{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:33:32Z","timestamp":1774938812004,"version":"3.50.1"},"reference-count":79,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing"},{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12441101"],"award-info":[{"award-number":["12441101"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U25B2070"],"award-info":[{"award-number":["U25B2070"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372493"],"award-info":[{"award-number":["62372493"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Natural Science Foundation","award":["Z230001"],"award-info":[{"award-number":["Z230001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/tnse.2026.3665223","type":"journal-article","created":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T21:08:14Z","timestamp":1771276094000},"page":"7650-7666","source":"Crossref","is-referenced-by-count":0,"title":["Beyond LDP-FL: Independent Uplink\u2013Downlink Privacy Protection in Federated Learning"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-5970-3186","authenticated-orcid":false,"given":"Dongrun","family":"Li","sequence":"first","affiliation":[{"name":"Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing, and the School of Artificial Intelligence, Beihang University, Beijing, China"}]},{"given":"Yun","family":"Zeng","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1878-3547","authenticated-orcid":false,"given":"Faguo","family":"Wu","sequence":"additional","affiliation":[{"name":"Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing, the School of Artificial Intelligence, and the Key Laboratory of Mathematics, Informatics and Behavioral Semantics, Beihang University, Beijing, China"}]},{"given":"Jiancheng","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing, and the School of Artificial Intelligence, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9220-2694","authenticated-orcid":false,"given":"Qinnan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing, and the School of Artificial Intelligence, Beihang University, Beijing, China"}]},{"given":"Binghui","family":"Guo","sequence":"additional","affiliation":[{"name":"Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing, and the School of Artificial Intelligence, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4927-5016","authenticated-orcid":false,"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Mathematical Sciences, the Key Laboratory of Mathematics, Informatics and Behavioral Semantics, the Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing, Beihang University, Beijing, China"}]},{"given":"Zhiming","family":"Zheng","sequence":"additional","affiliation":[{"name":"Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing, and the School of Artificial Intelligence, Beihang University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179344"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102538"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2923261"},{"key":"ref4","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. intell. Statist.","author":"McMahan","year":"2017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3608665"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3621865"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3769811"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3056991"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413764"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3595185"},{"key":"ref14","first-page":"279","article-title":"Leveraging federated learning and edge computing for recommendation systems within cloud computing networks","volume":"13210","author":"Qi","year":"2024","journal-title":"3rd Int. Symp. Comput. Appl. Inf. Syst."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3095506"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3387417"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref18","first-page":"694","article-title":"LightSecAgg: A lightweight and versatile design for secure aggregation in federated learning","volume-title":"Proc. Mach. Learn. Syst.","volume":"4","author":"So","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0009"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2846736"},{"key":"ref21","article-title":"On the relationship between (secure) multi-party computation and (secure) federated learning","author":"Zhu","year":"2020"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3603166.3632144"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-46781-3_27"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2025.3566140"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00054"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3170348"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466628"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3264259"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701080"},{"key":"ref30","first-page":"17455","article-title":"Differentially private learning with adaptive clipping","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"34","author":"Andrew","year":"2021"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488825"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2991416"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102631"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1162\/99608f92.cfc5dd25"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-0859-8_2"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3743093.3771045"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2025.3546777"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.48"},{"key":"ref39","first-page":"263","article-title":"Rnyi differential privacy","volume-title":"Proc. IEEE Comput. Secur. Found. Symp.","author":"Mironov","year":"2017"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"ref41","article-title":"Adaptive differential privacy in federated learning: A priority-based approach","author":"Talaei","year":"2024"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.09.015"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3100096"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622685"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.52202\/079017-2869"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2025\/541"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.52202\/075280-1808"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2025.3568030"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2025.3618185"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3130060"},{"key":"ref51","article-title":"Rethinking layer-wise Gaussian noise injection: Bridging implicit objectives and privacy budget allocation","author":"Tan","year":"2025"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3596627"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2025.3539008"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2023.0218"},{"key":"ref55","first-page":"24693","article-title":"Shape and structure preserving differential privacy","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"35","author":"Soto","year":"2022"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.52202\/075280-3160"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.151"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_13"},{"key":"ref59","first-page":"2521","article-title":"Shuffled model of differential privacy in federated learning","volume-title":"Proc. Int. Conf., Proc. Artif. Intell. Statist.","author":"Girgis","year":"2021"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i10.29005"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3528535.3565240"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690224"},{"key":"ref63","first-page":"5743","article-title":"PrivSGP-VR: Differentially private variance-reduced stochastic gradient push with tight utility bounds","volume-title":"Proc. Int. Jt. Conf. Artif. Intell.","author":"Zhu","year":"2024"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICTCS.2017.60"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3517804.3524144"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-20099-1_15"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE65448.2025.00257"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2023.3329832"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"ref72","article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017"},{"key":"ref73","article-title":"LEAF: A benchmark for federated settings","author":"Caldas","year":"2018"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-4012"},{"key":"ref75","first-page":"142","article-title":"Learning word vectors for sentiment analysis","volume-title":"Proc. Annu. Meet. Assoc. Comput. Linguist","author":"Maas","year":"2011"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378043"},{"key":"ref78","article-title":"IDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s10589-022-00351-5"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488902\/11264281\/11397291.pdf?arnumber=11397291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T05:06:01Z","timestamp":1774933561000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11397291\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":79,"URL":"https:\/\/doi.org\/10.1109\/tnse.2026.3665223","relation":{},"ISSN":["2327-4697","2334-329X"],"issn-type":[{"value":"2327-4697","type":"electronic"},{"value":"2334-329X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]}}}