{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T16:08:47Z","timestamp":1758125327151},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Real-Time Image Proc"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11554-024-01524-7","type":"journal-article","created":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T15:02:23Z","timestamp":1723129343000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Lightweight and privacy-preserving hierarchical federated learning mechanism for artificial intelligence-generated image content"],"prefix":"10.1007","volume":"21","author":[{"given":"Bingquan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Fangling","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,8]]},"reference":[{"key":"1524_CR1","unstructured":"Cao, Y., Li, S., Liu, Y., Yan, Z., Dai, Y., Yu, P.S., Sun, L.: A comprehensive survey of ai-generated content (magic): a history of generative ai from gan to chatgpt. arXiv preprint arXiv:2303.04226 (2023)"},{"key":"1524_CR2","unstructured":"Wu, J., Gan, W., Chen, Z., Wan, S., Lin, H.: Ai-generated content (aigc): a survey. arXiv preprint arXiv:2304.06632 (2023)"},{"key":"1524_CR3","unstructured":"Xu, M. et al.: Unleashing the power of edge-cloud generative AI in mobile networks: a survey of AIGC services. arXiv:2303.16129 (2023)."},{"key":"1524_CR4","doi-asserted-by":"crossref","unstructured":"Wang, H., Kaplan, Z., Niu, D., et al.: Optimizing federated learning on non-iid data with reinforcement learning. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, pp. 1698\u20131707 (2020)","DOI":"10.1109\/INFOCOM41043.2020.9155494"},{"key":"1524_CR5","first-page":"429","volume":"2","author":"T Li","year":"2020","unstructured":"Li, T., Sahu, A.K., Zaheer, M., Sanjabi, M., Talwalkar, A., Smith, V.: Federated optimization in heterogeneous networks. Proc. Mach. Learn. Syst. 2, 429\u2013450 (2020)","journal-title":"Proc. Mach. Learn. Syst."},{"key":"1524_CR6","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1109\/OJCS.2023.3315835","volume":"4","author":"C Chen","year":"2023","unstructured":"Chen, C., Li, Y., Wu, Z., Xu, M., Wang, R., Zheng, Z.: Towards reliable utilization of AIGC: blockchain-empowered ownership verification mechanism. IEEE Open J. Comput. Soc. 4, 326\u2013337 (2023)","journal-title":"IEEE Open J. Comput. Soc."},{"issue":"3","key":"1524_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1805974.1805978","volume":"13","author":"V Ciriani","year":"2010","unstructured":"Ciriani, V., De Capitani Di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. 13(3), 1\u201333 (2010)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"1524_CR8","doi-asserted-by":"crossref","unstructured":"Abad, M. S. H., Ozfatura, E., Gunduz, D., & Ercetin, O.: Hierarchical federated learning across heterogeneous cellular networks. In: 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 8866\u20138870. IEEE (2020)","DOI":"10.1109\/ICASSP40776.2020.9054634"},{"key":"1524_CR9","doi-asserted-by":"crossref","unstructured":"Rana, O., Spyridopoulos, T., Hudson, N., Baughman, M., Chard, K., Foster, I., & Khan, A.: Hierarchical and decentralised federated learning. In: 2022 Cloud Continuum 2022. IEEE, 1\u20139 (2022)","DOI":"10.1109\/CloudContinuum57429.2022.00008"},{"key":"1524_CR10","doi-asserted-by":"crossref","unstructured":"Deng, Y., Lyu, F., Ren, J., Zhang, Y., Zhou, Y., Zhang, Y., & Yang, Y.: SHARE: Shaping data distribution at edge for communication-efficient hierarchical federated learning. In: 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 24\u201334 (2021)","DOI":"10.1109\/ICDCS51616.2021.00012"},{"key":"1524_CR11","doi-asserted-by":"crossref","unstructured":"Liu, L., Zhang, J., Song, S., & Letaief, K. B. Client-edge-cloud hierarchical federated learning. In: 2020 IEEE International Conference on Communications (ICC). IEEE, 1\u20136 (2020).","DOI":"10.1109\/ICC40277.2020.9148862"},{"issue":"1","key":"1524_CR12","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TWC.2022.3190512","volume":"22","author":"L Liu","year":"2022","unstructured":"Liu, L., Zhang, J., Song, S., Letaief, K.B.: Hierarchical federated learning with quantization: convergence analysis and system design. IEEE Trans. Wireless Commun. 22(1), 2\u201318 (2022)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"11","key":"1524_CR13","doi-asserted-by":"publisher","first-page":"7690","DOI":"10.1109\/TWC.2020.3015671","volume":"19","author":"JK Ren","year":"2020","unstructured":"Ren, J.K., He, Y.H., Wen, D.Z., et al.: Scheduling for cellular federated edge learning with importance and channel awareness. IEEE Trans. Wireless Commun. 19(11), 7690\u20137703 (2020)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"1524_CR14","doi-asserted-by":"crossref","unstructured":"Schmidt-Samoa, K., Takagi, T.: Paillier\u2019s cryptosystem modulo p2q and its applications to trapdoor commitment schemes. In: International Conference on Cryptology Malaysia Springer, Berlin, Heidelberg, pp. 296\u2013313 (2005)","DOI":"10.1007\/11554868_21"},{"issue":"6","key":"1524_CR15","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/s10207-010-0119-9","volume":"9","author":"I Damgard","year":"2010","unstructured":"Damgard, I., Jurik, M., Nielsen, J.B.: A generalization of Paillier\u2019s public-key system with applications to electronic voting. Int. J. Inf. Secur. 9(6), 371\u2013385 (2010)","journal-title":"Int. J. Inf. Secur."},{"key":"1524_CR16","unstructured":"Jost, C., Lam, H., Maximov, A. et al.: Encryption perfomance improvements of the Paillier cryptosystem. Cryptology ePrint Archive, 2015\/864, (2015)"},{"key":"1524_CR17","doi-asserted-by":"crossref","unstructured":"Ogunseyi, T. B., Bo, T.: Fast decryption algorithm for Paillier homomorphic cryptosystem. In: 2020 IEEE International Conference on Power, Intelligent Computing and Systems(ICPICS). IEEE, pp. 803\u2013806 (2020)","DOI":"10.1109\/ICPICS50287.2020.9202325"},{"key":"1524_CR18","unstructured":"Han, S., Pool, J., Tran, J., et al.: Learning both weights and connections for efficient neural network. In: Proceedings of the 28th International Conference on Neural Information Processing Systems: vol. 1. pp. 1135\u20131143 (2015)"},{"key":"1524_CR19","doi-asserted-by":"crossref","unstructured":"Chen, Y. H., Emer, J., Sze, V.: Eyeriss: a spatial architecture for energy-efficient dataflow for convolutional neural networks. In: 2016 ACM\/IEEE 43rd Annual International Symposium on Computer Architecture (ISCA). pp. 367\u2013379 (2016)","DOI":"10.1109\/ISCA.2016.40"},{"issue":"1","key":"1524_CR20","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/JSSC.2016.2616357","volume":"52","author":"YH Chen","year":"2017","unstructured":"Chen, Y.H., Krishna, T., Emer, J.S., et al.: Eyeriss: an energy-efficient reconfigurable accelerator for deep convolutional neural networks. IEEE J. Solid-State Circ. 52(1), 127\u2013138 (2017)","journal-title":"IEEE J. Solid-State Circ."},{"issue":"2","key":"1524_CR21","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1109\/JETCAS.2019.2910232","volume":"9","author":"YH Chen","year":"2019","unstructured":"Chen, Y.H., Yang, T.J., Emer, J., et al.: Eyeriss v2: a flexible accelerator for emerging deep neural networks on mobile devices. IEEE J. Emerg. Select. Topics Circ. Syst. 9(2), 292\u2013308 (2019)","journal-title":"IEEE J. Emerg. Select. Topics Circ. Syst."},{"key":"1524_CR22","doi-asserted-by":"crossref","unstructured":"Ding, X., Ding, G., Guo, Y., et al. Centripetal sgd for pruning very deep convolutional networks with complicated structure. In: Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition. pp. 4938\u20134948 (2019)","DOI":"10.1109\/CVPR.2019.00508"},{"key":"1524_CR23","doi-asserted-by":"crossref","unstructured":"He, Y., Kang, G., Dong, X., et al.: Soft filter pruning for accelerating deep convolutional neural networks. In: Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence (IJCAI). pp. 2234\u20132240 (2018)","DOI":"10.24963\/ijcai.2018\/309"}],"container-title":["Journal of Real-Time Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-024-01524-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11554-024-01524-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11554-024-01524-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T16:04:09Z","timestamp":1724774649000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11554-024-01524-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["1524"],"URL":"https:\/\/doi.org\/10.1007\/s11554-024-01524-7","relation":{},"ISSN":["1861-8200","1861-8219"],"issn-type":[{"type":"print","value":"1861-8200"},{"type":"electronic","value":"1861-8219"}],"subject":[],"published":{"date-parts":[[2024,8]]},"assertion":[{"value":"6 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"149"}}