{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T13:44:18Z","timestamp":1774964658316,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U24B20187"],"award-info":[{"award-number":["U24B20187"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62371250"],"award-info":[{"award-number":["62371250"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92367302"],"award-info":[{"award-number":["92367302"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62101283"],"award-info":[{"award-number":["62101283"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tnse.2025.3568030","type":"journal-article","created":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T14:01:37Z","timestamp":1746799297000},"page":"4044-4059","source":"Crossref","is-referenced-by-count":4,"title":["Adaptive Noise Trap of Layered Differential Privacy Against Privacy Leakage for Large-Scale Industrial Federated Learning"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3539-3532","authenticated-orcid":false,"given":"Haitao","family":"Zhao","sequence":"first","affiliation":[{"name":"School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6094-5774","authenticated-orcid":false,"given":"Chenyue","family":"Pan","sequence":"additional","affiliation":[{"name":"School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1385-266X","authenticated-orcid":false,"given":"Miao","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1032-4434","authenticated-orcid":false,"given":"Donglai","family":"Jiao","sequence":"additional","affiliation":[{"name":"School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4578-2715","authenticated-orcid":false,"given":"Hongbo","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Communications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2021.10.006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023507"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3051414"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2696365"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3287395"},{"key":"ref6","article-title":"Federated learning: Opportunities and challenges","author":"Mammen","year":"2021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.2100102"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101061"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2023.01.022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCS52626.2021.9449232"},{"key":"ref12","first-page":"1605","article-title":"Local model poisoning attacks to {Byzantine-robust} federated learning","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Fang","year":"2020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24498"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3461449"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/tiv.2024.3378288"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148790"},{"key":"ref17","article-title":"A novel attribute reconstruction attack in federated learning","author":"Lyu","year":"2021"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3356821"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.18280\/ria.360106"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref21","article-title":"iDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3505838"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3131258"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2981379"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3485130"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3274037"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3155522"},{"issue":"5","key":"ref28","first-page":"2139","article-title":"Evolution of mobile wireless communication to 5G revolution","volume":"62","author":"Salih","year":"2020","journal-title":"Technol. Rep. Kansai Univ."},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3126052"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ACA52198.2021.9626810"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.011.2200547"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-36784-7","volume-title":"Data Traffic Monitoring and Analysis","author":"Biersack","year":"2013"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2017.7899588"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00068"},{"key":"ref35","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"McMahan","year":"2017"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00013"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3008091"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref41","article-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom56396.2022.00094"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155359"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3293961"},{"key":"ref45","first-page":"16937","article-title":"Inverting gradients-how easy is it to break privacy in federated learning?","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Geiping","year":"2020"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-77428-0"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-024-06845-9"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/11134536\/10994845.pdf?arnumber=10994845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T17:36:27Z","timestamp":1761672987000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10994845\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":47,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2025.3568030","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}