{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T19:16:08Z","timestamp":1768850168490,"version":"3.49.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,12]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9928012","type":"proceedings-article","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T19:43:02Z","timestamp":1670960582000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["HEND-FL: Accurate Federated Learning Using Homomorphic Encryption and a New Distributed Protocol"],"prefix":"10.1109","author":[{"given":"Dehua","family":"Zhou","sequence":"first","affiliation":[{"name":"Jinan University,Department of Computer Science,Guangzhou,China"}]},{"given":"Zexiao","family":"Chen","sequence":"additional","affiliation":[{"name":"Jinan University,Department of Computer Science,Guangzhou,China"}]},{"given":"Di","family":"Wu","sequence":"additional","affiliation":[{"name":"Jilin University,College of Electronic Science and Engineering,Changchun,China"}]},{"given":"Yingwei","family":"Yu","sequence":"additional","affiliation":[{"name":"Jinan University,Department of Computer Science,Guangzhou,China"}]},{"given":"Qingqing","family":"Gan","sequence":"additional","affiliation":[{"name":"Guangdong University of Foreign Studies,Department of Cyber Security,Guangzhou,China"}]},{"given":"Botong","family":"Xu","sequence":"additional","affiliation":[{"name":"South China University of Technology,Department of Electronic Commerce,Guangzhou,China"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57048-8_6"},{"key":"ref30","article-title":"Enhanced flexibility for homomorphic encryption schemes via crt","author":"hu","year":"2012","journal-title":"Proceeding of Applied Cryptography and Network Security (ACNS)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101889"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.215"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref13","first-page":"2723","article-title":"Cerebro: A platform for multi-party cryptographic collaborative learning","author":"zheng","year":"2021","journal-title":"30th USENIX Security Symposium (USENIX Security 21)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref15","article-title":"Differentially private federated learning: A client level perspective","author":"geyer","year":"2017"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.38"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2976612"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0047"},{"key":"ref19","author":"gentry","year":"2009","journal-title":"A Fully Homomorphic Encryption Scheme"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1090\/pspum\/020\/0316385"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809723"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3131672.3131697"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2939713"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.09.015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref9","first-page":"493","article-title":"Batchcrypt: Efficient homomorphic encryption for cross-silo federated learning","author":"zhang","year":"2020","journal-title":"2020 USENIX Annual Technical Conference ( USENIX ATC 20)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427232"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref24","article-title":"Scalable anonymous group communication in the anytrust model","author":"wolinsky","year":"2012","journal-title":"Tech Rep"},{"key":"ref23","first-page":"1333","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"aono","year":"2017","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"ref26","first-page":"4","article-title":"Parallelized stochastic gradient descent","volume":"4","author":"zinkevich","year":"2010","journal-title":"NIPS"},{"key":"ref25","first-page":"4v","article-title":"Research on diffie-hellman key exchange protocol","volume":"4","author":"li","year":"2010","journal-title":"2010 2nd International Conference on Computer Engineering and Technology"}],"event":{"name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","location":"Falerna, Italy","start":{"date-parts":[[2022,9,12]]},"end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9927523\/9927699\/09928012.pdf?arnumber=9928012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T20:12:39Z","timestamp":1674504759000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9928012\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9928012","relation":{},"subject":[],"published":{"date-parts":[[2022,9,12]]}}}