{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:44:23Z","timestamp":1774950263164,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,4,1]],"date-time":"2024-04-01T00:00:00Z","timestamp":1711929600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021ZD0112803"],"award-info":[{"award-number":["2021ZD0112803"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62122066"],"award-info":[{"award-number":["62122066"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20A20182"],"award-info":[{"award-number":["U20A20182"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872274"],"award-info":[{"award-number":["61872274"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102337"],"award-info":[{"award-number":["62102337"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Program of Zhejiang","award":["2022C01018"],"award-info":[{"award-number":["2022C01018"]}]},{"name":"Hangzhou Leading Innovation and Entrepreneurship Team","award":["TD2020003"],"award-info":[{"award-number":["TD2020003"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1109\/tnet.2023.3317870","type":"journal-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T17:59:24Z","timestamp":1695751164000},"page":"1407-1422","source":"Crossref","is-referenced-by-count":52,"title":["Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving Federated Learning"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8771-7474","authenticated-orcid":false,"given":"Jiahui","family":"Hu","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5804-3279","authenticated-orcid":false,"given":"Zhibo","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"}]},{"given":"Yongsheng","family":"Shen","sequence":"additional","affiliation":[{"name":"Hangzhou City Brain Company Ltd., Hangzhou, China"}]},{"given":"Bohan","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6221-8142","authenticated-orcid":false,"given":"Peng","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2763-2695","authenticated-orcid":false,"given":"Xiaoyi","family":"Pang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2636-5561","authenticated-orcid":false,"given":"Jian","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1969-2591","authenticated-orcid":false,"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Zhejiang University, Hangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref2","article-title":"Federated learning for mobile keyboard prediction","author":"Hard","year":"2018","journal-title":"arXiv:1811.03604"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-2944"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-3023"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2018.01.007"},{"key":"ref6","first-page":"313","article-title":"Predicting adverse drug reactions on distributed health data using federated learning","volume-title":"Proc. AMIA Annu. Symp","author":"Choudhury"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-021-00489-2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_17"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23551-2_2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24293"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00065"},{"key":"ref12","article-title":"ML-leaks: Model and data independent membership inference attacks and defenses on machine learning models","author":"Salem","year":"2018","journal-title":"arXiv:1806.01246"},{"key":"ref13","first-page":"2615","article-title":"Systematic evaluation of privacy risks of machine learning models","volume-title":"Proc. 30th USENIX Secur. Symp. (USENIX Security)","author":"Song"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134077"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243834"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref19","first-page":"16937","article-title":"Inverting gradients-how easy is it to break privacy in federated learning?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Geiping"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01607"},{"key":"ref22","article-title":"IDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020","journal-title":"arXiv:2001.02610"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref24","article-title":"A framework for evaluating gradient leakage attacks in federated learning","author":"Wei","year":"2020","journal-title":"arXiv:2004.10397"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref26","article-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017","journal-title":"arXiv:1712.07557"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220076"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3139777"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155359"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00019"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.23919\/cje.2022.00.031"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000372"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00081"},{"key":"ref35","first-page":"1","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Blanchard"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796841"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3110052"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"ref43","article-title":"Concentrated differential privacy","author":"Dwork","year":"2016","journal-title":"arXiv:1603.01887"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"ref45","volume-title":"The MNIST Database of Handwritten Digits","author":"LeCun","year":"1998"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/BF01589116"},{"key":"ref47","first-page":"1","article-title":"Note on learning rate schedules for stochastic optimization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"3","author":"Darken"},{"key":"ref48","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky"},{"key":"ref49","article-title":"Labeled faces in the wild: A database for studying face recognition in unconstrained environments","author":"Huang","year":"2007"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10505042\/10264857.pdf?arnumber=10264857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,19]],"date-time":"2024-04-19T17:38:44Z","timestamp":1713548324000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10264857\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":49,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2023.3317870","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4]]}}}