{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T21:28:11Z","timestamp":1768339691457,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T00:00:00Z","timestamp":1669334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,25]]},"DOI":"10.1145\/3573834.3574544","type":"proceedings-article","created":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T03:29:17Z","timestamp":1674012557000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Hierarchical Federated Learning with Gaussian Differential Privacy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9232-0068","authenticated-orcid":false,"given":"Tao","family":"Zhou","sequence":"first","affiliation":[{"name":"China Telecom Cybersecurity Technology Co.,Ltd, China"}]}],"member":"320","published-online":{"date-parts":[[2023,1,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3012952"},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on Artificial Intelligence and Statistics. 2938-2948","author":"Bagdasaryan E","unstructured":"[ 2 ] Bagdasaryan E , Veit A. Hua Y , Estrin D and Shmatikov V . 2020. How to backdoor federated learning . In International Conference on Artificial Intelligence and Statistics. 2938-2948 . PMLR. [2] Bagdasaryan E, Veit A. Hua Y, Estrin D and Shmatikov V. 2020. How to backdoor federated learning. In International Conference on Artificial Intelligence and Statistics. 2938-2948. PMLR."},{"key":"e_1_3_2_1_3_1","unstructured":"[\n  3\n  ]  Zhu L Liu Z and Han S. 2019. Deep leakage from gradients. Advances in neural information processing systems 32.  [3] Zhu L Liu Z and Han S. 2019. Deep leakage from gradients. Advances in neural information processing systems 32."},{"key":"e_1_3_2_1_4_1","volume-title":"2019 IEEE symposium on security and privacy)SP). 691-706","author":"Melis L","unstructured":"[ 4 ] Melis L , Song C , De Cristofaro E , and Shmatikov V . 2019. Exploiting unintended feature leakage in collaborative learning . In 2019 IEEE symposium on security and privacy)SP). 691-706 . IEEE. [4] Melis L, Song C, De Cristofaro E, and Shmatikov V. 2019. Exploiting unintended feature leakage in collaborative learning. In 2019 IEEE symposium on security and privacy)SP). 691-706. IEEE."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"[\n  5\n  ]  Dwork C and Roth A. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9(3\u20134) 211-407.  [5] Dwork C and Roth A. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9(3\u20134) 211-407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking 61-66","author":"Truex S","unstructured":"[ 6 ] Truex S , Liu L , Chow K H , Gursoy M E and Wei W . 2020. LDP-Fed: Federated learning with local differential privacy . In Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking 61-66 . [6] Truex S, Liu L, Chow K H, Gursoy M E and Wei W. 2020. LDP-Fed: Federated learning with local differential privacy. In Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking 61-66."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 308-318","author":"Abadi M","unstructured":"[ 7 ] Abadi M , Chu A , Goodfellow I , McMahan H B , Mironov I , Talwar K and Zhang L . 2016. Deep learning with differential privacy . In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 308-318 . [7] Abadi M, Chu A, Goodfellow I, McMahan H B, Mironov I, Talwar K and Zhang L. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 308-318."},{"key":"e_1_3_2_1_8_1","unstructured":"[\n  8\n  ]  McMahan H B Andrew G Erlingsson U Chien S Mironov I Papernot N and Kairouz P. 2018. A general approach to adding differential privacy to iterative training procedures. arXiv preprint arXiv:1812.06210.  [8] McMahan H B Andrew G Erlingsson U Chien S Mironov I Papernot N and Kairouz P. 2018. A general approach to adding differential privacy to iterative training procedures. arXiv preprint arXiv:1812.06210."},{"key":"e_1_3_2_1_9_1","unstructured":"[\n  9\n  ]  Geyer R C Klein T Nabi M. 2018. Differentially private federated learning: A client level perspective. Advances in Neural Information Processing Systems (NIPS).  [9] Geyer R C Klein T Nabi M. 2018. Differentially private federated learning: A client level perspective. Advances in Neural Information Processing Systems (NIPS)."},{"key":"e_1_3_2_1_10_1","volume-title":"Learning Differentially Private Recurrent Language Models. 6th International Conference on Learning Representations (ICLR).","author":"McMahan H B","unstructured":"[ 10 ] McMahan H B , Ramage D , Talwar K , 2018 . Learning Differentially Private Recurrent Language Models. 6th International Conference on Learning Representations (ICLR). [10] McMahan H B, Ramage D, Talwar K, et al.2018. Learning Differentially Private Recurrent Language Models. 6th International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_11_1","volume-title":"Long Q and Su W J","author":"Bu Z","year":"2020","unstructured":"[ 11 ] Bu Z , Dong J , Long Q and Su W J . 2020 . Deep learning with gaussian differential privacy. Harvard data science review, 2020(23). [11] Bu Z, Dong J, Long Q and Su W J. 2020. Deep learning with gaussian differential privacy. Harvard data science review, 2020(23)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12454"},{"key":"e_1_3_2_1_13_1","volume-title":"29th Conference on Neural Information Processing Systems (NIPS).","author":"Konen J","year":"2016","unstructured":"[ 13 ] Konen J , Mcmahan H B , Yu F X , 2016 . Federated learning: Strategies for improving communication efficiency . 29th Conference on Neural Information Processing Systems (NIPS). [13] Konen J, Mcmahan H B, Yu F X, et al. 2016. Federated learning: Strategies for improving communication efficiency. 29th Conference on Neural Information Processing Systems (NIPS)."},{"key":"e_1_3_2_1_14_1","volume-title":"Hampson S and Arcas B A","author":"McMahan B","year":"2017","unstructured":"[ 14 ] McMahan B , Moore E , Ramage D , Hampson S and Arcas B A . 2017 . Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. 1273-1282. PMLR. [14] McMahan B, Moore E, Ramage D, Hampson S and Arcas B A. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. 1273-1282. PMLR."},{"key":"e_1_3_2_1_15_1","volume-title":"Theory of Cryptography Conference. 157-175","author":"Murtagh J","unstructured":"[ 15 ] Murtagh J and Vadhan S . 2016. The complexity of computing the optimal composition of differential privacy . In Theory of Cryptography Conference. 157-175 . Springer, Berlin, Heidelberg. [15] Murtagh J and Vadhan S. 2016. The complexity of computing the optimal composition of differential privacy. In Theory of Cryptography Conference. 157-175. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. 74-86","author":"Bun M","unstructured":"[ 16 ] Bun M , Dwork C , Rothblum G N and Steinke T . 2018. Composable and versatile privacy via truncated cdp . In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. 74-86 . [16] Bun M, Dwork C, Rothblum G N and Steinke T. 2018. Composable and versatile privacy via truncated cdp. In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. 74-86."},{"key":"e_1_3_2_1_17_1","first-page":"17455","article-title":"Differentially private learning with adaptive clipping","volume":"34","author":"Andrew G","year":"2021","unstructured":"[ 17 ] Andrew G , Thakkar O , McMahan B and Ramaswamy S. 2021 . Differentially private learning with adaptive clipping . Advances in Neural Information Processing Systems , 34 , 17455 - 17466 . [17] Andrew G, Thakkar O, McMahan B and Ramaswamy S. 2021. Differentially private learning with adaptive clipping. Advances in Neural Information Processing Systems, 34, 17455-17466.","journal-title":"Advances in Neural Information Processing Systems"}],"event":{"name":"AISS 2022: 2022 4th International Conference on Advanced Information Science and System","location":"Sanya China","acronym":"AISS 2022"},"container-title":["Proceedings of the 4th International Conference on Advanced Information Science and System"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573834.3574544","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573834.3574544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:21Z","timestamp":1750182561000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573834.3574544"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,25]]},"references-count":17,"alternative-id":["10.1145\/3573834.3574544","10.1145\/3573834"],"URL":"https:\/\/doi.org\/10.1145\/3573834.3574544","relation":{},"subject":[],"published":{"date-parts":[[2022,11,25]]},"assertion":[{"value":"2023-01-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}