{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T08:26:11Z","timestamp":1748075171731,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T00:00:00Z","timestamp":1685232000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,28]]},"DOI":"10.1109\/iccworkshops57953.2023.10283697","type":"proceedings-article","created":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T17:54:22Z","timestamp":1698083662000},"page":"843-848","source":"Crossref","is-referenced-by-count":2,"title":["Secure Federated Learning with Model Compression"],"prefix":"10.1109","author":[{"given":"Yahao","family":"Ding","sequence":"first","affiliation":[{"name":"King&#x0027;s College,London"}]},{"given":"Mohammad","family":"Shikh-Bahaei","sequence":"additional","affiliation":[{"name":"King&#x0027;s College,London"}]},{"given":"Chongwen","family":"Huang","sequence":"additional","affiliation":[{"name":"Zhejiang University"}]},{"given":"Weijie","family":"Yuan","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology"}]}],"member":"263","reference":[{"key":"ref8","article-title":"Do gradi-ent inversion attacks make federated learning unsafe?","author":"hatamizadeh","year":"2022","journal-title":"ArXiv Preprint"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01607"},{"key":"ref9","article-title":"On differential privacy for federated learning in wireless systems with multiple base stations","author":"tavangaran","year":"2022","journal-title":"ArXiv Preprint"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00919"},{"key":"ref3","article-title":"A framework for evaluating gradient leakage attacks in federated learning","author":"wei","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref6","article-title":"Federated optimization: Distributed machine learning for on-device intelligence","author":"konecny","year":"2016","journal-title":"ArXiv Preprint"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3037554"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00366"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3024629"},{"key":"ref2","article-title":"Learning differentially private recurrent language models","author":"mcmahan","year":"2017","journal-title":"ar Xiv preprint"},{"key":"ref1","article-title":"Deep leakage from gradients","volume":"32","author":"zhu","year":"2019","journal-title":"Advances in neural information processing systems"}],"event":{"name":"2023 IEEE International Conference on Communications Workshops (ICC Workshops)","start":{"date-parts":[[2023,5,28]]},"location":"Rome, Italy","end":{"date-parts":[[2023,6,1]]}},"container-title":["2023 IEEE International Conference on Communications Workshops (ICC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10283478\/10283479\/10283697.pdf?arnumber=10283697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,13]],"date-time":"2023-11-13T18:59:03Z","timestamp":1699901943000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10283697\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,28]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/iccworkshops57953.2023.10283697","relation":{},"subject":[],"published":{"date-parts":[[2023,5,28]]}}}