{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T06:00:06Z","timestamp":1763791206584,"version":"3.45.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T00:00:00Z","timestamp":1759104000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,29]]},"DOI":"10.1109\/itw62417.2025.11240508","type":"proceedings-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:39:40Z","timestamp":1763750380000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Perfectly-Private Analog Secure Aggregation in Federated Learning"],"prefix":"10.1109","author":[{"given":"Delio","family":"Jaramillo-Velez","sequence":"first","affiliation":[{"name":"Chalmers University of Technology,Department of Electrical Engineering,Sweden"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Charul","family":"Rajput","sequence":"additional","affiliation":[{"name":"Aalto University,Department of Mathematics and Systems Analysis,Finland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ragnar","family":"Freij-Hollanti","sequence":"additional","affiliation":[{"name":"Aalto University,Department of Mathematics and Systems Analysis,Finland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Camilla","family":"Hollanti","sequence":"additional","affiliation":[{"name":"Aalto University,Department of Mathematics and Systems Analysis,Finland"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alexandre Graell i","family":"Amat","sequence":"additional","affiliation":[{"name":"Chalmers University of Technology,Department of Electrical Engineering,Sweden"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1561\/9781680837896"},{"article-title":"A field guide to federated optimization","year":"2021","author":"Wang","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3460427"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3244243"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT53585.2022.9728912"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107337756","volume-title":"Secure multiparty computation","author":"Cramer","year":"2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20901-7_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i8.26177"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3056377"},{"article-title":"Privacy-preserving distributed learning in the analog domain","year":"2020","author":"Soleymani","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-50594-2_3"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-021-00431-6"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0186-1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04745-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3219485"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-69250-1"},{"key":"ref21","article-title":"Melloddy: Cross-pharma federated learning at unprecedented scale unlocks benefits in qsar without compromising proprietary information","author":"H","year":"2024","journal-title":"Journal of Chemical Information and Modeling"},{"key":"ref22","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Artificial intelligence and statistics","author":"McMahan","year":"2017"},{"volume-title":"Measure theory.","year":"2013","author":"Donald","key":"ref23"},{"article-title":"Flamby: datasets and benchmarks for cross-silo federated learning in realistic healthcare settings","volume-title":"Proceedings of the 36th International Conference on Neural Information Processing Systems, NIPS \u201922","author":"Terrail","key":"ref24"},{"key":"ref25","first-page":"1","article-title":"IEEE standard for floating-point arithmetic","year":"2019","journal-title":"IEEE Std 754-2019 (Revision of IEEE 754-2008)"}],"event":{"name":"2025 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2025,9,29]]},"location":"Sydney, Australia","end":{"date-parts":[[2025,10,3]]}},"container-title":["2025 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11240243\/11240249\/11240508.pdf?arnumber=11240508","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T05:55:32Z","timestamp":1763790932000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11240508\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,29]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/itw62417.2025.11240508","relation":{},"subject":[],"published":{"date-parts":[[2025,9,29]]}}}