{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:47:22Z","timestamp":1774540042477,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100010662","name":"H2020 Excellent Science","doi-asserted-by":"publisher","award":["872735"],"award-info":[{"award-number":["872735"]}],"id":[{"id":"10.13039\/100010662","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010667","name":"H2020 Industrial Leadership","doi-asserted-by":"publisher","award":["830927"],"award-info":[{"award-number":["830927"]}],"id":[{"id":"10.13039\/100010667","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010676","name":"H2020 Societal Challenges","doi-asserted-by":"publisher","award":["101021808"],"award-info":[{"award-number":["101021808"]}],"id":[{"id":"10.13039\/100010676","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543873.3587604","type":"proceedings-article","created":{"date-parts":[[2023,4,28]],"date-time":"2023-04-28T11:36:14Z","timestamp":1682681774000},"page":"280-289","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Privacy\u2013Preserving Online Content Moderation: A Federated Learning Use Case"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5946-0074","authenticated-orcid":false,"given":"Pantelitsa","family":"Leonidou","sequence":"first","affiliation":[{"name":"Cyprus University of Technology, Cyprus"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5674-1698","authenticated-orcid":false,"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[{"name":"Telefonica Research, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0643-3424","authenticated-orcid":false,"given":"Nikos","family":"Salamanos","sequence":"additional","affiliation":[{"name":"Cyprus University of Technology, Cyprus"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6500-581X","authenticated-orcid":false,"given":"Michael","family":"Sirivianos","sequence":"additional","affiliation":[{"name":"Cyprus University of Technology, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442442.3452314"},{"key":"e_1_3_2_1_3_1","unstructured":"Galen Andrew Om Thakkar Brendan McMahan and Swaroop Ramaswamy. 2021. Differentially Private Learning with Adaptive Clipping. In Advances in Neural Information Processing Systems Vol.\u00a034. 17455\u201317466."},{"key":"e_1_3_2_1_4_1","unstructured":"Varun Chandrasekaran Suman Banerjee Diego Perino and Nicolas Kourtellis. 2022. Hierarchical Federated Learning with Privacy. (2022). Available at https:\/\/arxiv.org\/abs\/2206.05209."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091487"},{"key":"e_1_3_2_1_6_1","unstructured":"Mingqing Chen Rajiv Mathews Tom Ouyang and Fran\u00e7oise Beaufays. 2019. Federated Learning Of Out-Of-Vocabulary Words. (2019). published by Google Research."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v11i1.14955"},{"key":"e_1_3_2_1_8_1","volume-title":"Our Data","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. 2006. Our Data, Ourselves: Privacy Via Distributed Noise Generation. In Advances in Cryptology (EUROCRYPT 2006) (advances in cryptology (eurocrypt 2006) ed.)(Lecture Notes in Computer Science, Vol.\u00a04004). 486\u2013503."},{"key":"e_1_3_2_1_9_1","volume-title":"Theory of Cryptography","author":"Dwork Cynthia","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In Theory of Cryptography, Shai Halevi and Tal Rabin (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 265\u2013284."},{"key":"e_1_3_2_1_10_1","first-page":"3","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Found. Trends Theor. Comput. Sci. 9, 3\u20134 (aug 2014), 211\u2013407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.14991"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326028"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Robin\u00a0C. Geyer Tassilo Klein and Moin Nabi. 2017. Differentially Private Federated Learning: A Client Level Perspective. https:\/\/doi.org\/10.48550\/ARXIV.1712.07557","DOI":"10.48550\/ARXIV.1712.07557"},{"key":"e_1_3_2_1_14_1","volume-title":"Federated learning for mobile keyboard prediction. arXiv preprint arXiv:1811.03604","author":"Hard Andrew","year":"2018","unstructured":"Andrew Hard, Kanishka Rao, Rajiv Mathews, Swaroop Ramaswamy, Fran\u00e7oise Beaufays, Sean Augenstein, Hubert Eichner, Chlo\u00e9 Kiddon, and Daniel Ramage. 2018. Federated learning for mobile keyboard prediction. arXiv preprint arXiv:1811.03604 (2018)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Erin Kenneally and David Dittrich. 2012. The menlo report: Ethical principles guiding information and communication technology research. (2012). Available at SSRN 2445102.","DOI":"10.2139\/ssrn.2445102"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3426745.3431337"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3216981"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise\u00a0Ag\u00fcera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017, 20-22 April 2017, Fort Lauderdale, FL, USA(Proceedings of Machine Learning Research, Vol.\u00a054), Aarti Singh and Xiaojin\u00a0(Jerry) Zhu (Eds.). PMLR, 1273\u20131282."},{"key":"e_1_3_2_1_19_1","volume-title":"6th International Conference on Learning Representations, ICLR","author":"McMahan Brendan","year":"2018","unstructured":"H.\u00a0Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. 2018. Learning Differentially Private Recurrent Language Models. In 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30 - May 3, 2018, Conference Track Proceedings."},{"key":"e_1_3_2_1_20_1","volume-title":"R\u00e9nyi differential privacy of the sampled gaussian mechanism. arXiv preprint arXiv:1908.10530","author":"Mironov Ilya","year":"2019","unstructured":"Ilya Mironov, Kunal Talwar, and Li Zhang. 2019. R\u00e9nyi differential privacy of the sampled gaussian mechanism. arXiv preprint arXiv:1908.10530 (2019)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23054"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v14i1.7320"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19329"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Jeffrey Pennington Richard Socher and Christopher\u00a0D. Manning. 2014. GloVe: Global Vectors for Word Representation. In Empirical Methods in Natural Language Processing (EMNLP). 1532\u20131543.","DOI":"10.3115\/v1\/D14-1162"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685316"},{"key":"e_1_3_2_1_26_1","volume-title":"Robust and communication-efficient federated learning from non-iid data","author":"Sattler Felix","year":"2019","unstructured":"Felix Sattler, Simon Wiedemann, Klaus-Robert M\u00fcller, and Wojciech Samek. 2019. Robust and communication-efficient federated learning from non-iid data. IEEE transactions on neural networks and learning systems 31, 9 (2019), 3400\u20133413."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341161.3342913"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"e_1_3_2_1_29_1","volume-title":"CMFL: Mitigating Communication Overhead for Federated Learning. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). 954\u2013964","author":"Luping WANG","unstructured":"Luping WANG, Wei WANG, and Bo LI. 2019. CMFL: Mitigating Communication Overhead for Federated Learning. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). 954\u2013964."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the Twenty-Second International Conference on Artificial Intelligence and Statistics(Proceedings of Machine Learning Research, Vol.\u00a089)","author":"Wang Yu-Xiang","year":"2019","unstructured":"Yu-Xiang Wang, Borja Balle, and Shiva\u00a0Prasad Kasiviswanathan. 2019. Subsampled Renyi Differential Privacy and Analytical Moments Accountant. In Proceedings of the Twenty-Second International Conference on Artificial Intelligence and Statistics(Proceedings of Machine Learning Research, Vol.\u00a089), Kamalika Chaudhuri and Masashi Sugiyama (Eds.). 1226\u20131235."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/N16-2013"},{"key":"e_1_3_2_1_32_1","volume-title":"Advances in Artificial Intelligence and Security","author":"Yan Bingjie","unstructured":"Bingjie Yan, Jun Wang, Jieren Cheng, Yize Zhou, Yixian Zhang, Yifan Yang, Li Liu, Haojiang Zhao, Chunjuan Wang, and Boyi Liu. 2021. Experiments of Federated Learning for COVID-19 Chest X-ray Images. In Advances in Artificial Intelligence and Security, Xingming Sun, Xiaorui Zhang, Zhihua Xia, and Elisa Bertino (Eds.). Springer International Publishing, Cham, 41\u201353."},{"key":"e_1_3_2_1_33_1","unstructured":"Timothy Yang Galen Andrew Hubert Eichner Haicheng Sun Wei Li Nicholas Kong Daniel Ramage and Fran\u00e7oise Beaufays. 2018. Applied Federated Learning: Improving Google Keyboard Query Suggestions."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-017-0088-4"}],"event":{"name":"WWW '23: The ACM Web Conference 2023","location":"Austin TX USA","acronym":"WWW '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Companion Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543873.3587604","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543873.3587604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T23:49:09Z","timestamp":1755820149000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543873.3587604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":34,"alternative-id":["10.1145\/3543873.3587604","10.1145\/3543873"],"URL":"https:\/\/doi.org\/10.1145\/3543873.3587604","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}