{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:11:57Z","timestamp":1775229117845,"version":"3.50.1"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"17","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102099"],"award-info":[{"award-number":["62102099"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22A2054"],"award-info":[{"award-number":["U22A2054"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangzhou Basic Research Program","award":["2023A04J1699"],"award-info":[{"award-number":["2023A04J1699"]}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2023A1515140137"],"award-info":[{"award-number":["2023A1515140137"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Talent Fund of Beijing Jiaotong University","award":["2023XKRC050"],"award-info":[{"award-number":["2023XKRC050"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2024T170047"],"award-info":[{"award-number":["2024T170047"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["GZC20230223"],"award-info":[{"award-number":["GZC20230223"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2024M750165"],"award-info":[{"award-number":["2024M750165"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Fund of Anhui Engineering Research Center for Intelligent Applications and Security of Industrial Internet","award":["IASII24-01"],"award-info":[{"award-number":["IASII24-01"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,9,1]]},"DOI":"10.1109\/jiot.2024.3420696","type":"journal-article","created":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T18:09:03Z","timestamp":1720721343000},"page":"28064-28077","source":"Crossref","is-referenced-by-count":22,"title":["Securing Federated Diffusion Model With Dynamic Quantization for Generative AI Services in Multiple-Access Artificial Intelligence of Things"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4726-7187","authenticated-orcid":false,"given":"Jiayi","family":"He","sequence":"first","affiliation":[{"name":"School of Automation, Guangdong University of Technology, Guangzhou, China"}]},{"given":"Bingkun","family":"Lai","sequence":"additional","affiliation":[{"name":"School of Automation, Guangdong University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8218-3490","authenticated-orcid":false,"given":"Jiawen","family":"Kang","sequence":"additional","affiliation":[{"name":"School of Automation, Guangdong University of Technology, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8220-6525","authenticated-orcid":false,"given":"Hongyang","family":"Du","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Jurong West, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1414-0621","authenticated-orcid":false,"given":"Jiangtian","family":"Nie","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Jurong West, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3366-7640","authenticated-orcid":false,"given":"Tao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Software Engineering, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7449-4084","authenticated-orcid":false,"given":"Yanli","family":"Yuan","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2626-4883","authenticated-orcid":false,"given":"Weiting","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7442-7416","authenticated-orcid":false,"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Jurong West, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1807-7220","authenticated-orcid":false,"given":"Abbas","family":"Jamalipour","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, The University of Sydney, Sydney, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2023.3343086"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3226529"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3296075"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2021.103091"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10956-023-10039-y"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2023.3316643"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3317320"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3404559"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2023.3306752"},{"key":"ref10","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Ho"},{"key":"ref11","article-title":"From generative AI to generative Internet of Things: Fundamentals, framework, and outlooks","author":"Wen","year":"2023","journal-title":"arXiv:2310.18382"},{"key":"ref12","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3046665"},{"key":"ref14","article-title":"Phoenix: A federated generative diffusion model","author":"Jothiraj","year":"2023","journal-title":"arXiv:2306.04098"},{"key":"ref15","article-title":"Training diffusion models with federated learning: A communication-efficient model for cross-silo federated image generation","author":"de Goede","year":"2023","journal-title":"arXiv:2406.12575v1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/tcsvt.2024.3407131"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2024.3353377"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2024.3371772"},{"key":"ref19","article-title":"Exploring collaborative distributed diffusion-based AI-generated content (AIGC) in wireless networks","author":"Du","year":"2023","journal-title":"arXiv:2304.03446"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00391"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.00393"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC57788.2023.10233667"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3037554"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3245601"},{"key":"ref25","first-page":"1","article-title":"Quantized compressed sensing with score-based generative models","volume-title":"Proc. 11th Int. Conf. Learn. Represent.","author":"Meng"},{"key":"ref26","article-title":"DreamFusion: Text-to-3D using 2D diffusion","author":"Poole","year":"2022","journal-title":"arXiv:2209.14988"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01042"},{"key":"ref28","first-page":"23689","article-title":"BinauralGrad: A two-stage conditional diffusion probabilistic model for binaural audio synthesis","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Leng"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3073925"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2995162"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32381-3_16"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2020.100196"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3160699"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3026589"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2023.3261988"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS52092.2021.9521339"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110178"},{"key":"ref39","first-page":"1605","article-title":"Local model poisoning attacks to {Byzantine-robust} federated learning","volume-title":"Proc. 29th USENIX Security Symp. (USENIX Security)","author":"Fang"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW56347.2022.00383"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58607-2_11"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3213766"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3191112"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref45","volume-title":"Pytorch diffusion","year":"2020"},{"key":"ref46","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2013.6706807"},{"key":"ref48","first-page":"6629","article-title":"GANs trained by a two time-scale update rule converge to a local Nash equilibrium","volume-title":"Proc. 31st Adv. Neural Inf. Process. Syst.","volume":"30","author":"Heusel"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10643444\/10596048.pdf?arnumber=10596048","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T04:01:32Z","timestamp":1725163292000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10596048\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,1]]},"references-count":48,"journal-issue":{"issue":"17"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3420696","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,1]]}}}