{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:53:01Z","timestamp":1776444781602,"version":"3.51.2"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010663","name":"European Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["NSFC-12141107"],"award-info":[{"award-number":["NSFC-12141107"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF-2045656,CCF-2312228,2312227"],"award-info":[{"award-number":["CCF-2045656,CCF-2312228,2312227"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,24]]},"DOI":"10.1109\/itw61385.2024.10806947","type":"proceedings-article","created":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T19:18:57Z","timestamp":1735586337000},"page":"573-578","source":"Crossref","is-referenced-by-count":6,"title":["Optimal Rate Region for Key Efficient Hierarchical Secure Aggregation with User Collusion"],"prefix":"10.1109","author":[{"given":"Xiang","family":"Zhang","sequence":"first","affiliation":[{"name":"Technical University of Berlin,Department of Electrical Engineering and Computer Science"}]},{"given":"Kai","family":"Wan","sequence":"additional","affiliation":[{"name":"School of Electronic Information and Communications, Huazhong University of Science and Technology"}]},{"given":"Hua","family":"Sun","sequence":"additional","affiliation":[{"name":"University of North Texas,Department of Electrical Engineering"}]},{"given":"Shiqiang","family":"Wang","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center"}]},{"given":"Mingyue","family":"Ji","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Electrical and Computer Engineering"}]},{"given":"Giuseppe","family":"Caire","sequence":"additional","affiliation":[{"name":"Technical University of Berlin,Department of Electrical Engineering and Computer Science"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentral-ized data","volume-title":"Artificial intelligence and statistics","author":"McMahan","year":"2017"},{"key":"ref2","article-title":"Federated learning: Strategies for improving communication efficiency","volume":"8","author":"Konecny","year":"2016","journal-title":"arXiv preprint"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-020-00323-1"},{"key":"ref5","article-title":"Applied federated learning: Improving google keyboard query suggestions","author":"Yang","year":"2018","journal-title":"arXiv preprint"},{"key":"ref6","first-page":"5132","article-title":"Scaffold: Stochastic controlled averaging for federated learning","volume-title":"International conference on machine learning","author":"Karimireddy","year":"2020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.2975189"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3075203"},{"key":"ref9","first-page":"16937","article-title":"Inverting gradients-how easy is it to break privacy in federated learning?","volume":"33","author":"Geiping","year":"2020","journal-title":"Advances in neural information processing systems"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref12","first-page":"5201","article-title":"The distributed discrete gaussian mechanism for federated learning with secure aggregation","volume-title":"International Conference on Machine Learning","author":"Kairouz","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3192874"},{"key":"ref14","first-page":"694","article-title":"Lightsecagg: a lightweight and versatile design for secure aggregation in federated learning","volume-title":"Proceedings of Machine Learning and Systems","volume":"4","author":"So","year":"2022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2023.3342571"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2024.3393740"},{"key":"ref17","article-title":"Mds variable generation and secure summation with user selection","author":"Zhao","year":"2022","journal-title":"arXiv preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/isit54713.2023.10206914"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT54713.2023.10206930"},{"key":"ref20","article-title":"Secure aggregation with an oblivious server","author":"Sun","year":"2023","journal-title":"arXiv preprint"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463572"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148862"},{"key":"ref23","article-title":"Multi-level local sgd: Dis-tributed sgd for heterogeneous hierarchical networks","volume-title":"International Conference on Learning Representations","author":"Castiglia","year":"2020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20832"},{"key":"ref25","volume-title":"Optimal communication and key rate region for hierarchical secure aggregation with user collusion","author":"Zhang","year":"2024"}],"event":{"name":"2024 IEEE Information Theory Workshop (ITW)","location":"Shenzhen, China","start":{"date-parts":[[2024,11,24]]},"end":{"date-parts":[[2024,11,28]]}},"container-title":["2024 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10806859\/10806904\/10806947.pdf?arnumber=10806947","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T06:25:44Z","timestamp":1735626344000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10806947\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,24]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/itw61385.2024.10806947","relation":{},"subject":[],"published":{"date-parts":[[2024,11,24]]}}}