{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T06:21:10Z","timestamp":1770704470455,"version":"3.49.0"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971235"],"award-info":[{"award-number":["61971235"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"333 High-Level Talents Training Project of Jiangsu Province"},{"name":"1311 Talents Plan of NJUPT"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,4,15]]},"DOI":"10.1109\/jiot.2023.3339495","type":"journal-article","created":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T18:26:06Z","timestamp":1701800766000},"page":"14017-14030","source":"Crossref","is-referenced-by-count":11,"title":["Compressed-Sensing-Based Practical and Efficient Privacy-Preserving Federated Learning"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9366-6498","authenticated-orcid":false,"given":"Siguang","family":"Chen","sequence":"first","affiliation":[{"name":"School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"given":"Yifeng","family":"Miao","sequence":"additional","affiliation":[{"name":"School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6082-5955","authenticated-orcid":false,"given":"Xue","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Dermatology, Women&#x2019;s Hospital of Nanjing Medical University, Nanjing Maternity and Child Health Care Hospital, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5863-0430","authenticated-orcid":false,"given":"Chuanxin","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer and Information, Anhui Normal University, Wuhu, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3150363"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3560816"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-022-01937-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2018.8697857"},{"key":"ref5","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Int. Conf. Artif. Intell. Stat. (AISTATS)","author":"Brendan"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2022.09.011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-021-10123-y"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.001.2300140"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref10","article-title":"iDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020","journal-title":"arXiv:2001.02610"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00337-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3246126"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102378"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00366"},{"key":"ref18","first-page":"7232","article-title":"Evaluating gradient inversion attacks and defenses in federated learning","volume-title":"Proc. Int. Conf. Neural Inf. Proces. Syst. (NeurIPS)","author":"Huang"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref20","first-page":"1","article-title":"Deep gradient compression: Reducing the communication bandwidth for distributed training","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Lin"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871582"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3073112"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2022.3209190"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.09.045"},{"key":"ref25","first-page":"169","article-title":"Kryptein: A compressive-sensing-based encryption scheme for the Internet of Things","volume-title":"Proc. Int. Conf. Inf. Process. Sens. Networks (IPSN)","author":"Xue"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3008914"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/app10175909"},{"key":"ref28","first-page":"14774","article-title":"Deep leakage from gradients","volume-title":"Proc. Int. Conf. Neural Inf. Proces. Syst. (NeurIPS)","author":"Zhu"},{"key":"ref29","first-page":"16937","article-title":"Inverting gradients\u2014How easy is it to break privacy in federated learning?","volume-title":"Proc. Int. Conf. Neural Inf. Proces. Syst. (NeurIPS)","author":"Geiping"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01607"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0043"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2023.3239116"},{"key":"ref33","first-page":"1","article-title":"Bayesian framework for gradient leakage","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Balunovi"},{"key":"ref34","first-page":"5959","article-title":"Gradient disaggregation: Breaking privacy in federated learning by reconstructing the user participant matrix","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Lam"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00989"},{"key":"ref36","first-page":"29898","article-title":"Gradient inversion with generative image prior","volume-title":"Proc. Int. Conf. Neural Inf. Proces. Syst. (NeurIPS)","author":"Jeon"},{"key":"ref37","first-page":"7102","article-title":"HEMET: A homomorphic-encryption-friendly privacy-preserving mobile neural network architecture","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Lou"},{"key":"ref38","first-page":"1","article-title":"MixUp: Beyond empirical risk minimization","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Zhang"},{"key":"ref39","first-page":"4457","article-title":"InstaHide: Instance-hiding schemes for private distributed learning","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Huang"},{"key":"ref40","first-page":"1","article-title":"Do not let privacy overbill utility: Gradient embedding perturbation for private learning","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Yu"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103039"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00919"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796841"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228919"},{"key":"ref45","first-page":"23668","article-title":"Fishing for user data in large-batch federated learning via gradient magnification","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Wen"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00020"},{"key":"ref47","first-page":"2782","article-title":"Bayesian coresets: Revisiting the nonconvex optimization perspective","volume-title":"Proc. Int. Conf. Artif. Intell. Stat. (AISTATS)","author":"Zhang"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2008.5074472"},{"issue":"100","key":"ref49","first-page":"1","article-title":"FedLab: A flexible federated learning framework","volume":"24","author":"Zeng","year":"2023","journal-title":"J. Mach. Learn. Res."},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10495736\/10342861.pdf?arnumber=10342861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T18:33:22Z","timestamp":1712774002000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10342861\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,15]]},"references-count":50,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3339495","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,15]]}}}