{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T06:25:53Z","timestamp":1775715953054,"version":"3.50.1"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,17]],"date-time":"2023-05-17T00:00:00Z","timestamp":1684281600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100005090","name":"Beijing Nova Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005090","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,17]]},"DOI":"10.1109\/infocom53939.2023.10228953","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:40:43Z","timestamp":1693330843000},"page":"1-10","source":"Crossref","is-referenced-by-count":13,"title":["Privacy as a Resource in Differentially Private Federated Learning"],"prefix":"10.1109","author":[{"given":"Jinliang","family":"Yuan","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,China"}]},{"given":"Shangguang","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,China"}]},{"given":"Shihe","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,China"}]},{"given":"Yuanchun","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University,Institute for AI Industry Research (AIR),China"}]},{"given":"Xiao","family":"Ma","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,China"}]},{"given":"Ao","family":"Zhou","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,China"}]},{"given":"Mengwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.94615"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref12","article-title":"Learning differentially private recurrent language models","author":"brendan mcmahan","year":"2018","journal-title":"Proceedings of International Conference on Learning Representations"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref15","year":"2018","journal-title":"California Consumer Privacy Act"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2739040"},{"key":"ref14","article-title":"Renyi differential privacy of the subsampled shuffle model in distributed learning","author":"girgis","year":"2021","journal-title":"Proceedings of Conference on Neural Information Processing Systems"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1613\/jair.4405"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS52979.2021.00096"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417242"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3357384.3358028"},{"key":"ref33","year":"0","journal-title":"CIFAR-100 dataset"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.321"},{"key":"ref32","year":"0","journal-title":"MNIST Database of Handwritten Digits"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2944"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3287075"},{"key":"ref17","year":"2021","journal-title":"Handing ownership of data back to the users"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref16","year":"2019","journal-title":"General Data Protection Regulation"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359639"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref24","article-title":"Altruistic scheduling in multi-resource clusters","author":"grandl","year":"2016","journal-title":"Proceedings of Operating System Design and Implementation"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241563"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3096076"},{"key":"ref26","article-title":"Dominant resource fairness: Fair allocation of multiple resource types","author":"ghodsi","year":"2011","journal-title":"Proceedings of Symposium on Networked Systems Design and Implementation"},{"key":"ref25","article-title":"Performance isolation and fairness for multi-tenant cloud storage","author":"shue","year":"2012","journal-title":"Proceedings of Operating System Design and Implementation"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313591"},{"key":"ref42","article-title":"Batchcrypt: Efficient homomorphic encryption for cross-silo federated learning","author":"zhang","year":"2020","journal-title":"Proceedings of Annual Technical Conference"},{"key":"ref41","author":"cai","year":"2022","journal-title":"Autofednlp An efficient fednlp framework"},{"key":"ref22","first-page":"19","article-title":"Oort: Efficient federated learning via guided participant selection","author":"lai","year":"2021","journal-title":"Proceedings of Operating System Design and Implementation"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3118401"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3495243.3517017"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747653"},{"key":"ref28","article-title":"Deep leakage from gradients","author":"zhu","year":"2019","journal-title":"Proceedings of Conference on Neural Information Processing Systems"},{"key":"ref27","article-title":"Privacy budget scheduling","author":"luo","year":"2021","journal-title":"Proceedings of Operating System Design and Implementation"},{"key":"ref29","article-title":"Shuffled model of differential privacy in federated learning","author":"girgis","year":"2021","journal-title":"Proceedings of International Conference on Artificial Intelligence and Statistics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17053"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"ref9","author":"he","year":"2020","journal-title":"FedNAS Federated Deep Learning via Neural Architecture Search"},{"key":"ref4","article-title":"Multiparty differential privacy via aggregation of locally trained classifiers","author":"pathak","year":"2010","journal-title":"Proceedings of Conference on Neural Information Processing Systems"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23551-2_2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449851"}],"event":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","location":"New York City, NY, USA","start":{"date-parts":[[2023,5,17]]},"end":{"date-parts":[[2023,5,20]]}},"container-title":["IEEE INFOCOM 2023 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10228851\/10228852\/10228953.pdf?arnumber=10228953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:45:13Z","timestamp":1695059113000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10228953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,17]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/infocom53939.2023.10228953","relation":{},"subject":[],"published":{"date-parts":[[2023,5,17]]}}}