{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T05:19:07Z","timestamp":1768972747101,"version":"3.49.0"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"19","license":[{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,1]],"date-time":"2024-10-01T00:00:00Z","timestamp":1727740800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB3001900"],"award-info":[{"award-number":["2023YFB3001900"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Science and Technology Program","award":["KJZD20230923113901004"],"award-info":[{"award-number":["KJZD20230923113901004"]}]},{"DOI":"10.13039\/501100012245","name":"Science and Technology Planning Project of Guangdong Province","doi-asserted-by":"publisher","award":["2023A0505020006"],"award-info":[{"award-number":["2023A0505020006"]}],"id":[{"id":"10.13039\/501100012245","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003009","name":"Science and Technology Development Fund, Macau, SAR","doi-asserted-by":"publisher","award":["0008\/2022\/AGJ"],"award-info":[{"award-number":["0008\/2022\/AGJ"]}],"id":[{"id":"10.13039\/501100003009","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2001209"],"award-info":[{"award-number":["U2001209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072486"],"award-info":[{"award-number":["62072486"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,10,1]]},"DOI":"10.1109\/jiot.2024.3421991","type":"journal-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T19:37:57Z","timestamp":1719949077000},"page":"31687-31698","source":"Crossref","is-referenced-by-count":4,"title":["FedDP-SA: Boosting Differentially Private Federated Learning via Local Data Set Splitting"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1242-0718","authenticated-orcid":false,"given":"Xuezheng","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering and the Guangdong Key Laboratory of Big Data Analysis and Processing, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1533-0865","authenticated-orcid":false,"given":"Yipeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computing, Faculty of Science and Engineering, Macquarie University, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9433-7725","authenticated-orcid":false,"given":"Di","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering and the Guangdong Key Laboratory of Big Data Analysis and Processing, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1518-002X","authenticated-orcid":false,"given":"Miao","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering and the Guangdong Key Laboratory of Big Data Analysis and Processing, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7825-4137","authenticated-orcid":false,"given":"Jessie","family":"Hui Wang","sequence":"additional","affiliation":[{"name":"Institute for Network Sciences and Cyberspace and the Beijing National Research Center for Information Science and Technology, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8972-8094","authenticated-orcid":false,"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[{"name":"Machine Learning Department, Mohamed Bin Zayed University of Artificial Intelligence, Abu Dhabi, UAE"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3151806"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3625558"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3367249"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3075439"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3095077"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3334018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_27"},{"key":"ref10","first-page":"3921","article-title":"Understanding deep gradient leakage via inversion influence functions","volume-title":"Proc. 37th Adv. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3090771"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2023.3331726"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3264259"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3258255"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3174394"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00025"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3293417"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.14649"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00001"},{"key":"ref21","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref22","first-page":"2021","article-title":"FedPAQ: A communication-efficient federated learning method with periodic averaging and quantization","volume-title":"Proc. 23rd Int. Conf. Artif. Intell. Statist. (ICAIS)","author":"Reisizadeh"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0041-y"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37682-5_1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250803"},{"key":"ref30","first-page":"374","article-title":"Towards federated learning at scale: System design","volume-title":"Proc. Mach. Learn. Syst. (PMLS)","author":"Bonawitz"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/217"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i10.26400"},{"key":"ref34","first-page":"26048","article-title":"Understanding clipping for federated learning: Convergence and client-level differential privacy","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Zhang"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3111088"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3318944"},{"key":"ref37","first-page":"1595","article-title":"PrivateFL: Accurate, differentially private federated learning via personalized data transformation","volume-title":"Proc. 32nd USENIX Secur. Symp. (USENIX Security)","author":"Yang"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900461"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488839"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3075291"},{"key":"ref42","first-page":"1","article-title":"FedBN: Federated learning on non-IID features via local batch normalization","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Li"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1993636.1993743"},{"key":"ref44","first-page":"1","article-title":"On the convergence of FedAvg on non-IID data","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Li"},{"issue":"81","key":"ref45","first-page":"1","article-title":"Improved asynchronous parallel optimization analysis for stochastic incremental methods","volume":"19","author":"Leblond","year":"2018","journal-title":"J. Mach. Learn. Res."},{"key":"ref46","first-page":"3665","article-title":"Tight dimension independent lower bound on the expected convergence rate for diminishing step sizes in SGD","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"NGUYEN"},{"key":"ref47","article-title":"Leaf: A benchmark for federated settings","author":"Caldas","year":"2019","journal-title":"arXiv:1812.01097"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3103715"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2928811"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3144571"},{"key":"ref52","article-title":"On the practicality of differential privacy in federated learning by tuning iteration times","author":"Fu","year":"2021","journal-title":"arXiv:2101.04163"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10691380\/10580937.pdf?arnumber=10580937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T19:04:29Z","timestamp":1738004669000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10580937\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,1]]},"references-count":52,"journal-issue":{"issue":"19"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3421991","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,1]]}}}