{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T23:52:41Z","timestamp":1775692361261,"version":"3.50.1"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tc.2022.3230904","type":"journal-article","created":{"date-parts":[[2022,12,20]],"date-time":"2022-12-20T18:51:08Z","timestamp":1671562268000},"page":"1-14","source":"Crossref","is-referenced-by-count":26,"title":["PrivAim: A Dual-Privacy Preserving and Quality-Aware Incentive Mechanism for Federated Learning"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8132-9785","authenticated-orcid":false,"given":"Dan","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2782-183X","authenticated-orcid":false,"given":"Ju","family":"Ren","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5804-3279","authenticated-orcid":false,"given":"Zhibo","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Central South University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6575-1954","authenticated-orcid":false,"given":"Yichuan","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Xi&#x0027;an University of Technology, Xi&#x0027;an, China"}]},{"given":"Yaoxue","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"crossref","first-page":"9575","DOI":"10.1109\/JIOT.2020.2985694","article-title":"Hierarchical incentive mechanism design for federated machine learning in mobile networks","volume":"7","author":"yang","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488743"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2017.2663430"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940820"},{"key":"ref14","first-page":"183","article-title":"Towards blockchain-based reputation-aware federated learning","author":"salah","year":"2020","journal-title":"Proc IEEE Conf Comput Commun Workshops"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3036944"},{"key":"ref30","article-title":"Federated learning with non-iid data","author":"zhao","year":"2018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2967772"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2680845"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS51746.2020.00016"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3047105"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref1","article-title":"A novel attribute reconstruction attack in federated learning","author":"lyu","year":"2021"},{"key":"ref17","first-page":"2438","article-title":"DeepChain: Auditable and privacy-preserving deep learning with blockchain-based incentive","volume":"18","author":"weng","year":"2021","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3169436"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3100096"},{"key":"ref18","article-title":"When crowdsensing meets federated learning: Privacy-preserving mobile crowdsensing system","author":"zhao","year":"2021"},{"key":"ref24","article-title":"Learning differentially private recurrent language models","author":"mcmahan","year":"2017"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref26","first-page":"2251","article-title":"Federated F-differential privacy","author":"zheng","year":"2021","journal-title":"Proc Int Conf Artif Intell Statist"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59410-7_33"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322475"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3050163"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3118354"},{"key":"ref28","first-page":"1895","article-title":"Evaluating differentially private machine learning in practice","author":"jayaraman","year":"2019","journal-title":"Proc Usenix Secur Symp"},{"key":"ref27","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"Proc Int Conf Artif Intell Statist"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61996-8_37"},{"key":"ref8","article-title":"Incentive mechanism for privacy-preserving federated learning","author":"zheng","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2994639"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737594"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3093552"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3134647"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/4358213\/09994045.pdf?arnumber=9994045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T15:19:12Z","timestamp":1686323952000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9994045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/tc.2022.3230904","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"value":"0018-9340","type":"print"},{"value":"1557-9956","type":"electronic"},{"value":"2326-3814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}