{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:14:57Z","timestamp":1775229297472,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Shandong Provincial Taishan Scholar Program, China","award":["tsqn202312133"],"award-info":[{"award-number":["tsqn202312133"]}]},{"name":"Shandong Provincial Natural Science Foundation, China","award":["ZR2022YQ61"],"award-info":[{"award-number":["ZR2022YQ61"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772551"],"award-info":[{"award-number":["61772551"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62111530052"],"award-info":[{"award-number":["62111530052"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shandong Provincial Natural Science Foundation, China","award":["ZR2023ZD32"],"award-info":[{"award-number":["ZR2023ZD32"]}]},{"name":"Innovation Fund Project for Graduate Student of China University of Petroleum"},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["23CX04036A"],"award-info":[{"award-number":["23CX04036A"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004377","name":"Hong Kong Polytechnic University","doi-asserted-by":"publisher","award":["UAJH"],"award-info":[{"award-number":["UAJH"]}],"id":[{"id":"10.13039\/501100004377","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1109\/tmc.2024.3443862","type":"journal-article","created":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T17:51:10Z","timestamp":1723744270000},"page":"14471-14483","source":"Crossref","is-referenced-by-count":11,"title":["Towards Adaptive Privacy Protection for Interpretable Federated Learning"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6979-3972","authenticated-orcid":false,"given":"Zhe","family":"Li","sequence":"first","affiliation":[{"name":"College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0739-6338","authenticated-orcid":false,"given":"Honglong","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4797-6751","authenticated-orcid":false,"given":"Zhichen","family":"Ni","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0264-6545","authenticated-orcid":false,"given":"Yudong","family":"Gao","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, China University of Petroleum (East China), Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9784-5741","authenticated-orcid":false,"given":"Wei","family":"Lou","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Data-free one-shot federated learning under very high statistical heterogeneity","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Heinbaugh"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3070013"},{"key":"ref3","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref4","first-page":"2351","article-title":"Ensemble distillation for robust model fusion in federated learning","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Lin"},{"key":"ref5","first-page":"5201","article-title":"The distributed discrete Gaussian mechanism for federated learning with secure aggregation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Kairouz"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-020-00323-1"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-021-01506-3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6824"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3118352"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3150363"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.74"},{"key":"ref12","first-page":"14774","article-title":"Deep leakage from gradients","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Zhu"},{"key":"ref13","article-title":"iDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3139777"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796841"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228919"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00502"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3343288"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2018.00097"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533235"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5827"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s13748-024-00315-2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/tbdata.2022.3188292"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14778\/3603581.3603588"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2021.06.030"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid49817.2020.00-52"},{"key":"ref30","first-page":"4961","article-title":"CRYPTEN: Secure multi-party computation meets machine learning","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Knott"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref32","first-page":"1945","article-title":"Personalization improves privacy-accuracy tradeoffs in federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Bietti"},{"key":"ref33","first-page":"5052","article-title":"The skellam mechanism for differentially private federated learning","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Agarwal"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-3020"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i3.16344"},{"key":"ref36","first-page":"4765","article-title":"A unified approach to interpreting model predictions","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Lundberg"},{"key":"ref37","first-page":"16 937","article-title":"Inverting gradients - How easy is it to break privacy in federated learning?","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Geiping"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2023.3317870"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-1005694\/v1"},{"key":"ref40","first-page":"1","article-title":"On the convergence of FedAvg on Non-IID data","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Li"},{"key":"ref41","article-title":"The MNIST database of handwritten digits","author":"LeCun","year":"1998"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2020.105474"},{"key":"ref43","article-title":"Animals-10 dataset, animal pictures of 10 different categories taken from Google images","author":"Alessio","year":"2020"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/7755\/10746253\/10637763.pdf?arnumber=10637763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:27:06Z","timestamp":1732667226000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10637763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":43,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2024.3443862","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12]]}}}