{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T09:33:14Z","timestamp":1773999194638,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/globecom59602.2025.11432762","type":"proceedings-article","created":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:04:01Z","timestamp":1773950641000},"page":"1549-1554","source":"Crossref","is-referenced-by-count":0,"title":["Distance-Aware Secure Federated Learning against Model Theft and Heterogeneous Data for Communication and Information Systems"],"prefix":"10.1109","author":[{"given":"Jinhua","family":"Chen","sequence":"first","affiliation":[{"name":"Hosei University,Graduate School of Science and Engineering,Tokyo,Japan,184-8584"}]},{"given":"Yuning","family":"Qiu","sequence":"additional","affiliation":[{"name":"RIKEN Center for Advanced Intelligence Project(AIP),Tokyo,Japan,103-0027"}]},{"given":"Shilong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hosei University,Graduate School of Science and Engineering,Tokyo,Japan,184-8584"}]},{"given":"Tong","family":"Liu","sequence":"additional","affiliation":[{"name":"Hosei University,Graduate School of Science and Engineering,Tokyo,Japan,184-8584"}]},{"given":"Qibin","family":"Zhao","sequence":"additional","affiliation":[{"name":"RIKEN Center for Advanced Intelligence Project(AIP),Tokyo,Japan,103-0027"}]},{"given":"Chinmay","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"Kalinga Institute of Industrial Technology,School of Electronics Engineering,Bhubaneswar,India"}]},{"given":"Keping","family":"Yu","sequence":"additional","affiliation":[{"name":"Hosei University,Graduate School of Science and Engineering,Tokyo,Japan,184-8584"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2025.3575623"},{"key":"ref2","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Stat. (AISTATS)","volume":"54","author":"McMahan"},{"key":"ref3","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. 3rd Conf. Mach. Learn. Syst. (MLSys)","author":"Li"},{"key":"ref4","first-page":"39879","article-title":"FedDisco: Federated learning with discrepancy-aware collaboration","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","volume":"202","author":"Ye"},{"key":"ref5","article-title":"Self-driven entropy aggregation for Byzantine-robust heterogeneous federated learning","volume-title":"Proc. 41st Int. Conf. Mach. Learn. (ICML)","author":"Huang"},{"key":"ref6","first-page":"119","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","author":"Blanchard"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2022.3153135"},{"key":"ref8","article-title":"Can you really backdoor federated learning?","volume":"abs\/1911.07963","author":"Sun","year":"2019","journal-title":"CoRR"},{"key":"ref9","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst. (NeurIPS)","volume":"33","author":"Wang"},{"key":"ref10","article-title":"Balancing similarity and complementarity for federated learning","volume-title":"Proc. 41st Int. Conf. Mach. Learn. (ICML)","author":"Yan"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833672"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.23325"},{"key":"ref13","article-title":"Privacy leakage on DNNs: A survey of model inversion attacks and defenses","volume":"abs\/2402.04013","author":"Fang","year":"2024","journal-title":"CoRR"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref15","article-title":"Local SGD converges fast and communicates little","volume-title":"Proc. 7th Int. Conf. Learn. Represent. (ICLR)","author":"Stich"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.52202\/075280-0100"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.01566"}],"event":{"name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","location":"Taipei, Taiwan","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["GLOBECOM 2025 - 2025 IEEE Global Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11431620\/11431622\/11432762.pdf?arnumber=11432762","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T05:58:53Z","timestamp":1773986333000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11432762\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/globecom59602.2025.11432762","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}