{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:56:17Z","timestamp":1761648977743,"version":"3.37.3"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/gcwkshps52748.2021.9682084","type":"proceedings-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T21:06:05Z","timestamp":1643058365000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Privacy Preserving Federated RSRP Estimation for Future Mobile Networks"],"prefix":"10.1109","author":[{"given":"Omer","family":"Haliloglu","sequence":"first","affiliation":[]},{"given":"Elif Ustundag","family":"Soykan","sequence":"additional","affiliation":[]},{"given":"Abdulrahman","family":"Alabbasi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Stealing Machine Learning Models via Prediction APIs","year":"2016","author":"tram\u00e8r","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"article-title":"Learning Differentially Private Recurrent Language Models","year":"2018","author":"mcmahan","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW.2018.8369000"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps50303.2020.9367519"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746369"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900461"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.09.009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WCNCW49093.2021.9420006"},{"article-title":"Federated Optimization:Distributed Optimization Beyond the Datacenter","year":"2015","author":"kone?n\u00fd","key":"ref4"},{"article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","year":"2017","author":"mcmahan","key":"ref3"},{"article-title":"Dynamic Clustering in Federated Learning","year":"2020","author":"kim","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"article-title":"Exploiting Unintended Feature Leakage in Collaborative Learning","year":"2018","author":"melis","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"article-title":"Federated Learning: Strategies for Improving Communication Efficiency","year":"2017","author":"kone?n\u00fd","key":"ref2"},{"year":"0","key":"ref1","article-title":"AI & machine learning: Next gen system|Whitepaper - Ericsson"},{"article-title":"Deep Leakage from Gradients","year":"2019","author":"zhu","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120649"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.01.1900525"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2974748"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3074185"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2942179"}],"event":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2021,12,7]]},"location":"Madrid, Spain","end":{"date-parts":[[2021,12,11]]}},"container-title":["2021 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9681915\/9681831\/09682084.pdf?arnumber=9682084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:57:54Z","timestamp":1652201874000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9682084\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/gcwkshps52748.2021.9682084","relation":{},"subject":[],"published":{"date-parts":[[2021,12]]}}}