{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:25:50Z","timestamp":1775665550902,"version":"3.50.1"},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010663","name":"European Research Council through the European Research Council (ERC) Advanced [Content-Aware Wireless Networks: Fundamental Limits, Algorithms, and Architectures (CARENET)]","doi-asserted-by":"publisher","award":["789190"],"award-info":[{"award-number":["789190"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62106057"],"award-info":[{"award-number":["62106057"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005950","name":"Foshan Hong Kong University of Science and Technology (HKUST) Projects","doi-asserted-by":"publisher","award":["FSUST20-FYTRI04B"],"award-info":[{"award-number":["FSUST20-FYTRI04B"]}],"id":[{"id":"10.13039\/501100005950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1109\/jsac.2023.3242702","type":"journal-article","created":{"date-parts":[[2023,3,3]],"date-time":"2023-03-03T18:23:35Z","timestamp":1677867815000},"page":"977-989","source":"Crossref","is-referenced-by-count":50,"title":["SwiftAgg+: Achieving Asymptotically Optimal Communication Loads in Secure Aggregation for Federated Learning"],"prefix":"10.1109","volume":"41","author":[{"given":"Tayyebeh","family":"Jahani-Nezhad","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Technische Universit&#x00E4;t Berlin, Berlin, Germany"}]},{"given":"Mohammad Ali","family":"Maddah-Ali","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Minnesota Twin Cities, Minneapolis, MN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4282-3307","authenticated-orcid":false,"given":"Songze","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, IoT Thrust, The Hong Kong University of Science and Technology (Guangzhou), The Hong Kong University of Science and Technology, Sai Kung, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7749-1333","authenticated-orcid":false,"given":"Giuseppe","family":"Caire","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, Technische Universit&#x00E4;t Berlin, Berlin, Germany"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","volume":"54","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref4","article-title":"Deep leakage from gradients","volume-title":"Advances in Neural Information Processing Systems","volume":"32","author":"Zhu"},{"key":"ref5","article-title":"Inverting gradients\u2013how easy is it to break privacy in federated learning?","author":"Geiping","year":"2020","journal-title":"arXiv:2003.14053"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3054610"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417885"},{"key":"ref9","article-title":"Communication-computation efficient secure aggregation for federated learning","author":"Choi","year":"2020","journal-title":"arXiv:2012.05433"},{"key":"ref10","first-page":"1215","article-title":"Lagrange coded computing: Optimal design for resiliency, security, and privacy","volume-title":"Proc. 22nd Int. Conf. Artif. Intell. Statist.","author":"Yu"},{"key":"ref11","article-title":"FastSecAgg: Scalable secure aggregation for privacy-preserving federated learning","author":"Kadhe","year":"2020","journal-title":"arXiv:2009.11248"},{"key":"ref12","first-page":"694","article-title":"LightSecAgg: A lightweight and versatile design for secure aggregation in federated learning","volume":"4","author":"So","year":"2022","journal-title":"Proc. Mach. Learn. Syst."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9517953"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834750"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref16","article-title":"CodedPaddedFL and CodedSecAgg: Straggler mitigation and secure aggregation in federated learning","author":"Schlegel","year":"2021","journal-title":"arXiv:2112.08909"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_20"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/08073408x"},{"key":"ref19","article-title":"Practical secure aggregation for federated learning on user-held data","author":"Bonawitz","year":"2016","journal-title":"arXiv:1611.04482"},{"key":"ref20","volume-title":"Proofs From the Book","volume":"1","author":"Aigner","year":"1999"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/49\/10075675\/10058697.pdf?arnumber=10058697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T00:54:19Z","timestamp":1709427259000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10058697\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":20,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2023.3242702","relation":{},"ISSN":["0733-8716","1558-0008"],"issn-type":[{"value":"0733-8716","type":"print"},{"value":"1558-0008","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4]]}}}