{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:23Z","timestamp":1750220543985,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,28]],"date-time":"2021-06-28T00:00:00Z","timestamp":1624838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,28]]},"DOI":"10.1145\/3468218.3469044","type":"proceedings-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T17:52:26Z","timestamp":1624297946000},"page":"25-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient and Privacy-preserving Distributed Learning in Cloud-Edge Computing Systems"],"prefix":"10.1145","author":[{"given":"Yili","family":"Jiang","sequence":"first","affiliation":[{"name":"University of Nebraska-Lincoln, Lincoln, NE, USA"}]},{"given":"Kuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Nebraska-Lincoln, Lincoln, NE, USA"}]},{"given":"Yi","family":"Qian","sequence":"additional","affiliation":[{"name":"University of Nebraska-Lincoln, Lincoln, NE, USA"}]},{"given":"Rose Qingyang","family":"Hu","sequence":"additional","affiliation":[{"name":"Utah State University, Logan, UT, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,28]]},"reference":[{"volume-title":"Retrieved","year":"2021","key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Breast Cancer Wisconsin (Diagnostic) Data Set . Retrieved March 20, 2021 from https:\/\/www.kaggle.com\/uciml\/breast-cancer-wisconsin-data [n.d.]. Breast Cancer Wisconsin (Diagnostic) Data Set. Retrieved March 20, 2021 from https:\/\/www.kaggle.com\/uciml\/breast-cancer-wisconsin-data"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3030072"},{"key":"#cr-split#-e_1_3_2_1_3_1.1","doi-asserted-by":"crossref","unstructured":"Z. He T. Zhang and R. B. Lee. 2020. Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems. IEEE Internet of Things Journal (2020) 1--1. https:\/\/doi.org\/10.1109\/JIOT.2020.3022358 10.1109\/JIOT.2020.3022358","DOI":"10.1109\/JIOT.2020.3022358"},{"key":"#cr-split#-e_1_3_2_1_3_1.2","doi-asserted-by":"crossref","unstructured":"Z. He T. Zhang and R. B. Lee. 2020. Attacking and Protecting Data Privacy in Edge-Cloud Collaborative Inference Systems. IEEE Internet of Things Journal (2020) 1--1. https:\/\/doi.org\/10.1109\/JIOT.2020.3022358","DOI":"10.1109\/JIOT.2020.3022358"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2859420"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2809624"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3003307"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2952146"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"S. Shen T. Zhu D. Wu W. Wang and year=2020 publisher=Wiley Online Library W. Zhou journal=Concurrency and Computation: Practice and Experience. [n.d.]. From distributed machine learning to federated learning: In the view of data privacy and security. ([n. d.]).  S. Shen T. Zhu D. Wu W. Wang and year=2020 publisher=Wiley Online Library W. Zhou journal=Concurrency and Computation: Practice and Experience. [n.d.]. From distributed machine learning to federated learning: In the view of data privacy and security. ([n. d.]).","DOI":"10.1002\/cpe.6002"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2722358"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023084"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2880722"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2018.2805723"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3035398"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2933437"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2607691"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3010335"}],"event":{"name":"WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Abu Dhabi United Arab Emirates","acronym":"WiSec '21"},"container-title":["Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469044","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468218.3469044","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:07Z","timestamp":1750195687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468218.3469044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,28]]},"references-count":18,"alternative-id":["10.1145\/3468218.3469044","10.1145\/3468218"],"URL":"https:\/\/doi.org\/10.1145\/3468218.3469044","relation":{},"subject":[],"published":{"date-parts":[[2021,6,28]]},"assertion":[{"value":"2021-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}