{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:14:57Z","timestamp":1775229297327,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council Linkage Project","doi-asserted-by":"publisher","award":["LP190100676"],"award-info":[{"award-number":["LP190100676"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science Research and Development Program of Jilin Province in China","award":["20200401076GX"],"award-info":[{"award-number":["20200401076GX"]}]},{"name":"Science Research and Development Program of Jilin Province in China","award":["20190303021SF"],"award-info":[{"award-number":["20190303021SF"]}]},{"DOI":"10.13039\/100007847","name":"Natural Science Funds of Jilin Province in China","doi-asserted-by":"publisher","award":["20190201180JC"],"award-info":[{"award-number":["20190201180JC"]}],"id":[{"id":"10.13039\/100007847","id-type":"DOI","asserted-by":"publisher"}]},{"name":"State Scholarship Fund of CSC in China","award":["201902335003"],"award-info":[{"award-number":["201902335003"]}]},{"name":"Australian Data61","award":["CRP c020996"],"award-info":[{"award-number":["CRP c020996"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2021,4,15]]},"DOI":"10.1109\/jiot.2020.3022911","type":"journal-article","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T19:59:45Z","timestamp":1599595185000},"page":"6178-6186","source":"Crossref","is-referenced-by-count":231,"title":["Privacy-Preserving Federated Learning Framework Based on Chained Secure Multiparty Computing"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2907-9811","authenticated-orcid":false,"given":"Yong","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1533-0865","authenticated-orcid":false,"given":"Yipeng","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7818-459X","authenticated-orcid":false,"given":"Alireza","family":"Jolfaei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8919-1613","authenticated-orcid":false,"given":"Dongjin","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Gaochao","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2572-2355","authenticated-orcid":false,"given":"Xi","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1168\/3\/032072"},{"key":"ref38","article-title":"Efficient neighbor list creation for cellular networks","author":"vela","year":"2011"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref32","author":"vepakomma","year":"2018","journal-title":"No peek A survey of private distributed deep learning"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1317-9"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF44664.2019.9049023"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2484326"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660280"},{"key":"ref34","first-page":"118","article-title":"I have a DREAM! (DiffeRentially privatE smArt metering)","author":"\u00e1cs","year":"2011","journal-title":"Proc Int Workshop Inf Hiding"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.jpdc.2019.10.009","article-title":"Edge-based differential privacy computing for sensor&#x2013;cloud systems","volume":"136","author":"wang","year":"2020","journal-title":"J Parallel Distrib Comput"},{"key":"ref40","author":"liu","year":"2019","journal-title":"Client-Edge-Cloud Hierarchical Federated Learning"},{"key":"ref11","author":"hardy","year":"2017","journal-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption"},{"key":"ref12","author":"nock","year":"2018","journal-title":"Entity resolution and federated learning get a federated resolution"},{"key":"ref13","author":"kairouz","year":"2019","journal-title":"Advances and Open Problems in Federated Learning"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref15","article-title":"Nike-based fast privacy-preserving high-dimensional data aggregation for mobile devices","author":"mandal","year":"2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"ref17","first-page":"1","article-title":"A privacy-preserving asynchronous averaging algorithm based on shamir&#x2019;s secret sharing","author":"li","year":"2019","journal-title":"Proc IEEE 27th Eur Signal Process Conf (EUSIPCO)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.18"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref27","article-title":"Somewhat practical fully homomorphic encryption","author":"fan","year":"2012"},{"key":"ref3","author":"kone?n?","year":"2016","journal-title":"Federated learning Strategies for improving communication efficiency"},{"key":"ref6","author":"zhao","year":"2020","journal-title":"iDLG Improved deep leakage from gradients"},{"key":"ref29","first-page":"311","article-title":"Scale-invariant fully homomorphic encryption over the integers","author":"coron","year":"2014","journal-title":"Proc 17th Int Workshop Public Key Cryptogr"},{"key":"ref5","first-page":"14774","article-title":"Deep leakage from gradients","author":"zhu","year":"2019","journal-title":"Advances in Neural IInformation Processing Systems"},{"key":"ref8","author":"geyer","year":"2017","journal-title":"Differentially private federated learning A client level perspective"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref2","author":"kone?n?","year":"2016","journal-title":"Federated optimization distributed machine learning for on-device intelligence"},{"key":"ref9","first-page":"466","article-title":"The value of collaboration in convex machine learning with differential privacy","author":"wu","year":"2020","journal-title":"Prof IEEE Symp Security and Privacy (SP)"},{"key":"ref1","author":"mcmahan","year":"2016","journal-title":"Communication-efficient learning of deep networks from decentralized data"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0135-7_43"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.049"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3935"},{"key":"ref42","first-page":"8026","article-title":"Automatic differentiation in pytorch","author":"adam","year":"2017","journal-title":"Proc Neural Inf Process Syst"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1120-1"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2019.8852464"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401149"},{"key":"ref26","first-page":"868","article-title":"Fully homomorphic encryption without modulus switching from classical GapSVP","author":"brakerski","year":"2012","journal-title":"Proc Annu Cryptol Conf"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9398162\/09187932.pdf?arnumber=9187932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:42Z","timestamp":1652194422000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9187932\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":42,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2020.3022911","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,15]]}}}