{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T05:09:44Z","timestamp":1778821784030,"version":"3.51.4"},"reference-count":46,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.comcom.2026.108551","type":"journal-article","created":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:19:54Z","timestamp":1778084394000},"page":"108551","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["GP-AdaFL: Neural gradient forecasting guided adaptive DP with bilevel noise-weight optimization for heterogeneous FL"],"prefix":"10.1016","volume":"254","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6291-4362","authenticated-orcid":false,"given":"Weibai","family":"Zhou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3784-9243","authenticated-orcid":false,"given":"Huitian","family":"He","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6156-4777","authenticated-orcid":false,"given":"JinXian","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-6440-0865","authenticated-orcid":false,"given":"Rong","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dan","family":"Huan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2026.108551_b1","series-title":"Empirical analysis of privacy-fairness-accuracy trade-offs in federated learning: A step towards responsible AI","author":"Wasif","year":"2025"},{"key":"10.1016\/j.comcom.2026.108551_b2","series-title":"Clients collaborate: Flexible differentially private federated learning with guaranteed improvement of utility-privacy trade-off","author":"Li","year":"2024"},{"key":"10.1016\/j.comcom.2026.108551_b3","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2025.113872","article-title":"Communication-privacy-accuracy trade-offs in federated learning for non-IID data with shuffle model","author":"Di","year":"2025","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.comcom.2026.108551_b4","series-title":"Non-IID data in federated learning: A survey with taxonomy, metrics, methods, frameworks and future directions","author":"Gutierrez","year":"2024"},{"issue":"1\u20132","key":"10.1016\/j.comcom.2026.108551_b5","first-page":"1","article-title":"Advances and open problems in federated learning","volume":"14","author":"Kairouz","year":"2021","journal-title":"Found. Trends\u00ae Mach. Learn."},{"key":"10.1016\/j.comcom.2026.108551_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.artmed.2024.102936","article-title":"Tackling heterogeneity in medical federated learning via aligning vision transformers","volume":"155","author":"Darzi","year":"2024","journal-title":"Artif. Intell. Med."},{"key":"10.1016\/j.comcom.2026.108551_b7","first-page":"1","article-title":"Effective non-IID degree estimation for robust federated learning in healthcare datasets","author":"Chen","year":"2025","journal-title":"J. Heal. Informatics Res."},{"issue":"9","key":"10.1016\/j.comcom.2026.108551_b8","doi-asserted-by":"crossref","first-page":"4635","DOI":"10.1109\/JBHI.2022.3185956","article-title":"Splitavg: A heterogeneity-aware federated deep learning method for medical imaging","volume":"26","author":"Zhang","year":"2022","journal-title":"IEEE J. Biomed. Health Informatics"},{"key":"10.1016\/j.comcom.2026.108551_b9","article-title":"Tackling the Non-IID issue in heterogeneous federated learning by gradient harmonization","author":"Zhang","year":"2024","journal-title":"IEEE Signal Process. Lett."},{"key":"10.1016\/j.comcom.2026.108551_b10","series-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2018"},{"issue":"6","key":"10.1016\/j.comcom.2026.108551_b11","doi-asserted-by":"crossref","first-page":"2356","DOI":"10.1007\/s12083-019-00869-2","article-title":"Adaptive privacy-preserving federated learning","volume":"13","author":"Liu","year":"2020","journal-title":"Peer-To-Peer Netw. Appl."},{"key":"10.1016\/j.comcom.2026.108551_b12","series-title":"On the convergence of fedavg on non-IID data","author":"Li","year":"2019"},{"key":"10.1016\/j.comcom.2026.108551_b13","doi-asserted-by":"crossref","first-page":"22359","DOI":"10.1109\/ACCESS.2022.3151670","article-title":"Differential privacy for deep and federated learning: A survey","volume":"10","author":"El Ouadrhiri","year":"2022","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2026.108551_b14","series-title":"Private and communication-efficient federated learning based on differentially private sketches","author":"Zhang","year":"2024"},{"key":"10.1016\/j.comcom.2026.108551_b15","series-title":"2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","first-page":"656","article-title":"Adap dp-fl: Differentially private federated learning with adaptive noise","author":"Fu","year":"2022"},{"key":"10.1016\/j.comcom.2026.108551_b16","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/TIFS.2023.3318944","article-title":"Differentially private federated learning with an adaptive noise mechanism","volume":"19","author":"Xue","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comcom.2026.108551_b17","series-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume":"vol. 54","author":"McMahan","year":"2017"},{"issue":"11","key":"10.1016\/j.comcom.2026.108551_b18","doi-asserted-by":"crossref","first-page":"277","DOI":"10.3390\/computers13110277","article-title":"Balancing privacy and performance: A differential privacy approach in federated learning","volume":"13","author":"Tayyeh","year":"2024","journal-title":"Computers"},{"key":"10.1016\/j.comcom.2026.108551_b19","series-title":"2024 IEEE 63rd Conference on Decision and Control","first-page":"3140","article-title":"Differentially private online federated learning with correlated noise","author":"Zhang","year":"2024"},{"key":"10.1016\/j.comcom.2026.108551_b20","series-title":"International Conference on Machine Learning","first-page":"19767","article-title":"Revisiting weighted aggregation in federated learning with neural networks","volume":"Vol. 202","author":"Li","year":"2023"},{"key":"10.1016\/j.comcom.2026.108551_b21","series-title":"Effects of aggregation methodology on uncertain spatiotemporal data","author":"Hornberger","year":"2019"},{"key":"10.1016\/j.comcom.2026.108551_b22","series-title":"Secure deep graph generation with link differential privacy","author":"Yang","year":"2020"},{"key":"10.1016\/j.comcom.2026.108551_b23","series-title":"IEEE INFOCOM 2024-IEEE Conference on Computer Communications","first-page":"2448","article-title":"Towards efficient asynchronous federated learning in heterogeneous edge environments","author":"Zhou","year":"2024"},{"key":"10.1016\/j.comcom.2026.108551_b24","series-title":"DRAG: Divergence-based adaptive aggregation in federated learning on non-IID data","author":"Zhu","year":"2023"},{"key":"10.1016\/j.comcom.2026.108551_b25","first-page":"33856","article-title":"A randomized approach to tight privacy accounting","volume":"36","author":"Wang","year":"2023","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.comcom.2026.108551_b26","series-title":"Adversarial sample-based approach for tighter privacy auditing in final model-only scenarios","author":"Yoon","year":"2024"},{"issue":"6","key":"10.1016\/j.comcom.2026.108551_b27","article-title":"Data Protection Impact Assessment: A tool for accountability and the unclarified concept of \u2019high risk\u2019in the General Data Protection Regulation","volume":"35","author":"Demetzou","year":"2019","journal-title":"Comput. Law & Secur. Rev."},{"key":"10.1016\/j.comcom.2026.108551_b28","series-title":"Proceedings of the 2nd International Workshop on Multimedia Privacy and Security","first-page":"88","article-title":"Are we there yet? Understanding the challenges faced in complying with the general data protection regulation (GDPR)","author":"Sirur","year":"2018"},{"issue":"16","key":"10.1016\/j.comcom.2026.108551_b29","article-title":"Research on seismic phase recognition method based on Bi-LSTM network","volume":"14","author":"Wang","year":"2024","journal-title":"Appl. Sci."},{"key":"10.1016\/j.comcom.2026.108551_b30","article-title":"The effect of hydrogen-rich water on patients with type 2 diabetes mellitus: A systematic review and meta-analysis of randomized controlled trials","author":"Li","year":"2024","journal-title":"Res. Sq."},{"issue":"1","key":"10.1016\/j.comcom.2026.108551_b31","doi-asserted-by":"crossref","first-page":"1925","DOI":"10.1038\/s41598-024-52464-y","article-title":"Application of a long short-term memory neural network algorithm fused with Kalman filter in UWB indoor positioning","volume":"14","author":"Tian","year":"2024","journal-title":"Sci. Rep."},{"key":"10.1016\/j.comcom.2026.108551_b32","series-title":"Proceedings of the 2023 8th International Conference on Machine Learning Technologies","first-page":"230","article-title":"A noise suppression of LSTM algorithm combined with Kalman filter for agriculture automation","author":"Barry","year":"2023"},{"key":"10.1016\/j.comcom.2026.108551_b33","doi-asserted-by":"crossref","first-page":"4422","DOI":"10.1109\/TIFS.2023.3293961","article-title":"Differentially private deep learning with dynamic privacy budget allocation and adaptive optimization","volume":"18","author":"Chen","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.comcom.2026.108551_b34","series-title":"Proceedings of Machine Learning and Systems","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume":"Vol. 2","author":"Li","year":"2020"},{"key":"10.1016\/j.comcom.2026.108551_b35","series-title":"Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy","first-page":"101","article-title":"BlockFLA: Accountable federated learning via hybrid blockchain architecture","author":"Desai","year":"2021"},{"key":"10.1016\/j.comcom.2026.108551_b36","series-title":"Dyn-D2P: Dynamic differentially private decentralized learning with provable utility guarantee","author":"Zhu","year":"2025"},{"key":"10.1016\/j.comcom.2026.108551_b37","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.ins.2022.11.124","article-title":"SVeriFL: Successive verifiable federated learning with privacy-preserving","volume":"622","author":"Gao","year":"2023","journal-title":"Inform. Sci."},{"key":"10.1016\/j.comcom.2026.108551_b38","series-title":"2018 IEEE Symposium on Security and Privacy","first-page":"315","article-title":"Bulletproofs: Short proofs for confidential transactions and more","author":"B\u00fcnz","year":"2018"},{"issue":"11","key":"10.1016\/j.comcom.2026.108551_b39","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"10.1016\/j.comcom.2026.108551_b40","series-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1179","article-title":"Fast multiparty threshold ECDSA with fast trustless setup","author":"Gennaro","year":"2018"},{"issue":"2","key":"10.1016\/j.comcom.2026.108551_b41","first-page":"52","article-title":"Differential privacy at the edge: A federated learning framework for GDPR-compliant TinyML deployments","volume":"26","author":"Pakina","year":"2024","journal-title":"IOSR J. Comput. Eng."},{"key":"10.1016\/j.comcom.2026.108551_b42","doi-asserted-by":"crossref","unstructured":"Y. Shi, Y. Liu, K. Wei, L. Shen, X. Wang, D. Tao, Make Landscape Flatter in Differentially Private Federated Learning, in: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR, 2023, pp. 24552\u201324562.","DOI":"10.1109\/CVPR52729.2023.02352"},{"key":"10.1016\/j.comcom.2026.108551_b43","first-page":"2351","article-title":"Ensemble distillation for robust model fusion in federated learning","volume":"33","author":"Lin","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"issue":"23","key":"10.1016\/j.comcom.2026.108551_b44","doi-asserted-by":"crossref","first-page":"50682","DOI":"10.1109\/JIOT.2025.3611410","article-title":"ADPFL: Adaptive differential privacy-enhanced federated learning","volume":"12","author":"Xu","year":"2025","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comcom.2026.108551_b45","series-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","first-page":"1175","article-title":"Practical secure aggregation for privacy-preserving machine learning","author":"Bonawitz","year":"2017"},{"key":"10.1016\/j.comcom.2026.108551_b46","series-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen","year":"1988"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366426001416?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366426001416?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T04:27:59Z","timestamp":1778819279000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366426001416"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":46,"alternative-id":["S0140366426001416"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2026.108551","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"GP-AdaFL: Neural gradient forecasting guided adaptive DP with bilevel noise-weight optimization for heterogeneous FL","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2026.108551","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"108551"}}