{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:42:06Z","timestamp":1774942926725,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Platform of Computer and Communication provided by ShanghaiTech University and the Innovation Academy for Microsatellites of Chinese Academy of Sciences","award":["2024X0203-501-09"],"award-info":[{"award-number":["2024X0203-501-09"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62106057"],"award-info":[{"award-number":["62106057"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2242024k30059"],"award-info":[{"award-number":["2242024k30059"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2024.3524160","type":"journal-article","created":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T19:22:55Z","timestamp":1735586575000},"page":"1222-1236","source":"Crossref","is-referenced-by-count":4,"title":["Privacy-Preserving Coded Schemes for Multi-Server Federated Learning With Straggling Links"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-7538-8524","authenticated-orcid":false,"given":"Kai","family":"Liang","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China"}]},{"given":"Songze","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering and the Engineering Research Center of Blockchain Application, Supervision and Management, Ministry of Education, Southeast University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3690-0321","authenticated-orcid":false,"given":"Ming","family":"Ding","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2091-9412","authenticated-orcid":false,"given":"Feng","family":"Tian","sequence":"additional","affiliation":[{"name":"Innovation Academy for Microsatellites, Chinese Academy of Sciences, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4383-9995","authenticated-orcid":false,"given":"Youlong","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, ShanghaiTech University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","volume":"54","author":"McMahan"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736861"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.56"},{"key":"ref6","article-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017","journal-title":"arXiv:1712.07557"},{"key":"ref7","article-title":"Learning differentially private recurrent language models","author":"McMahan","year":"2017","journal-title":"arXiv:1710.06963"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref10","first-page":"5201","article-title":"The distributed discrete Gaussian mechanism for federated learning with secure aggregation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Kairouz"},{"key":"ref11","first-page":"7575","article-title":"CpSGD: Communication-efficient and differentially-private distributed SGD","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"31","author":"Agarwal"},{"key":"ref12","first-page":"5052","article-title":"The Skellam mechanism for differentially private federated learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Agarwal"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/2283137"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"ref16","first-page":"2436","article-title":"Discrete distribution estimation under local privacy","volume-title":"Proc. 33rd Int. Conf. Mach. Learn.","volume":"48","author":"Kairouz"},{"key":"ref17","first-page":"110","article-title":"Secure multi-party computation","volume":"78","author":"Goldreich","year":"1998","journal-title":"Manuscript. Preliminary Version"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417885"},{"key":"ref21","article-title":"FastSecAgg: Scalable secure aggregation for privacy-preserving federated learning","author":"Kadhe","year":"2020","journal-title":"arXiv:2009.11248"},{"key":"ref22","article-title":"Secure aggregation for buffered asynchronous federated learning","author":"So","year":"2021","journal-title":"arXiv:2110.02177"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3054610"},{"key":"ref24","first-page":"694","article-title":"LightSecAgg: A lightweight and versatile design for secure aggregation in federated learning","volume-title":"Proc. Mach. Learn. Syst.","author":"So"},{"key":"ref25","article-title":"Secure aggregation with heterogeneous quantization in federated learning","author":"Elkordy","year":"2020","journal-title":"arXiv:2009.14388"},{"key":"ref26","article-title":"SwiftAgg+: Achieving asymptotically optimal communication loads in secure aggregation for federated learning","author":"Jahani-Nezhad","year":"2022","journal-title":"arXiv:2203.13060"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834750"},{"key":"ref28","article-title":"DReS-FL: Dropout-resilient secure federated learning for non-IID clients via secret data sharing","author":"Shao","year":"2022","journal-title":"arXiv:2210.02680"},{"key":"ref29","article-title":"On the information theoretic secure aggregation with uncoded groupwise keys","author":"Wan","year":"2022","journal-title":"arXiv:2204.11364"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3192874"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330885"},{"key":"ref33","first-page":"267","article-title":"The secret sharer: Evaluating and testing unintended memorization in neural networks","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Carlini"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref35","first-page":"3056","article-title":"The fundamental price of secure aggregation in differentially private federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Chen"},{"key":"ref36","article-title":"Secure Byzantine-robust machine learning","author":"He","year":"2020","journal-title":"arXiv:2006.04747"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3005909"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3165400"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90567-5_26"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174077"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3142356"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref44","first-page":"1215","article-title":"Lagrange coded computing: Optimal design for resiliency, security, and privacy","volume-title":"Proc. 22nd Int. Conf. Artif. Intell. Statist.","author":"Yu"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/10818498.pdf?arnumber=10818498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,27]],"date-time":"2025-01-27T18:40:00Z","timestamp":1738003200000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10818498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3524160","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}