{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:55:12Z","timestamp":1773377712441,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T00:00:00Z","timestamp":1626048000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,12]],"date-time":"2021-07-12T00:00:00Z","timestamp":1626048000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF 1817635"],"award-info":[{"award-number":["CCF 1817635"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,12]]},"DOI":"10.1109\/isit45174.2021.9518142","type":"proceedings-article","created":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T16:52:42Z","timestamp":1630515162000},"page":"1391-1396","source":"Crossref","is-referenced-by-count":4,"title":["Private Multi-Group Aggregation"],"prefix":"10.1109","author":[{"given":"Carolina","family":"Naim","sequence":"first","affiliation":[{"name":"Rutgers University,ECE"}]},{"given":"Rafael G. L.","family":"D'Oliveira","sequence":"additional","affiliation":[{"name":"RLE, Massachusetts Institute of Technology"}]},{"given":"Salim","family":"el Rouayheb","sequence":"additional","affiliation":[{"name":"Rutgers University,ECE"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Privacy-Preserving Aggregation of Time-Series Data","author":"shi","year":"0","journal-title":"Proceedings of the 18th Annual Network & Distributed System Security Symposium Proceedings (NDSS)"},{"key":"ref11","article-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data","author":"mcmahan","year":"0","journal-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS)"},{"key":"ref12","article-title":"Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning","author":"so","year":"2020","journal-title":"ArXiv"},{"key":"ref13","article-title":"Fast-SecAgg: Scalable Secure Aggregation for Privacy-Preserving Federated Learning","author":"kadhe","year":"2020","journal-title":"ArXiv"},{"key":"ref14","article-title":"Robust Aggregation for Federated Learning","author":"pillutla","year":"2019","journal-title":"ArXiv"},{"key":"ref15","article-title":"Secure Federated Submodel Learning","author":"niu","year":"2019","journal-title":"ArXiv"},{"key":"ref16","article-title":"Information-Theoretic Privacy in Federated Sub-model learning","author":"kim","year":"2020","journal-title":"ArXiv"},{"key":"ref17","article-title":"X-Secure $T$-Private Federated Submodel Learning","author":"jia","year":"2020","journal-title":"ArXiv"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"ref19","author":"naim","year":"2021","journal-title":"Private Multi-Group Aggregation"},{"key":"ref4","article-title":"LDP-Fed: Federated Learning with Local Differential Privacy","author":"truex","year":"0","journal-title":"Proceedings of the Third ACM International Workshop on Edge Systems Analytics and Networking"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33090-2_25"},{"key":"ref5","article-title":"Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication","author":"kim","year":"2021","journal-title":"ArXiv"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2484326"},{"key":"ref7","article-title":"Pure Differentially Private Summation from Anonymous Messages","author":"ghazi","year":"0","journal-title":"1st Conference on Information-Theoretic Cryptography (ITC 2020)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.03.015"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref20","article-title":"Differential Privacy","author":"dwork","year":"0","journal-title":"International Colloquium on Automata Languages and Programming (ICALP)"},{"key":"ref22","article-title":"Discrete Distribution Estimation under Local Privacy","author":"kairouz","year":"0","journal-title":"Proceedings of the 33rd International Conference on International Conference on Machine Learning (ICML)"},{"key":"ref21","article-title":"Local privacy and statistical minimax rates","author":"duchi","year":"0","journal-title":"54th Annual Symposium on Foundations of Computer Science"}],"event":{"name":"2021 IEEE International Symposium on Information Theory (ISIT)","location":"Melbourne, Australia","start":{"date-parts":[[2021,7,12]]},"end":{"date-parts":[[2021,7,20]]}},"container-title":["2021 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9517708\/9517709\/09518142.pdf?arnumber=9518142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:34:56Z","timestamp":1773347696000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9518142\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isit45174.2021.9518142","relation":{},"subject":[],"published":{"date-parts":[[2021,7,12]]}}}