{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T11:49:27Z","timestamp":1773229767815,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T00:00:00Z","timestamp":1767657600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T00:00:00Z","timestamp":1770336000000},"content-version":"vor","delay-in-days":31,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172123"],"award-info":[{"award-number":["62172123"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017366","name":"Key Research and Development Program of Heilongjiang","doi-asserted-by":"crossref","award":["2022ZX01A36"],"award-info":[{"award-number":["2022ZX01A36"]}],"id":[{"id":"10.13039\/100017366","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. King Saud Univ. Comput. Inf. Sci."],"published-print":{"date-parts":[[2026,3]]},"DOI":"10.1007\/s44443-025-00397-5","type":"journal-article","created":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T09:28:39Z","timestamp":1767691719000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["AdaCOS: adaptive differential privacy shuffle model based on cosine similarity"],"prefix":"10.1007","volume":"38","author":[{"given":"Zi","family":"Ye","sequence":"first","affiliation":[]},{"given":"Guangyao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Ziming","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,6]]},"reference":[{"key":"397_CR1","first-page":"17455","volume":"34","author":"G Andrew","year":"2021","unstructured":"Andrew G, Thakkar O, McMahan B, Ramaswamy S (2021) Differentially private learning with adaptive clipping. Adv Neural Inf Process Syst 34:17455\u201317466","journal-title":"Adv Neural Inf Process Syst"},{"key":"397_CR2","first-page":"4623","volume":"33","author":"B Balle","year":"2020","unstructured":"Balle B, Kairouz P, McMahan B, Thakkar O, Guha Thakurta A (2020) Privacy amplification via random check-ins. Adv Neural Inf Process Syst 33:4623\u20134634","journal-title":"Adv Neural Inf Process Syst"},{"key":"397_CR3","doi-asserted-by":"crossref","unstructured":"Balle B, Bell J, Gasc\u00f3n A, Nissim K (2019) The privacy blanket of the shuffle model. In: Advances in Cryptology\u2013CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18\u201322, 2019, Proceedings, Part II 39, Springer, pages 638\u2013667","DOI":"10.1007\/978-3-030-26951-7_22"},{"key":"397_CR4","doi-asserted-by":"crossref","unstructured":"Balle B, Bell J, Gasc\u00f3n A, Nissim K (2020) Private summation in the multi-message shuffle model. In: Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, pages 657\u2013676","DOI":"10.1145\/3372297.3417242"},{"key":"397_CR5","doi-asserted-by":"crossref","unstructured":"Balle B, Bell J, Gasc\u00f3n A, Nissim K (2020) Private summation in the multi-message shuffle model. In: Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, pages 657\u2013676","DOI":"10.1145\/3372297.3417242"},{"key":"397_CR6","doi-asserted-by":"crossref","unstructured":"Bittau A, Erlingsson \u00da, Maniatis P, Mironov I, Raghunathan A, Lie D, Rudominer M, Kode U, Tinnes J, Seefeld B (2017) Prochlo: Strong privacy for analytics in the crowd. In: Proceedings of the 26th symposium on operating systems principles, pages 441\u2013459","DOI":"10.1145\/3132747.3132769"},{"key":"397_CR7","doi-asserted-by":"crossref","unstructured":"Cheu A (2022) Differential privacy in the shuffle model: A survey of separations","DOI":"10.1109\/SP46214.2022.9833614"},{"key":"397_CR8","doi-asserted-by":"crossref","unstructured":"Cheu A, Smith A, Ullman J, Zeber D, Zhilyaev M (2019) Distributed differential privacy via shuffling. In: Advances in Cryptology\u2013EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19\u201323, 2019, Proceedings, Part I 38, Springer, pages 375\u2013403","DOI":"10.1007\/978-3-030-17653-2_13"},{"key":"397_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming: 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10\u201314, 2006, Proceedings, Part II","author":"C Dwork","year":"2006","unstructured":"Dwork C (2006) Differential privacy. In: Bugliesi M, Preneel B, Sassone V, Wegener I (eds) Automata, Languages and Programming: 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10\u201314, 2006, Proceedings, Part II, vol 4052. Lecture Notes in Computer Science. Springer, pp 1\u201312"},{"key":"397_CR10","doi-asserted-by":"crossref","unstructured":"Dwork C, Roth A et\u00a0al (2014) The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9(3\u20134):211\u2013407","DOI":"10.1561\/0400000042"},{"key":"397_CR11","unstructured":"Erlingsson \u00da, Feldman V, Mironov I, Raghunathan A, Song S, Talwar K, Thakurta A (2020) Encode, shuffle, analyze privacy revisited: Formalizations and empirical evaluation"},{"key":"397_CR12","doi-asserted-by":"crossref","unstructured":"Erlingsson \u00da, Feldman V, Mironov I, Raghunathan A, Talwar K, Thakurta A (2019) Amplification by shuffling: From local to central differential privacy via anonymity. In: Proceedings of the thirtieth annual ACM-SIAM symposium on discrete algorithms, SIAM, pages 2468\u20132479","DOI":"10.1137\/1.9781611975482.151"},{"key":"397_CR13","unstructured":"Geyer RC, Klein T, Nabi M (2018) Differentially private federated learning: A client level perspective"},{"key":"397_CR14","doi-asserted-by":"crossref","unstructured":"Ghazi B, Golowich N, Kumar R, Manurangsi P, Pagh R, Velingker A (2020) Pure differentially private summation from anonymous messages","DOI":"10.1007\/978-3-030-45724-2_27"},{"key":"397_CR15","unstructured":"Ghazi B, Pagh R, Velingker A (2019) Scalable and differentially private distributed aggregation in the shuffled model"},{"key":"397_CR16","doi-asserted-by":"crossref","unstructured":"Hassibi B, Stork DG, Wolff GJ (1993) Optimal brain surgeon and general network pruning. In: IEEE international conference on neural networks, IEEE, pages 293\u2013299","DOI":"10.1109\/ICNN.1993.298572"},{"key":"397_CR17","unstructured":"Hsu TM, Qi H, Brown M (2019) Measuring the effects of non-identical data distribution for federated visual classification. arXiv:1909.06335"},{"issue":"8","key":"397_CR18","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1177\/03019233241265194","volume":"51","author":"B Jin","year":"2024","unstructured":"Jin B, Xu X (2024) Forecasts of thermal coal prices through gaussian process regressions. Ironmaking Steelmaking 51(8):819\u2013834","journal-title":"Ironmaking Steelmaking"},{"key":"397_CR19","doi-asserted-by":"crossref","unstructured":"Jin B, Xu X (2025) China commodity price index (ccpi) forecasting via the neural network. Int J Financial Eng pages 1\u201327","DOI":"10.1142\/S2424786325500033"},{"key":"397_CR20","doi-asserted-by":"crossref","unstructured":"Jin B, Xu X, Zhang Y (2025) Peanut oil price change forecasts through the neural network. foresight 27(3):595\u2013612","DOI":"10.1108\/FS-01-2023-0016"},{"key":"397_CR21","unstructured":"LeCun Y, Denker J, Solla S (1989) Optimal brain damage. Adv Neural Inf Process Syst 2"},{"key":"397_CR22","unstructured":"Lee N, Ajanthan T, Torr PHS (2019) Snip: Single-shot network pruning based on connection sensitivity"},{"issue":"4","key":"397_CR23","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1364\/AO.445975","volume":"61","author":"E Li","year":"2022","unstructured":"Li E, Jiang M, Li D, Wang R, Kang X, Wang T, Yan X, Liu B, Ren Z (2022) All-optical ti3c2tx modulator based on a sandwich structure. Appl Optics 61(4):925\u2013930","journal-title":"Appl Optics"},{"key":"397_CR24","doi-asserted-by":"crossref","unstructured":"Li X, Liu W, Feng H, Huang K, Hu Y, Liu J, Ren K, Qin Z (2023) Privacy enhancement via dummy points in the shuffle model. IEEE Trans Dependable Secure Comput","DOI":"10.1109\/TDSC.2023.3263162"},{"key":"397_CR25","doi-asserted-by":"publisher","first-page":"8688","DOI":"10.1609\/aaai.v35i10.17053","volume":"35","author":"R Liu","year":"2021","unstructured":"Liu R, Cao Y, Chen H, Guo R, Yoshikawa M (2021) Flame: Differentially private federated learning in the shuffle model. Proceedings of the AAAI conference on artificial intelligence 35:8688\u20138696","journal-title":"Proceedings of the AAAI conference on artificial intelligence"},{"key":"397_CR26","doi-asserted-by":"crossref","unstructured":"Liu R, Cao Y, Yoshikawa M, Chen H (2020) Fedsel: Federated sgd under local differential privacy with top-k dimension selection. In: Database systems for advanced applications: 25th international conference, DASFAA 2020, Jeju, South Korea, September 24\u201327, 2020, Proceedings, Part I 25, Springer, pages 485\u2013501","DOI":"10.1007\/978-3-030-59410-7_33"},{"key":"397_CR27","doi-asserted-by":"crossref","unstructured":"Liu Y, Liu Y, Xiong L, Gu Y, Chen H (2024) Enhanced privacy bound for shuffle model with personalized privacy. In: Proceedings of the 33rd ACM international conference on information and knowledge management, pages 3907\u20133911","DOI":"10.1145\/3627673.3679911"},{"key":"397_CR28","unstructured":"McMahan HB, Ramage D, Talwar K, Zhang L (2018) Learning differentially private recurrent language models (2018)"},{"key":"397_CR29","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, pages 1273\u20131282. PMLR"},{"key":"397_CR30","unstructured":"Molchanov P, Tyree S, Karras T, Aila T, Kautz J (2016) Pruning convolutional neural networks for resource efficient transfer learning. CoRR"},{"key":"397_CR31","doi-asserted-by":"crossref","unstructured":"Nasr M, Shokri R, Houmansadr A (2019) Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. In: 2019 IEEE symposium on security and privacy (SP), IEEE, pages 739\u2013753","DOI":"10.1109\/SP.2019.00065"},{"key":"397_CR32","doi-asserted-by":"publisher","first-page":"63280","DOI":"10.1109\/ACCESS.2022.3182659","volume":"10","author":"S Vadera","year":"2022","unstructured":"Vadera S, Ameen S (2022) Methods for pruning deep neural networks. IEEE Access 10:63280\u201363300","journal-title":"IEEE Access"},{"key":"397_CR33","unstructured":"Wallach HM, Larochelle H, Beygelzimer A, d\u2019Alch\u00e9-Buc F, Fox EB, Garnett R (2019) Advances in neural information processing systems 32: Annual conference on neural information processing systems 2019, neurips 2019, 8-14 december 2019, vancouver, bc, canada, 2019. https:\/\/proceedings.neurips.cc\/paper"},{"key":"397_CR34","doi-asserted-by":"crossref","unstructured":"Wang N, Xiao X, Yang Y, Zhao J, Hui SC, Shin H, Shin J, Yu G (2019) Collecting and analyzing multidimensional data with local differential privacy. In: 2019 IEEE 35th International conference on data engineering (ICDE), IEEE, pages 638\u2013649","DOI":"10.1109\/ICDE.2019.00063"},{"key":"397_CR35","unstructured":"Wang Z, Yu X, Huang Q, Gong Y (2024) An adaptive differential privacy method based on federated learning"},{"key":"397_CR36","doi-asserted-by":"publisher","first-page":"10444","DOI":"10.1609\/aaai.v37i9.26242","volume":"37","author":"T Xia","year":"2023","unstructured":"Xia T, Shen S, Yao S, Fu X, Xu K, Xu X, Fu X (2023) Differentially private learning with per-sample adaptive clipping. Proceedings of the AAAI conference on artificial intelligence 37:10444\u201310452","journal-title":"Proceedings of the AAAI conference on artificial intelligence"},{"issue":"4","key":"397_CR37","doi-asserted-by":"publisher","first-page":"1297","DOI":"10.1002\/ajae.12041","volume":"102","author":"X Xu","year":"2020","unstructured":"Xu X (2020) Corn cash price forecasting. Am J Agric Econ 102(4):1297\u20131320","journal-title":"Am J Agric Econ"},{"key":"397_CR38","volume":"5","author":"X Xu","year":"2021","unstructured":"Xu X, Zhang Y (2021) Individual time series and composite forecasting of the chinese stock index. Mach Learn Appl 5:100035","journal-title":"Mach Learn Appl"},{"key":"397_CR39","doi-asserted-by":"crossref","unstructured":"Xue R, Xue K, Zhu B, Luo X, Zhang T, Sun Q, Lu J (2023) Differentially private federated learning with an adaptive noise mechanism. IEEE Trans Inf Forensics Sec","DOI":"10.1109\/TIFS.2023.3318944"},{"key":"397_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119186","volume":"642","author":"Q Yang","year":"2023","unstructured":"Yang Q, Du X, Liu A, Wang N, Wang W, Wu X (2023) Adastopk: Adaptive federated shuffle model based on differential privacy. Inf Sci 642:119186","journal-title":"Inf Sci"},{"key":"397_CR41","unstructured":"Ye J, Lu X, Lin Z, Wang JZ (2018) Rethinking the smaller-norm-less-informative assumption in channel pruning of convolution layers"}],"container-title":["Journal of King Saud University Computer and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s44443-025-00397-5","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00397-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s44443-025-00397-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:39:41Z","timestamp":1773153581000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s44443-025-00397-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,6]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,3]]}},"alternative-id":["397"],"URL":"https:\/\/doi.org\/10.1007\/s44443-025-00397-5","relation":{},"ISSN":["1319-1578","2213-1248"],"issn-type":[{"value":"1319-1578","type":"print"},{"value":"2213-1248","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,6]]},"assertion":[{"value":"9 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 November 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"54"}}