{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T23:03:33Z","timestamp":1770332613496,"version":"3.49.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,4]],"date-time":"2022-12-04T00:00:00Z","timestamp":1670112000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["U20A20175,U1808207"],"award-info":[{"award-number":["U20A20175,U1808207"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,4]]},"DOI":"10.1109\/globecom48099.2022.10000793","type":"proceedings-article","created":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T22:24:18Z","timestamp":1673475858000},"page":"4872-4877","source":"Crossref","is-referenced-by-count":11,"title":["Personalized Privacy-Preserving Federated Learning: Optimized Trade-off Between Utility and Privacy"],"prefix":"10.1109","author":[{"given":"Jinhao","family":"Zhou","sequence":"first","affiliation":[{"name":"Xi&#x0027;an Jiaotong University,School of Cyber Science and Engineering,China"}]},{"given":"Zhou","family":"Su","sequence":"additional","affiliation":[{"name":"Xi&#x0027;an Jiaotong University,School of Cyber Science and Engineering,China"}]},{"given":"Jianbing","family":"Ni","sequence":"additional","affiliation":[{"name":"Queen&#x0027;s University,Department of Electrical and Computer Engineering,Kingston,Ontario,Canada"}]},{"given":"Yuntao","family":"Wang","sequence":"additional","affiliation":[{"name":"Xi&#x0027;an Jiaotong University,School of Cyber Science and Engineering,China"}]},{"given":"Yanghe","family":"Pan","sequence":"additional","affiliation":[{"name":"Xi&#x0027;an Jiaotong University,School of Cyber Science and Engineering,China"}]},{"given":"Rui","family":"Xing","sequence":"additional","affiliation":[{"name":"Xi&#x0027;an Jiaotong University,School of Cyber Science and Engineering,China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-Efficient Learning of Deep Networks from Decentral-ized Data","author":"McMahan","year":"2017","journal-title":"AISTATS"},{"key":"ref2","first-page":"513","article-title":"AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning","volume-title":"USENIX Security Symposium","author":"Jia"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref4","first-page":"1291","article-title":"Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning","volume-title":"USENIX Security Symposium","author":"Salem"},{"key":"ref5","volume-title":"How to backdoor federated learning","author":"Bagdasaryan","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3022911"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3159248"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2021.3138928"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3014385"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref13","article-title":"Learning differentially private language models without losing accuracy","volume-title":"CoRR","author":"McMahan","year":"2017"},{"key":"ref14","volume-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref20","volume-title":"Technical report","author":"Zhou","year":"2022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2022.3140796"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23119"}],"event":{"name":"GLOBECOM 2022 - 2022 IEEE Global Communications Conference","location":"Rio de Janeiro, Brazil","start":{"date-parts":[[2022,12,4]]},"end":{"date-parts":[[2022,12,8]]}},"container-title":["GLOBECOM 2022 - 2022 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10000063\/10000593\/10000793.pdf?arnumber=10000793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T03:07:58Z","timestamp":1707448078000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10000793\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,4]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/globecom48099.2022.10000793","relation":{},"subject":[],"published":{"date-parts":[[2022,12,4]]}}}