{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T22:31:38Z","timestamp":1769034698858,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T00:00:00Z","timestamp":1763078400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,14]]},"DOI":"10.1109\/cloudcom67567.2025.11331458","type":"proceedings-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T20:37:16Z","timestamp":1768941436000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["A Federated Diffusion Framework for Privacy-Preserving Sleep Monitoring in Cloud-Edge Environments"],"prefix":"10.1109","author":[{"given":"Jianbo","family":"Zheng","sequence":"first","affiliation":[{"name":"Artificial Intelligence Research Institute, ShenZhen MSU-BIT University,Shenzhen,China"}]},{"given":"Jiayi","family":"Qu","sequence":"additional","affiliation":[{"name":"ShenZhen MSU-BIT University,Faculty of computational mathematics and cybernetics,Shenzhen,China"}]},{"given":"Tingting","family":"Lin","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology Hospital,Electrophysiology Department,Shenzhen,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsmc.2022.03.003"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.7249\/rb9962"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1053\/smrv.2002.0186"},{"key":"ref4","first-page":"843","article-title":"Sleep monitoring: Wearables and clinical devices","volume":"12","author":"Kwon","year":"2020","journal-title":"Nature and Science of Sleep"},{"key":"ref5","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS)","author":"McMahan","year":"2017"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref7","article-title":"Diffusion models beat gans on image synthesis","volume-title":"Advances in Neural Information Processing Systems (NeurIPS)","author":"Dhariwal","year":"2021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.09.013"},{"key":"ref9","volume-title":"Gan augmentation: Augmenting training data using generative adversarial networks","author":"Bowles","year":"2018"},{"issue":"222","key":"ref10","first-page":"1","article-title":"Variational autoencoder for semi-supervised text classification in health-related social media","volume":"19","author":"Xu","year":"2019","journal-title":"BMC Medical Informatics and Decision Making"},{"key":"ref11","article-title":"Time-series generative adversarial networks","volume-title":"Advances in Neural Information Processing Systems (NeurIPS)","author":"Yoon","year":"2019"},{"key":"ref12","volume-title":"Synthesis of realistic ecg using generative adversarial networks","author":"Delaney"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/biology9120441"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01566"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/324"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref18","first-page":"3","article-title":"Privacy-preserving deep learning via homomorphic encryption","volume-title":"Proceedings of the 2018 IEEE International Conference on Information and Communications Security (ICICS)","author":"Phong","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/10.867928"}],"event":{"name":"2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)","location":"Shenzhen, China","start":{"date-parts":[[2025,11,14]]},"end":{"date-parts":[[2025,11,16]]}},"container-title":["2025 lEEE International Conference on Cloud Computing Technology and Science (CloudCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11330195\/11331311\/11331458.pdf?arnumber=11331458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:42:14Z","timestamp":1768981334000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11331458\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,14]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/cloudcom67567.2025.11331458","relation":{},"subject":[],"published":{"date-parts":[[2025,11,14]]}}}