{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T10:51:23Z","timestamp":1775645483458,"version":"3.50.1"},"reference-count":99,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2022YFF1202400"],"award-info":[{"award-number":["2022YFF1202400"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072052"],"award-info":[{"award-number":["62072052"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61921003"],"award-info":[{"award-number":["61921003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2023,8,1]]},"DOI":"10.1109\/tbdata.2023.3277716","type":"journal-article","created":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T17:25:54Z","timestamp":1684430754000},"page":"1225-1237","source":"Crossref","is-referenced-by-count":15,"title":["ATLAS: GAN-Based Differentially Private Multi-Party Data Sharing"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3122-232X","authenticated-orcid":false,"given":"Zhenya","family":"Wang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6556-2264","authenticated-orcid":false,"given":"Xiang","family":"Cheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4266-7527","authenticated-orcid":false,"given":"Sen","family":"Su","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4127-7749","authenticated-orcid":false,"given":"Jintao","family":"Liang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4597-9502","authenticated-orcid":false,"given":"Haocheng","family":"Yang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref57","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume":"2","author":"li","year":"2020","journal-title":"Proc Mach Learn Syst"},{"key":"ref56","article-title":"Generative models for effective ML on private, decentralized datasets","author":"augenstein","year":"2020","journal-title":"Int Conf on Learning Representations"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01057"},{"key":"ref58","article-title":"Federated learning with non-IID data","author":"zhao","year":"2018"},{"key":"ref53","first-page":"6003","article-title":"Differentially-private federated linear bandits","author":"dubey","year":"2020","journal-title":"Proc Adv Neural Inf Process Syst Annu 33rd Conf Neural Inf Process Syst"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6096"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.119"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.07.044"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/571"},{"key":"ref50","article-title":"Learning differentially private recurrent language models","author":"mcmahan","year":"2018","journal-title":"Proc 6th Int Conf Learn Representations"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.22"},{"key":"ref45","first-page":"1876","article-title":"Multiparty differential privacy via aggregation of locally trained classifiers","author":"pathak","year":"2010","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2905237"},{"key":"ref42","first-page":"214","article-title":"Wasserstein generative adversarial networks","author":"arjovsky","year":"2017","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref41","first-page":"7333","article-title":"Modeling tabular data using conditional GAN","author":"xu","year":"2019","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref43","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"Proc Int Conf Artif Intell Statist"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177733"},{"key":"ref7","first-page":"3571","article-title":"Collecting telemetry data privately","author":"ding","year":"2017","journal-title":"Proc 31st Int Conf Neural Inf Process Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3226070"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3197390"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref40","first-page":"1226","article-title":"Subsampled renyi differential privacy and analytical moments accountant","author":"wang","year":"2019","journal-title":"Proc Int Conf Artif Intell Statist"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2679189"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14778\/3364324.3364332"},{"key":"ref31","first-page":"5769","article-title":"Improved training of wasserstein GANs","author":"gulrajani","year":"2017","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref30","first-page":"263","article-title":"R&#x00E9;nyi differential privacy","author":"mironov","year":"2017","journal-title":"Proc 30th IEEE Symp Foundations of Computer Science"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2897874"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2930696"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00018"},{"key":"ref23","article-title":"Scalable private learning with PATE","author":"papernot","year":"2018","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref26","first-page":"2672","article-title":"Generative adversarial nets","author":"goodfellow","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst Annu 27th Conf Neural Inf Process Syst"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.058"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588573"},{"key":"ref22","article-title":"Differentially private generative adversarial network","author":"xie","year":"2018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783379"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref29","first-page":"14747","article-title":"Deep leakage from gradients","author":"zhu","year":"2019","journal-title":"Proc Adv Neural Inf Process Syst Annu 32nd Conf Neural Inf Process Syst"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.07.066"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.06.021"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.07.001"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3191492"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2874004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref99","first-page":"8216","article-title":"The impact of record linkage on learning from feature partitioned data","author":"nock","year":"2021","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00053"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369034"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2906610"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3452839"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"673","DOI":"10.14778\/3055330.3055334","article-title":"SMCQL: Secure query processing for private data networks","volume":"10","author":"bater","year":"2017","journal-title":"Proc VLDB Endowment"},{"key":"ref95","article-title":"Scaling private record linkage using output constrained differential privacy","author":"he","year":"2017"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134030"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.14778\/3291264.3291274"},{"key":"ref90","article-title":"Federated deep learning architecture for personalized healthcare","volume":"281","author":"mckillop","year":"2021","journal-title":"Public Health Inform Proc MIE"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3197390"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407854"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.11.006"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342274"},{"key":"ref87","first-page":"603","article-title":"Crypt: Crypto-assisted differential privacy on untrusted servers","author":"chowdhury","year":"2020","journal-title":"Proc ACM SIGMOD Int Conf Manage Data"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2701817"},{"key":"ref81","article-title":"Semi-supervised knowledge transfer for deep learning from private training data","author":"papernot","year":"2017","journal-title":"Proc Int Conf Learn Representations"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2020.2997732"},{"key":"ref83","first-page":"643","article-title":"Efficient and privacy preserving approximation of distributed statistical queries","volume":"7","author":"derbeko","year":"2021","journal-title":"IEEE Trans Big Data"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i4.20333"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16563"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557222"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2023.3241661"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2715334"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.14778\/3430915.3430927"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/MDM55031.2022.00035"},{"key":"ref2","article-title":"An introduction to the california consumer privacy act (CCPA)","author":"goldman","year":"2020"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.06.043"},{"key":"ref71","article-title":"Improving federated learning personalization via model agnostic meta learning","author":"jiang","year":"2019"},{"key":"ref70","article-title":"Personalized federated learning: A meta-learning approach","author":"fallah","year":"2020"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3015958"},{"key":"ref72","article-title":"Federated user representation learning","author":"bui","year":"2019"},{"key":"ref68","article-title":"Communication-efficient on-device machine learning: Federated distillation and augmentation under non-IID private data","author":"jeong","year":"2018"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW53098.2021.00369"},{"key":"ref69","article-title":"Federated learning via synthetic data","author":"goetz","year":"2020"},{"key":"ref64","first-page":"7611","article-title":"Tackling the objective inconsistency problem in heterogeneous federated optimization","author":"wang","year":"2020","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref63","first-page":"2351","article-title":"Ensemble distillation for robust model fusion in federated learning","volume":"33","author":"lin","year":"2020","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref66","article-title":"Federated learning with matched averaging","author":"wang","year":"2020"},{"key":"ref65","first-page":"7252","article-title":"Bayesian nonparametric federated learning of neural networks","author":"yurochkin","year":"2019","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref60","first-page":"5132","article-title":"Scaffold: Stochastic controlled averaging for federated learning","author":"karimireddy","year":"2020","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref62","article-title":"Measuring the effects of non-identical data distribution for federated visual classification","author":"hsu","year":"2019"},{"key":"ref61","article-title":"Federated learning based on dynamic regularization","author":"acar","year":"2021"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/10177823\/10129015.pdf?arnumber=10129015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T18:23:39Z","timestamp":1690914219000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10129015\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,1]]},"references-count":99,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2023.3277716","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,1]]}}}