{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T04:53:11Z","timestamp":1743915191130,"version":"3.37.3"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010242","name":"Jiangsu Planned Projects for Postdoctoral Research Funds","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100010242","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1109\/wcnc55385.2023.10118613","type":"proceedings-article","created":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T17:35:33Z","timestamp":1683912933000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Efficient Privacy-Preserving Federated Learning Against Inference Attacks for IoT"],"prefix":"10.1109","author":[{"given":"Yifeng","family":"Miao","sequence":"first","affiliation":[{"name":"Nanjing University of Posts and Telecommunications,School of Internet of Things,Nanjing,China"}]},{"given":"Siguang","family":"Chen","sequence":"additional","affiliation":[{"name":"Nanjing University of Posts and Telecommunications,School of Internet of Things,Nanjing,China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref12","first-page":"994","article-title":"CAFE: Catastrophic data leakage in vertical federated learning","author":"jin","year":"2021","journal-title":"Proc Int Conf Neural Inf Proces Syst (NeurIPS)"},{"key":"ref15","article-title":"Differentially private federated learning: A client level perspective","author":"geyer","year":"2017","journal-title":"arXiv preprint arXiv 1712 07557"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01607"},{"key":"ref10","first-page":"16937","article-title":"Inverting gradients - How easy is it to break privacy in federated learning?","author":"geiping","year":"2020","journal-title":"Proc Int Conf Neural Inf Proces Syst (NeurIPS)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3075439"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3090430"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00919"},{"key":"ref16","first-page":"1","article-title":"Deep gradient compression: Reducing the communication bandwidth for distributed training","author":"lin","year":"2018","journal-title":"Proc Int Conf Mach Learn (ICML)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102378"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.00018"},{"key":"ref24","first-page":"2782","article-title":"Bayesian coresets: Revisiting the nonconvex optimization perspective","author":"zhang","year":"2021","journal-title":"Proc Int Conf Artif Intell Stat (AISTATS)"},{"key":"ref23","article-title":"1-bit compressive sensing for efficient federated learning over the air","author":"fan","year":"2021","journal-title":"IEEE Trans Wireless Commun"},{"key":"ref25","article-title":"Fedlab: A flexible federated learning framework","author":"zeng","year":"2021","journal-title":"arXiv preprint arXiv 2107 11621"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.871582"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3073112"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/app10175909"},{"key":"ref8","first-page":"14774","article-title":"Deep leakage from gradients","author":"zhu","year":"2019","journal-title":"Proc Int Conf Neural Inf Proces Syst (NeurIPS)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref9","article-title":"iDLG: Improved deep leakage from gradients","author":"zhao","year":"2020","journal-title":"arXiv preprint arXiv 2001 04786"},{"key":"ref4","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"brendan","year":"2017","journal-title":"Proc Int Conf Artif Intell Stat (AISTATS)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-6265-282-8"},{"key":"ref6","first-page":"2938","article-title":"How to backdoor federated learning","author":"bagdasaryan","year":"2020","journal-title":"Proc Int Conf Artif Intell Stat (AISTATS)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140451"}],"event":{"name":"2023 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2023,3,26]]},"location":"Glasgow, United Kingdom","end":{"date-parts":[[2023,3,29]]}},"container-title":["2023 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10118584\/10118587\/10118613.pdf?arnumber=10118613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T17:31:32Z","timestamp":1685381492000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10118613\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/wcnc55385.2023.10118613","relation":{},"subject":[],"published":{"date-parts":[[2023,3]]}}}