federated optimization in heterogeneous networks. arXiv:1812.06127"},{"issue":"4","key":"1257_CR24","doi-asserted-by":"publisher","first-page":"e0230706","DOI":"10.1371\/journal.pone.0230706","volume":"15","author":"L Huang","year":"2020","unstructured":"Huang L, Yin Y, Fu Z, Zhang S, Deng H, Liu D (2020) Loadaboost: loss-based adaboost federated machine learning with reduced computational complexity on IID and non-IID intensive care data. PLoS One 15(4):e0230706","journal-title":"PLoS One"},{"key":"1257_CR25","unstructured":"Lin T, Kong L, Stich S, Jaggi M (2020) Ensemble distillation for robust model fusion in federated learning. arXiv2006.07242"},{"key":"1257_CR26","unstructured":"Agarwal N, Suresh A, Yu F, Kumar S, Mcmahan H (2018) cpSGD: communication-efficient and differentially-private distributed SGD. arXiv:1805.10559"},{"key":"1257_CR27","doi-asserted-by":"crossref","unstructured":"Asoodeh S, Chen W, Calmon P, Ozgur A (2021) Differentially private federated learning: an information-theoretic perspective. In: 2021 IEEE international symposium on information theory (ISIT), pp 344\u2013349","DOI":"10.1109\/ISIT45174.2021.9518124"},{"key":"1257_CR28","unstructured":"Liang Z, Wang B, Gu Q, Osher S, Yao Y (2021) Exploring private federated learning with laplacian smoothing. arXiv2005.00218"},{"key":"1257_CR29","unstructured":"McMahan H, Ramage D, Talwar K, Zhang L (2018) Learning differentially private recurrent language models. arXiv:1710.06963"},{"key":"1257_CR30","unstructured":"Malekzadeh M, Hasircioglu B, Mital N, et al (2021) Dopamine: differentially private federated learning on medical data. arXiv:2101.11693"},{"key":"1257_CR31","unstructured":"Zhu Y, Yu X, Tsai Y, et al (2020) Voting-based approaches for differentially private federated learning. arXiv:2010.04851"},{"key":"1257_CR32","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei K, Li J, Ding M et al (2020) Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans Inf Forensics Secur 15:3454\u20133469","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1257_CR33","doi-asserted-by":"publisher","first-page":"6844","DOI":"10.1109\/JIOT.2021.3115817","volume":"9","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Guan C, Chen H, Yang X, Gong W, Yang A (2022) Adaptive privacy-preserving federated learning for fault diagnosis in internet of ships. IEEE Internet Things J 9:6844\u20136854","journal-title":"IEEE Internet Things J"},{"key":"1257_CR34","unstructured":"Xie C, Long Y, Chen P, Kenthapadi K, Li B (2021) Certified robustness for free in differentially private federated learning. In: Annual conference on neural information processing systems"},{"key":"1257_CR35","unstructured":"Xie C, Chen M, Chen P, Li B (2021) CRFL: certifiably robust federated learning against backdoor attacks. In: 38th international conference on machine learning"},{"key":"1257_CR36","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/s00287-019-01205-x","volume":"42","author":"S Truex","year":"2019","unstructured":"Truex S, Baracaldo N, Anwar A et al (2019) A hybrid approach to privacy-preserving federated learning. Inf Spektrum 42:356\u2013357","journal-title":"Inf Spektrum"},{"key":"1257_CR37","first-page":"1941","volume":"20","author":"J Zhou","year":"2023","unstructured":"Zhou J, Wu N, Wang Y et al (2023) A differentially private federated learning model against poisoning attacks in edge computing. IEEE Trans Dependable Secure Comput 20:1941\u20131958","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1257_CR38","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/TII.2022.3161517","volume":"19","author":"L Cui","year":"2023","unstructured":"Cui L, Ma J, Zhou Y, Yu S (2023) Boosting accuracy of differentially private federated learning in industrial IoT with sparse responses. IEEE Trans Ind Inf 19:910\u2013920","journal-title":"IEEE Trans Ind Inf"},{"key":"1257_CR39","unstructured":"Gu X, Li M, Xiong L (2023) DP-BREM: differentially-private and byzantine-robust federated learning with client momentum. arXiv:2306.12608"},{"issue":"5","key":"1257_CR40","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/MNET.001.2200204","volume":"36","author":"Y Li","year":"2023","unstructured":"Li Y, Wang S, Chi C, Quek T (2023) Differentially private federated learning in edge networks: the perspective of noise reduction. IEEE Netw 36(5):167\u2013172","journal-title":"IEEE Netw"},{"key":"1257_CR41","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1109\/JSAC.2019.2904348","volume":"37","author":"S Wang","year":"2019","unstructured":"Wang S, Tuor T, Salonidis T, Leung K, Makaya C, He T, Chan K (2019) Adaptive federated learning in resource constrained edge computing systems. IEEE J Sel Areas Commun 37:1205\u20131221","journal-title":"IEEE J Sel Areas Commun"},{"key":"1257_CR42","unstructured":"Li X, Huan K, Yang W, Wang S, Zhang Z (2020) On the convergence of FedAvg on non-IID data. In: Eighth international conference on learning representations"},{"key":"1257_CR43","unstructured":"Vanhaesebrouck P, Bellet A, Tommasi M (2017) Decentralized collaborative learning of personalized models over networks. In: 20th international conference on artificial intelligence and statistics, vol 54, pp 509\u2013517"},{"key":"1257_CR44","doi-asserted-by":"crossref","unstructured":"Amiri S, Belloum A, Nalisnick E, Klous S, Gommans L (2022) On the impact of non-IID data on the performance and fairness of differentially private federated learning. In: 52nd annual IEEE\/IFIP international conference on dependable systems and networks workshops (DSN-W), pp 52\u201358","DOI":"10.1109\/DSN-W54100.2022.00018"},{"key":"1257_CR45","doi-asserted-by":"publisher","first-page":"101836","DOI":"10.1016\/j.inffus.2023.101836","volume":"98","author":"D Chiaro","year":"2023","unstructured":"Chiaro D, Prezioso E, Ianni M, Giampaolo F (2023) FL-enhance: a federated learning framework for balancing non-IID data with augmented and shared compressed samples. Inf Fusion 98:101836","journal-title":"Inf Fusion"},{"key":"1257_CR46","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/j.ins.2022.12.045","volume":"623","author":"M Arafeh","year":"2023","unstructured":"Arafeh M, Ould-Slimane H, Otrok H, Mourad A, Talhi C, Damiani E (2023) Data independent warmup scheme for non-IID federated learning. Inf Sci 623:342\u2013360","journal-title":"Inf Sci"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-024-01257-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-024-01257-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-024-01257-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T07:08:03Z","timestamp":1719212883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-024-01257-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,8]]},"references-count":46,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["1257"],"URL":"https:\/\/doi.org\/10.1007\/s00607-024-01257-2","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2024,5,8]]},"assertion":[{"value":"14 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}