{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:02:20Z","timestamp":1755993740712,"version":"3.44.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202193"],"award-info":[{"award-number":["62202193"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tai.2024.3446759","type":"journal-article","created":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T19:54:54Z","timestamp":1724270094000},"page":"6369-6384","source":"Crossref","is-referenced-by-count":4,"title":["Differentially Private and Heterogeneity-Robust Federated Learning With Theoretical Guarantee"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9223-8328","authenticated-orcid":false,"given":"Xiuhua","family":"Wang","sequence":"first","affiliation":[{"name":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6457-9478","authenticated-orcid":false,"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Wireless Communications, University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8380-4164","authenticated-orcid":false,"given":"Yiwei","family":"Li","sequence":"additional","affiliation":[{"name":"Fujian Key Laboratory of Communication Network and Information Processing, Xiamen University of Technology, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0828-3769","authenticated-orcid":false,"given":"Fengrui","family":"Fan","sequence":"additional","affiliation":[{"name":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-0359-9534","authenticated-orcid":false,"given":"Shikang","family":"Li","sequence":"additional","affiliation":[{"name":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8916-6645","authenticated-orcid":false,"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Guelph, Guelph, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683466"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2022.3151505"},{"key":"ref3","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Int. Conf. Artif. Intell. Statist. (AISTATS)","author":"McMahan","year":"2017"},{"key":"ref4","first-page":"1","article-title":"On the convergence of FedAvg on non-IID data","volume-title":"Proc. Int. Conf. Learn. Representations (ICLR)","author":"Li","year":"2020"},{"article-title":"Federated stochastic primal-dual learning with differential privacy","year":"2022","author":"Li","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2021.3115952"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref8","first-page":"1","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. Conf. Mach. Learn. Syst. (MLSys)","author":"Li","year":"2020"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref10","first-page":"16937","article-title":"Inverting gradients\u2014How easy is it to break privacy in federated learning?","volume-title":"Proc. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Geiping","year":"2020"},{"key":"ref11","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist. (AISTATS)","author":"Bagdasaryan","year":"2020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900506"},{"key":"ref13","first-page":"5132","article-title":"SCAFFOLD: Stochastic controlled averaging for federated learning","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Karimireddy","year":"2020"},{"article-title":"Variance reduced local SGD with lower communication complexity","year":"2020","author":"Liang","key":"ref14"},{"key":"ref15","first-page":"1","article-title":"Federated learning based on dynamic regularization","volume-title":"Proc. Int. Conf. Learn. Representations (ICLR)","author":"Acar","year":"2021"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/app10082864"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93387-0_13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-46664-9_27"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23054"},{"key":"ref22","first-page":"1415","article-title":"FLAME: Taming backdoors in federated learning","volume-title":"Proc. USENIX Secur. Symp. (USENIX Secur.)","author":"Nguyen","year":"2022"},{"key":"ref23","first-page":"1926","article-title":"Learning differentially private recurrent language models","volume-title":"Proc. Int. Conf. Learn. Representations (ICLR)","author":"McMahan","year":"2017"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref25","first-page":"10110","article-title":"Differentially private federated learning on on heterogeneous data","volume-title":"Proc. Int. Conf. Artif. Intell. Statist. (AISTATS)","author":"Noble","year":"2022"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i8.26212"},{"key":"ref27","first-page":"7611","article-title":"Tackling the objective inconsistency problem in heterogeneous federated optimization","volume-title":"Proc. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Wang","year":"2020"},{"key":"ref28","first-page":"60397","article-title":"FedFed: Feature distillation against data heterogeneity in federated learning","volume-title":"Proc. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Yang","year":"2023"},{"article-title":"Differentially private federated learning: A client level perspective","year":"2017","author":"Geyer","key":"ref29"},{"key":"ref30","first-page":"5052","article-title":"The Skellam mechanism for differentially private federated learning","volume-title":"Proc. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Agarwal","year":"2021"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP49062.2020.9231531"},{"key":"ref32","first-page":"26048","article-title":"Understanding clipping for federated learning: convergence and client-level differential privacy","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Zhang","year":"2022"},{"key":"ref33","first-page":"1","article-title":"Federated optimization: Distributed optimization beyond the datacenter","volume-title":"Proc. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Kone\u010dn\u00fd","year":"2015"},{"article-title":"Federated optimization: Distributed machine learning for on-device intelligence","year":"2016","author":"K\u01d2ecn\u00fd","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33015693"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3312852"},{"key":"ref37","first-page":"314","article-title":"Stochastic variance reduction for nonconvex optimization","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Reddi","year":"2016"},{"key":"ref38","first-page":"17","article-title":"Deep leakage from gradients","volume-title":"Proc. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Zhu","year":"2019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref40","first-page":"6277","article-title":"Privacy amplification by subsampling: Tight analyses via couplings and divergences","volume-title":"Proc. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Balle","year":"2018"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3189361"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MLSP55844.2023.10285949"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1561\/9781601984616"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17240"},{"key":"ref46","first-page":"3215","article-title":"NESTT: A nonconvex primal-dual splitting method for distributed and stochastic optimization","volume-title":"Proc. Conf. Neural Inf. Process. Syst. (NeurIPS)","author":"Hajinezhad","year":"2016"},{"article-title":"Learning multiple layers of features from tiny images","year":"2009","author":"Krizhevsky","key":"ref47"},{"article-title":"The MNIST database","year":"1998","author":"LeCun","key":"ref48"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9078688\/10794552\/10643038.pdf?arnumber=10643038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:09:38Z","timestamp":1755911378000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10643038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":48,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tai.2024.3446759","relation":{},"ISSN":["2691-4581"],"issn-type":[{"type":"electronic","value":"2691-4581"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}