{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:16:38Z","timestamp":1775880998603,"version":"3.50.1"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2112471"],"award-info":[{"award-number":["2112471"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF-SNSF Joint Program","award":["ECCS 2444615"],"award-info":[{"award-number":["ECCS 2444615"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tdsc.2025.3568704","type":"journal-article","created":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T14:03:32Z","timestamp":1746799412000},"page":"5567-5583","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Full-Stack Private Federated Deep Learning With Post-Quantum Security"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2188-8865","authenticated-orcid":false,"given":"Yiwei","family":"Zhang","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0423-7606","authenticated-orcid":false,"given":"Rouzbeh","family":"Behnia","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8680-9307","authenticated-orcid":false,"given":"Attila Altay","family":"Yavuz","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1367-3338","authenticated-orcid":false,"given":"Reza","family":"Ebrahimi","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4029-7051","authenticated-orcid":false,"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"2633","article-title":"Extracting training data from large language models","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Carlini","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref3","first-page":"267","article-title":"The secret sharer: Evaluating and testing unintended memorization in neural networks","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Carlini","year":"2019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179468"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC63791.2024.00069"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417885"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660280"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3586102.3586120"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8105"},{"key":"ref12","article-title":"Nist post-quantum cryptography standardization","year":"2024"},{"key":"ref13","article-title":"Report on post-quantum cryptogrphy","year":"2024"},{"key":"ref14","article-title":"Nist selected post-quantum cryptography algorithms 2022","year":"2024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243819"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488023"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref19","first-page":"699","article-title":"$\\lbrace${VoltPillager$\\rbrace$}: Hardware-based fault injection attacks against intel $\\lbrace${ SGX$\\rbrace$} enclaves using the $\\lbrace${SVID$\\rbrace$} voltage scaling interface","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Chen","year":"2021"},{"key":"ref20","first-page":"991","article-title":"Foreshadow: Extracting the keys to the intel $\\lbrace${SGX $\\rbrace$} kingdom with transient $\\lbrace${Out-of-Order$\\rbrace$} execution","volume-title":"Proc. 27th USENIX Secur.","volume":"18","author":"Bulck","year":"2018"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17140-6_10"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1561\/9781680837896"},{"key":"ref24","first-page":"4623","article-title":"Privacy amplification via random check-ins","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Balle","year":"2020"},{"key":"ref25","article-title":"Training production language models without memorizing user data","author":"Ramaswamy","year":"2020"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179434"},{"key":"ref27","first-page":"714","article-title":"MicroFedML: Privacy preserving federated learning for small weights","volume-title":"Proc. 4th Privacy-Preserving Mach. Learn. Workshop 2022","author":"Guo","year":"2022"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2018.i1.238-268"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462108"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243819"},{"key":"ref32","article-title":"CRYSTALS\u2013Dilithium: Digital signatures from module lattices","author":"Ducas","year":"2017","journal-title":"Cryptol. ePrint Arch."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/217"},{"key":"ref34","article-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017"},{"key":"ref35","first-page":"1595","article-title":"$\\lbrace${PrivateFL$\\rbrace$}: Accurate, differentially private federated learning via personalized data transformation","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Yang","year":"2023"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417885"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44223-1_5"},{"key":"ref38","first-page":"78696","article-title":"Bounding training data reconstruction in DP-SGD","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"36","author":"Hayes","year":"2023"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_15"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA62245.2024.00067"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81293-5_20"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3384441.3395986"},{"key":"ref44","article-title":"Crystals-kyber python implementation","year":"2024"},{"key":"ref45","article-title":"Crystals-dilithium c implementation","year":"2024"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-021-09398-9"},{"key":"ref47","article-title":"Flower: A friendly federated learning research framework","author":"Beutel","year":"2020"},{"key":"ref48","article-title":"Pytorch opacus","year":"2024"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"ref50","article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966217"},{"key":"ref52","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1038\/srep27988"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3146448"},{"key":"ref55","first-page":"4805","article-title":"$\\lbrace${ACORN$\\rbrace$}: Input validation for secure aggregation","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Bell","year":"2023"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560611"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-96-0954-3_4"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC63791.2024.00069"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179400"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3093711"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3043139"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8858\/11150357\/10994375-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11150357\/10994375.pdf?arnumber=10994375","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T18:52:42Z","timestamp":1757011962000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10994375\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":61,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3568704","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}