{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:47:05Z","timestamp":1775746025962,"version":"3.50.1"},"reference-count":69,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB2904600"],"award-info":[{"award-number":["2023YFB2904600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172007"],"award-info":[{"award-number":["62172007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1109\/icnp61940.2024.10858511","type":"proceedings-article","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T18:29:45Z","timestamp":1738693785000},"page":"1-12","source":"Crossref","is-referenced-by-count":1,"title":["FedSSA: Reducing Overhead of Additive Cryptographic Methods in Federated Learning With Sketch"],"prefix":"10.1109","author":[{"given":"Zirui","family":"Ou","sequence":"first","affiliation":[{"name":"School of Computer Science, Peking University"}]},{"given":"Shujie","family":"Han","sequence":"additional","affiliation":[{"name":"School of Computer Science, Northwestern Polytechnical University"}]},{"given":"Qihuan","family":"Zeng","sequence":"additional","affiliation":[{"name":"Peking University"}]},{"given":"Qun","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Peking University"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Federated learning for mobile keyboard prediction","author":"Hard","year":"2018","journal-title":"arXiv preprint"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s41666-020-00082-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_17"},{"key":"ref4","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. of AISTAT","author":"McMahan","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref6","first-page":"16937","article-title":"Inverting gradients-how easy is it to break privacy in federated learning?","volume-title":"Proc. of NeurIPS","volume":"33","author":"Geiping","year":"2020"},{"key":"ref7","first-page":"7232","article-title":"Evaluating gradient inversion attacks and defenses in federated learning","volume-title":"Proc. of NeurIPS","volume":"34","author":"Huang","year":"2021"},{"key":"ref8","article-title":"Data leakage in federated averaging","author":"Dimitrov","year":"2022","journal-title":"arXiv preprint"},{"issue":"6","key":"ref9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3460427","article-title":"A comprehensive survey of privacypreserving federated learning: A taxonomy, review, and future directions","volume":"54","author":"Yin","year":"2021","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179468"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417885"},{"key":"ref14","first-page":"694","article-title":"Lightsecagg: a lightweight and versatile design for secure aggregation in federated learning","volume-title":"Proc. of MLSys","volume":"4","author":"So","year":"2022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref16","first-page":"493","article-title":"Batchcrypt: Efficient homomorphic encryption for cross-silo federated learning","volume-title":"Proc. of USENIX ATC","author":"Zhang","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF44664.2019.9049066"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2014-274"},{"key":"ref19","article-title":"Deep gradient compression: Reducing the communication bandwidth for distributed training","author":"Lin","year":"2017","journal-title":"arXiv preprint"},{"key":"ref20","first-page":"1508","article-title":"Terngrad: Ternary gradients to reduce communication in distributed deep learning","volume-title":"Proc. of NeurIPS","volume":"30","author":"Wen","year":"2017"},{"key":"ref21","first-page":"2021","article-title":"Fedpaq: A communication-efficient federated learning method with periodic averaging and quantization","volume-title":"Proc. of AISTAT","author":"Reisizadeh","year":"2020"},{"key":"ref22","first-page":"8253","article-title":"Fetchsgd: Communication-efficient federated learning with sketching","volume-title":"Proc. of ICML","author":"Rothchild","year":"2020"},{"key":"ref23","first-page":"652","article-title":"On the utility of gradient compression in distributed training systems","volume-title":"Proc. of MLSys","volume":"4","author":"Agarwal","year":"2022"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1045"},{"key":"ref25","article-title":"Thc: Accelerating distributed deep learning using tensor homomorphic compression","author":"Li","year":"2023","journal-title":"arXiv preprint"},{"key":"ref26","first-page":"3252","article-title":"Error feedback fixes signsgd and other gradient compression schemes","volume-title":"International Conference on Machine Learning","author":"Karimireddy","year":"2019"},{"key":"ref27","first-page":"369","article-title":"Faster ridge regression via the subsampled randomized hadamard transform","volume-title":"Proc. of NeurIPS","author":"Lu","year":"2013"},{"key":"ref28","first-page":"9725","article-title":"Optimal iterative sketching with the subsampled randomized hadamard transform","volume-title":"Proc. of NeurIPS","author":"Lacotte","year":"2020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00139"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3526160"},{"key":"ref31","article-title":"A practical guide to randomized matrix computations with matlab implementations","author":"Wang","year":"2015","journal-title":"arXiv preprint"},{"key":"ref32","volume-title":"How to train your resnet","author":"Page","year":"2019"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref34","first-page":"814","article-title":"Papaya: Practical, private, and scalable federated learning","volume-title":"Proc. of MLSys","volume":"4","author":"Huba","year":"2022"},{"key":"ref35","article-title":"Taming client dropout for distributed differential privacy in federated learning","author":"Jiang","year":"2022","journal-title":"arXiv preprint"},{"key":"ref36","first-page":"1057","article-title":"{FLASH}: Towards a high-performance hardware acceleration architecture for cross-silo federated learning","volume-title":"20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Zhang","year":"2023"},{"key":"ref37","first-page":"3056","article-title":"The fundamental price of secure aggregation in differentially private federated learning","volume-title":"International Conference on Machine Learning","author":"Chen","year":"2022"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref39","article-title":"Fedml-he: An efficient homomorphic-encryption-based privacypreserving federated learning system","author":"Jin","year":"2023","journal-title":"arXiv preprint"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00241"},{"key":"ref41","first-page":"13142","article-title":"Communication-efficient distributed sgd with sketching","volume-title":"Proc. of NeurIPS","author":"Ivkin","year":"2019"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE55515.2023.00183"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS57875.2023.00031"},{"key":"ref44","article-title":"Intsgd: Adaptive floatless compression of stochastic gradients","author":"Mishchenko","year":"2021","journal-title":"arXiv preprint"},{"key":"ref45","first-page":"362","article-title":"Drive: One-bit distributed mean estimation","volume":"34","author":"Vargaftik","year":"2021","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"276","key":"ref46","first-page":"1","article-title":"On biased compression for distributed learning","volume":"24","author":"Beznosikov","year":"2023","journal-title":"Journal of Machine Learning Research"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45465-9_59"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref49","volume-title":"Technical report of fedssa","year":"2024"},{"key":"ref50","article-title":"Achieving linear speedup with partial worker participation in non-iid federated learning","author":"Yang","year":"2021","journal-title":"arXiv preprint"},{"key":"ref51","volume-title":"Python bindings and wrapper for intel paillier cryptosystem library","year":"2024"},{"key":"ref52","article-title":"Leaf: A benchmark for federated settings","author":"Caldas","year":"2018","journal-title":"arXiv preprint"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1502.03167"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01261-8_1"},{"key":"ref56","first-page":"4387","article-title":"The non-iid data quagmire of decentralized machine learning","volume-title":"Proc. of ICML","author":"Hsieh","year":"2020"},{"key":"ref57","article-title":"Understanding top-k sparsification in distributed deep learning","author":"Shi","year":"2019","journal-title":"arXiv preprint"},{"key":"ref58","first-page":"3329","article-title":"Distributed mean estimation with limited communication","volume-title":"Proc. of ICML","author":"Suresh","year":"2017"},{"key":"ref59","article-title":"Global-qsgd: Practical floatless quantization for distributed learning with theoretical guarantees","author":"Xin","year":"2023","journal-title":"arXiv preprint"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196894"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3453142.3491415"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037194"},{"key":"ref65","article-title":"Privacy for free: Communicationefficient learning with differential privacy using sketches","author":"Li","year":"2019","journal-title":"arXiv preprint"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484579"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00029"},{"key":"ref68","article-title":"Randomized quantization is all you need for differential privacy in federated learning","author":"Youn","year":"2023","journal-title":"arXiv preprint"},{"key":"ref69","first-page":"1651","article-title":"{GAZELLE}: A low latency framework for secure neural network inference","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Juvekar","year":"2018"}],"event":{"name":"2024 IEEE 32nd International Conference on Network Protocols (ICNP)","location":"Charleroi, Belgium","start":{"date-parts":[[2024,10,28]]},"end":{"date-parts":[[2024,10,31]]}},"container-title":["2024 IEEE 32nd International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10858485\/10858498\/10858511.pdf?arnumber=10858511","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T05:58:32Z","timestamp":1738735112000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10858511\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/icnp61940.2024.10858511","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}