{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T23:16:41Z","timestamp":1768519001179,"version":"3.49.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,14]]},"DOI":"10.1109\/icpads67057.2025.11322884","type":"proceedings-article","created":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:36:54Z","timestamp":1768423014000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["$\\lambda$-SecAgg: Partial Vector Freezing for Lightweight Secure Aggregation in Federated Learning"],"prefix":"10.1109","author":[{"given":"Siqing","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Science and Technology of China,Hefei,China"}]},{"given":"Yong","family":"Liao","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China,Hefei,China"}]},{"given":"Peng Yuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Aarhus University,Department of Electrical and Computer Engineering,Aarhus,Denmark"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3436755"},{"key":"ref2","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Artificial intelligence and statistics","author":"McMahan","year":"2017"},{"key":"ref3","article-title":"Deep leakage from gradients","volume":"32","author":"Zhu","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref4","first-page":"16937","article-title":"Inverting gradients-how easy is it to break privacy in federated learning?","volume":"33","author":"Geiping","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2022.3190835"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.10.017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid51090.2021.00101"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref11","first-page":"1379","article-title":"Efficient differentially private secure aggregation for federated learning via hardness of learning with errors","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Stevens","year":"2022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-89137-4_7"},{"key":"ref13","article-title":"Sparsified secure aggregation for privacy-preserving federated learning","volume":"abs\/2112.12872","author":"Ergun","year":"2021","journal-title":"ArXiv"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102993"},{"key":"ref15","article-title":"Secure sum outperforms homomorphic encryption in (current) collaborative deep learning","author":"Boer","year":"2020","journal-title":"arXiv preprint"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/int.22818"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3130115"},{"key":"ref18","article-title":"Differentially private federated learning: A client level perspective","volume":"abs\/1712.07557","author":"Geyer","year":"2017","journal-title":"ArXiv"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3163592"},{"key":"ref20","first-page":"1243","article-title":"Sash: Efficient secure aggregation based on shprg for federated learning","volume-title":"Uncertainty in Artificial Intelligence","author":"Liu","year":"2022"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3127886"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417885"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3054610"},{"key":"ref24","first-page":"2018","article-title":"Nike-based fast privacypreserving high-dimensional data aggregation for mobile devices","volume-title":"University of Waterloo","volume":"10","author":"Kalikinkar","year":"2018"},{"key":"ref25","article-title":"Fastsecagg: Scalable secure aggregation for privacy-preserving federated learning","author":"Kadhe","year":"2020","journal-title":"arXiv preprint"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179434"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0030"},{"key":"ref28","first-page":"8253","article-title":"Fetchsgd: Communication-efficient federated learning with sketching","volume-title":"International Conference on Machine Learning","author":"Rothchild","year":"2020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560557"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i8.26177"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3043139"},{"key":"ref32","first-page":"4805","article-title":"{ACORN}: Input validation for secure aggregation","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Bell","year":"2023"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179400"},{"key":"ref34","article-title":"Every vote counts: Ranking-based training of federated learning to resist poisoning attacks","volume-title":"USENIX Security Symposium","author":"Mozaffari","year":"2023"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3266919"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1201\/9781466593480"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.103"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052569"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3014880"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2827872"}],"event":{"name":"2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)","location":"Hefei, China","start":{"date-parts":[[2025,12,14]]},"end":{"date-parts":[[2025,12,18]]}},"container-title":["2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11322805\/11322871\/11322884.pdf?arnumber=11322884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T07:28:02Z","timestamp":1768462082000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11322884\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,14]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/icpads67057.2025.11322884","relation":{},"subject":[],"published":{"date-parts":[[2025,12,14]]}}}