{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:48:58Z","timestamp":1765039738136,"version":"3.37.3"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"24","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/jiot.2024.3452549","type":"journal-article","created":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T17:51:56Z","timestamp":1725040316000},"page":"39767-39779","source":"Crossref","is-referenced-by-count":2,"title":["Joint Layer Selection and Differential Privacy Design for Federated Learning Over Wireless Networks"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6451-0628","authenticated-orcid":false,"given":"Yahao","family":"Ding","sequence":"first","affiliation":[{"name":"Department of Engineering, King&#x2019;s College London, London, U.K."}]},{"given":"Wen","family":"Shang","sequence":"additional","affiliation":[{"name":"Department of Engineering, King&#x2019;s College London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5194-7783","authenticated-orcid":false,"given":"Yinchao","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Engineering, King&#x2019;s College London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8606-785X","authenticated-orcid":false,"given":"Weihang","family":"Ding","sequence":"additional","affiliation":[{"name":"Department of Engineering, King&#x2019;s College London, London, U.K."}]},{"given":"Mohammad","family":"Shikh-Bahaei","sequence":"additional","affiliation":[{"name":"Department of Engineering, King&#x2019;s College London, London, U.K."}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/MCOMSTD.0005.2200044"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/MNET.011.2000045"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/COMST.2020.2986024"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TETCI.2023.3251404"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/3298981"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.eng.2021.12.002"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.future.2017.02.006"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/JIOT.2023.3341307"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/COMST.2023.3316615"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/JSTSP.2023.3239189"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3501296"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1038\/s41598-020-69250-1"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/3412357"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1038\/s41746-020-00323-1"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/OJCS.2020.2992630"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/JIOT.2020.2995162"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/SP.2017.41"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref19","article-title":"iDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020","journal-title":"arXiv:2001.02610"},{"key":"ref20","first-page":"1","article-title":"Improved techniques for model inversion attacks","volume-title":"Proc. ICLR","author":"Chen"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1007\/978-3-030-58951-6_24"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.3390\/fi13030073"},{"key":"ref23","article-title":"Towards general deep leakage in federated learning","author":"Geng","year":"2022","journal-title":"arXiv:2110.09074"},{"key":"ref24","article-title":"Deep leakage from model in federated learning","author":"Zhao","year":"2022","journal-title":"arXiv:2206.04887"},{"key":"ref25","article-title":"Learning differentially private recurrent language models","author":"McMahan","year":"2018","journal-title":"arXiv:1710.0 6963"},{"key":"ref26","first-page":"1","article-title":"SMPAI: Secure multi-party computation for federated learning","volume-title":"Proc. 33rd NeurIPS Workshop Robust AI Financ. Services","author":"Mugunthan"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.3390\/fi13040094"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/j.future.2022.10.026"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/ICCWorkshops57953.2023.10283697"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TIFS.2023.3293417"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/OJCS.2021.3099108"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/ICDCS51616.2021.00081"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.21203\/rs.3.rs-1005694\/v1"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/TWC.2020.3024629"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1587\/transinf.2021BCP0006"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/ICC45041.2023.10278563"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/35.339880"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1007\/11681878_14"},{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1561\/9781601988195"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1007\/978-3-662-53641-4_24"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1049\/cmu2.12722"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10786863\/10660465.pdf?arnumber=10660465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T17:21:10Z","timestamp":1733937670000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10660465\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":41,"journal-issue":{"issue":"24"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3452549","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2024,12,15]]}}}