{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T05:00:09Z","timestamp":1773378009460,"version":"3.50.1"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,26]]},"DOI":"10.1109\/isit50566.2022.9834591","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T15:34:22Z","timestamp":1659540862000},"page":"1265-1270","source":"Crossref","is-referenced-by-count":30,"title":["Over-the-Air Ensemble Inference with Model Privacy"],"prefix":"10.1109","author":[{"given":"Selim F.","family":"Yilmaz","sequence":"first","affiliation":[{"name":"Imperial College,Department of Electrical and Electronic Engineering,London,UK"}]},{"given":"Burak","family":"Has\u0131rc\u0131o\u011flu","sequence":"additional","affiliation":[{"name":"Imperial College,Department of Electrical and Electronic Engineering,London,UK"}]},{"given":"Deniz","family":"G\u00fcnd\u00fcz","sequence":"additional","affiliation":[{"name":"Imperial College,Department of Electrical and Electronic Engineering,London,UK"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/34.982906"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-demos.6"},{"key":"ref31","article-title":"Distilbert, a distilled version of bert: smaller, faster, cheaper and lighter","author":"sanh","year":"2019"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1873951.1874254"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3934\/mfc.2020017"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198538493.001.0001","author":"bishop","year":"1995","journal-title":"Neural Networks for Pattern Recognition"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref12","first-page":"601","article-title":"Stealing machine learning models via prediction apis","author":"tram\u00e8r","year":"2016","journal-title":"25th USENIX Security Symposium ( USENIX Security 16)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref14","article-title":"Differentially private federated learning: A client level perspective","author":"geyer","year":"2017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.2981904"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.2974748"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2946245"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174426"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3036948"},{"key":"ref28","first-page":"142","article-title":"Learning word vectors for sentiment analysis","author":"maas","year":"0"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MCOM.001.2000394","article-title":"Communicate to learn at the edge","volume":"58","author":"g\u00fcnd\u00fcz","year":"2020","journal-title":"IEEE Communications Magazine"},{"key":"ref27","author":"xiao","year":"2017","journal-title":"Fashion-mnist a novel image dataset for benchmarking machine learning algorithms"},{"key":"ref3","article-title":"Progressive feature transmission for split inference at the wireless edge","author":"lan","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3036955"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00140"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3118484"},{"key":"ref8","article-title":"Learning task-oriented communication for edge inference: An information bottleneck approach","author":"shao","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC48557.2020.9154306"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00048"},{"key":"ref9","first-page":"110","article-title":"Ensemble learning","volume":"2","author":"dietterich","year":"2002","journal-title":"The Handbook of Brain Theory and Neural Networks"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3118346"},{"key":"ref20","article-title":"Efficient federated learning over multiple access channel with differential privacy constraints","author":"sonee","year":"2020"},{"key":"ref22","first-page":"5195","article-title":"Private wireless federated learning with anonymous over-the-air computation","author":"has?rc?o?lu","year":"2021","journal-title":"IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3118408"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834591"},{"key":"ref23","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Theory of Cryptography Conference"},{"key":"ref26","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009"},{"key":"ref25","first-page":"6280","article-title":"Privacy amplification by subsampling: tight analyses via couplings and divergences","author":"balle","year":"2018","journal-title":"Proceedings of the 32Nd International Conference on Neural Information Processing Systems"}],"event":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","location":"Espoo, Finland","start":{"date-parts":[[2022,6,26]]},"end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9834325\/9834269\/09834591.pdf?arnumber=9834591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:35:53Z","timestamp":1773347753000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9834591\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/isit50566.2022.9834591","relation":{},"subject":[],"published":{"date-parts":[[2022,6,26]]}}}