{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T14:45:59Z","timestamp":1773326759544,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,23]],"date-time":"2021-10-23T00:00:00Z","timestamp":1634947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,23]]},"DOI":"10.1145\/3495018.3495093","type":"proceedings-article","created":{"date-parts":[[2022,3,14]],"date-time":"2022-03-14T17:33:51Z","timestamp":1647279231000},"page":"428-435","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Privacy Protection in Federated Learning Based on Differential Privacy and Mutual Information"],"prefix":"10.1145","author":[{"given":"Shibo","family":"Wang","sequence":"first","affiliation":[{"name":"Shanghai Jiaotong University, China"}]},{"given":"Yunbo","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiaotong University, China"}]},{"given":"Aowei","family":"Zhao","sequence":"additional","affiliation":[{"name":"Shanghai Jiaotong University, China"}]},{"given":"Qiangmin","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiaotong University, China"}]}],"member":"320","published-online":{"date-parts":[[2022,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST)","author":"Yang Q","unstructured":"Yang Q , Liu Y , Chen T , Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) , vol. 10 , no. 2, pp. 1-19, 2019. Yang Q, Liu Y, Chen T, Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST), vol. 10, no. 2, pp. 1-19, 2019."},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved","author":"Hanchi R","year":"2021","unstructured":"Hanchi R , Jingjing D , Xianghua X. GRNN : Generative Regression Neu- ral Network \u2013 A Data Leakage Attack for Federated Learning. arXiv.org . Retrieved September 22, 2021 , from https:\/\/arxiv.org\/abs\/2105.00529v1. Hanchi R, Jingjing D, Xianghua X. GRNN: Generative Regression Neu- ral Network \u2013 A Data Leakage Attack for Federated Learning. arXiv.org. Retrieved September 22, 2021, from https:\/\/arxiv.org\/abs\/2105.00529v1."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2015.2472014"},{"key":"e_1_3_2_1_4_1","volume-title":"Differentially pri- vate federated learning: A client level perspective. arXiv preprint arXiv:1712.07557","author":"Robin C","year":"2017","unstructured":"Robin C Geyer , Tassilo Klein, and Moin Nabi . Differentially pri- vate federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 , 2017 . Robin C Geyer, Tassilo Klein, and Moin Nabi. Differentially pri- vate federated learning: A client level perspective. arXiv preprint arXiv:1712.07557, 2017."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00960ED2V01Y201910AIM043"},{"key":"e_1_3_2_1_6_1","first-page":"18","volume-title":"IEEE SP","author":"Reza Shokri","unstructured":"Reza Shokri , Marco Stronati, Congzheng Song , and Vitaly Shmatikov. Membership inference attacks against machine learning models . In IEEE SP , pages 3\u2013 18 . IEEE, 2017. Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. Membership inference attacks against machine learning models. In IEEE SP, pages 3\u201318. IEEE, 2017."},{"issue":"3","key":"e_1_3_2_1_7_1","article-title":"Survey on privacy attacks and defenses in machine learning","volume":"31","author":"Liu RX","year":"2020","unstructured":"Liu RX , Chen H , Guo RY , Zhao D , Liang WJ , Li CP . Survey on privacy attacks and defenses in machine learning . Ruan Jian Xue Bao\/Journal of Software , 2020 , vol. 31 , no. 3 , pp. 866892 (in Chinese). http:\/\/www.jos.org.cn\/1000- 9825\/5904.htm Liu RX, Chen H, Guo RY, Zhao D, Liang WJ, Li CP. Survey on privacy attacks and defenses in machine learning. Ruan Jian Xue Bao\/Journal of Software, 2020, vol. 31, no. 3, pp. 866892 (in Chinese). http:\/\/www.jos.org.cn\/1000- 9825\/5904.htm","journal-title":"Ruan Jian Xue Bao\/Journal of Software"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.007"},{"key":"e_1_3_2_1_9_1","volume-title":"Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST)","author":"Yang Q","unstructured":"Yang Q , Liu Y , Chen T , Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) , vol. 10 , no. 2, pp. 1-19, 2019. Yang Q, Liu Y, Chen T, Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST), vol. 10, no. 2, pp. 1-19, 2019."},{"issue":"3","key":"e_1_3_2_1_10_1","first-page":"866","volume":"31","author":"Liu Ruixuan","year":"2019","unstructured":"Liu Ruixuan , Chen Hong, Guo Ruoyang , Privacy Attack and Defense in Machine Learning . Journal of Software , 2019 , 31 ( 3 ): 866 - 892 . Liu Ruixuan, Chen Hong, Guo Ruoyang, Privacy Attack and Defense in Machine Learning. Journal of Software, 2019, 31(3): 866- 892.","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_11_1","volume-title":"Federated Learning with Differential Privacy for Resilient Vehicular Cyber Physical Systems. \/\/Data Science and Cybersecurity Center","author":"Olowononi F O","year":"2021","unstructured":"Olowononi F O , Rawat D B , Liu C. Federated Learning with Differential Privacy for Resilient Vehicular Cyber Physical Systems. \/\/Data Science and Cybersecurity Center , Washington DC : Howard University , 2021 . Olowononi F O, Rawat D B, Liu C. Federated Learning with Differential Privacy for Resilient Vehicular Cyber Physical Systems. \/\/Data Science and Cybersecurity Center, Washington DC: Howard University, 2021."},{"key":"e_1_3_2_1_12_1","volume-title":"Artificial Intelligence Lab","author":"Triastcyn A.","year":"2019","unstructured":"Triastcyn A. Federated Learning with Bayesian Differential Privacy.\/\/IEEE International Conference on Big Data , Artificial Intelligence Lab , 2019 . Triastcyn A. Federated Learning with Bayesian Differential Privacy.\/\/IEEE International Conference on Big Data, Artificial Intelligence Lab, 2019."},{"key":"e_1_3_2_1_13_1","volume-title":"IEEE INTERNET OF THINGS JOURNAL","author":"Hu R.","unstructured":"Hu R. Personalized Federated Learning With Differential Privacy. IEEE INTERNET OF THINGS JOURNAL , vol. 6 , no. 10, 2020. Hu R. Personalized Federated Learning With Differential Privacy. IEEE INTERNET OF THINGS JOURNAL, vol. 6, no. 10, 2020."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP39728.2021.9413539"},{"key":"e_1_3_2_1_15_1","volume-title":"Estimating mutual information. Physical review E","author":"Kraskov A","unstructured":"Kraskov A , Sto\u00a8gbauer H , Grassberger P. Estimating mutual information. Physical review E , vol. 69 , no. 6, pp. 066138, 2004. Kraskov A, Sto\u00a8gbauer H, Grassberger P. Estimating mutual information. Physical review E, vol. 69, no. 6, pp. 066138, 2004."}],"event":{"name":"AIAM2021: 2021 3rd International Conference on Artificial Intelligence and Advanced Manufacture","location":"Manchester United Kingdom","acronym":"AIAM2021"},"container-title":["2021 3rd International Conference on Artificial Intelligence and Advanced Manufacture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3495018.3495093","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3495018.3495093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:20Z","timestamp":1750193360000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3495018.3495093"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,23]]},"references-count":15,"alternative-id":["10.1145\/3495018.3495093","10.1145\/3495018"],"URL":"https:\/\/doi.org\/10.1145\/3495018.3495093","relation":{},"subject":[],"published":{"date-parts":[[2021,10,23]]},"assertion":[{"value":"2022-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}