{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:49:53Z","timestamp":1774633793705,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T00:00:00Z","timestamp":1671753600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,23]]},"DOI":"10.1145\/3582197.3582244","type":"proceedings-article","created":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T22:16:15Z","timestamp":1680214575000},"page":"280-285","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Differentially Private Decentralized Traffic Flow Prediction Approach based on Federated Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1147-0249","authenticated-orcid":false,"given":"Huimin","family":"Tang","sequence":"first","affiliation":[{"name":"East China Normal University, Software Engineering Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2763-0008","authenticated-orcid":false,"given":"Nianming","family":"Xue","sequence":"additional","affiliation":[{"name":"Shandong Luruan Digital Technology Co., Ltd., R&amp;D Center, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2121-9306","authenticated-orcid":false,"given":"Gaoli","family":"Wang","sequence":"additional","affiliation":[{"name":"East China Normal University, Software Engineering Institute, China"}]}],"member":"320","published-online":{"date-parts":[[2023,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420010749"},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"2014","author":"Zaremba I.","year":"2013","unstructured":"W. Zaremba , I. Sutskever , and O. Vinyals . 2014 . Recurrent Neural Network Regularization , no. 2013 , pp. 1 \u2013 8 ,. W. Zaremba, I. Sutskever, and O. Vinyals. 2014. Recurrent Neural Network Regularization, no. 2013, pp. 1\u20138,.","journal-title":"Recurrent Neural Network Regularization"},{"key":"e_1_3_2_1_3_1","unstructured":"Mcmahan H B Moore E D Ramage Federated Learning of Deep Networks using Model Averaging[J]. (2016)  Mcmahan H B Moore E D Ramage Federated Learning of Deep Networks using Model Averaging[J]. (2016)"},{"key":"e_1_3_2_1_4_1","volume-title":"Communication-Efficient Learning of Deep Networks from Decentralized Data[C]\/\/","author":"Mcmahan H B","year":"2016","unstructured":"Mcmahan H B , Moore E , Ramage D , Communication-Efficient Learning of Deep Networks from Decentralized Data[C]\/\/ 2016 . Mcmahan H B , Moore E , Ramage D , Communication-Efficient Learning of Deep Networks from Decentralized Data[C]\/\/ 2016."},{"key":"e_1_3_2_1_5_1","volume-title":"Practical Secure Aggregation for Federated Learning on User-Held Data[J]","author":"Bonawitz K","year":"2016","unstructured":"Bonawitz K , Ivanov V , Kreuter B , Practical Secure Aggregation for Federated Learning on User-Held Data[J] . 2016 . Bonawitz K , Ivanov V , Kreuter B , Practical Secure Aggregation for Federated Learning on User-Held Data[J]. 2016."},{"key":"e_1_3_2_1_6_1","first-page":"1","article-title":"Secure and Verifiable Federated Learning[J]","volume":"2019","author":"Xu G","unstructured":"Xu G , Li H , Liu S , VerifyNet : Secure and Verifiable Federated Learning[J] . IEEE Transactions on Information Forensics and Security , 2019 , PP(99): 1 - 1 . Xu G , Li H , Liu S , VerifyNet: Secure and Verifiable Federated Learning[J]. IEEE Transactions on Information Forensics and Security, 2019, PP(99):1-1.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_1_7_1","volume-title":"2017 ACM SIGSAC Conference. ACM","author":"Bonawitz K","year":"2017","unstructured":"Bonawitz K , Ivanov V , Kreuter B , Practical Secure Aggregation for Privacy-Preserving Machine Learning[C]\/\/ the 2017 ACM SIGSAC Conference. ACM , 2017 . Bonawitz K , Ivanov V , Kreuter B , Practical Secure Aggregation for Privacy-Preserving Machine Learning[C]\/\/ the 2017 ACM SIGSAC Conference. ACM, 2017."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume":"2020","author":"Li Y","unstructured":"Li Y , Zhou Y , Jolfaei A , Privacy-Preserving Federated Learning Framework Based on Chained Secure Multi-party Computing[J] . IEEE Internet of Things Journal , 2020 , PP(99): 1 - 1 . Li Y , Zhou Y , Jolfaei A , Privacy-Preserving Federated Learning Framework Based on Chained Secure Multi-party Computing[J]. IEEE Internet of Things Journal, 2020, PP(99):1-1.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_9_1","first-page":"910","volume-title":"2015 53rd Annu. Allert. Conf. Commun. Control. Comput. Allert. 2015","author":"Shokri R","year":"2016","unstructured":"Shokri R , Shmatikov V , Privacy-preserving deep learning . 2015 53rd Annu. Allert. Conf. Commun. Control. Comput. Allert. 2015 , pp. 909\u2013 910 , 2016 , doi: 10. 1109\/ALLERTON. 2015. 7447103. Shokri R , Shmatikov V , Privacy-preserving deep learning. 2015 53rd Annu. Allert. Conf. Commun. Control. Comput. Allert. 2015, pp. 909\u2013910, 2016, doi: 10. 1109\/ALLERTON. 2015. 7447103."},{"key":"e_1_3_2_1_10_1","volume-title":"Learning Differentially Private Recurrent Language Models[J]","author":"Mcmahan H B","year":"2017","unstructured":"Mcmahan H B , Ramage D , Talwar K , Learning Differentially Private Recurrent Language Models[J] . 2017 . Mcmahan H B , Ramage D , Talwar K , Learning Differentially Private Recurrent Language Models[J]. 2017."},{"key":"e_1_3_2_1_11_1","unstructured":"Zhao Y Zhao J Jiang L Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices[J]. 2019(3).  Zhao Y Zhao J Jiang L Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices[J]. 2019(3)."},{"key":"e_1_3_2_1_12_1","volume-title":"IEEE","author":"Pokhrel S R","year":"2020","unstructured":"Pokhrel S R , Choi J . A Decentralized Federated Learning Approach For Connected Autonomous Vehicles[C]\/\/ 2020 IEEE Wireless Communications and Networking Conference (WCNC) . IEEE , 2020 . Pokhrel S R , Choi J . A Decentralized Federated Learning Approach For Connected Autonomous Vehicles[C]\/\/ 2020 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2020."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3076767"},{"key":"e_1_3_2_1_14_1","volume-title":"Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation[J]. Journal of Network \\& Computer Applications","author":"Rivas D A","year":"2011","unstructured":"Rivas D A , Barcelo-Ordinas J M , Zapata M G , Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation[J]. Journal of Network \\& Computer Applications , 2011 , 34(6):1942-1955. Rivas D A , Barcelo-Ordinas J M , Zapata M G , Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation[J]. Journal of Network \\& Computer Applications, 2011, 34(6):1942-1955."},{"key":"e_1_3_2_1_15_1","volume-title":"Defense against misbehavior in anonymous vehicular ad hoc networks[C]\/\/ Elsevier B","author":"Sun J","year":"2009","unstructured":"Sun J , Fang Y . Defense against misbehavior in anonymous vehicular ad hoc networks[C]\/\/ Elsevier B . V. Elsevier B. V. 2009 : 1515-1525. Sun J , Fang Y . Defense against misbehavior in anonymous vehicular ad hoc networks[C]\/\/ Elsevier B. V. Elsevier B. V. 2009:1515-1525."},{"key":"e_1_3_2_1_16_1","volume-title":"Privacy-preserving transportation traffic measurement in intelligent cyber-physical road systems. [D]","author":"Zhou Y .","year":"2015","unstructured":"Zhou Y . Privacy-preserving transportation traffic measurement in intelligent cyber-physical road systems. [D] . University of Florida . 2015 . Zhou Y . Privacy-preserving transportation traffic measurement in intelligent cyber-physical road systems. [D]. University of Florida. 2015."},{"key":"e_1_3_2_1_17_1","volume-title":"SP 2008. IEEE Symposium on. IEEE","author":"Narayanan A","year":"2008","unstructured":"Narayanan A , Shmatikov V . Robust De-anonymization of Large Sparse Datasets[C]\/\/ Security and Privacy, 2008 . SP 2008. IEEE Symposium on. IEEE , 2008 . Narayanan A , Shmatikov V . Robust De-anonymization of Large Sparse Datasets[C]\/\/ Security and Privacy, 2008. SP 2008. IEEE Symposium on. IEEE, 2008."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trpro.2019.05.041"},{"key":"e_1_3_2_1_19_1","volume-title":"An efficient privacy-preserving compressive data gathering scheme in WSNs[J]","author":"Wang","year":"2017","unstructured":"Wang , Xin, Ning , An efficient privacy-preserving compressive data gathering scheme in WSNs[J] . Information Sciences : An International Journal , 2017 . Wang, Xin, Ning, An efficient privacy-preserving compressive data gathering scheme in WSNs[J]. Information Sciences: An International Journal, 2017."},{"issue":"3","key":"e_1_3_2_1_20_1","first-page":"1","article-title":"The Algorithmic Foundations of Differential Privacy[J]","volume":"9","author":"Dwork C","year":"2013","unstructured":"Dwork C , Roth A . The Algorithmic Foundations of Differential Privacy[J] . Foundations and Trends in Theoretical Computer ence , 2013 , 9 ( 3-4 ): 1 - 27 ,29-117,119-141,143-191,193-219,221-235,237-259,261-267,269-277,279-286,a1-a2. Dwork C , Roth A . The Algorithmic Foundations of Differential Privacy[J]. Foundations and Trends in Theoretical Computer ence, 2013, 9(3-4):1-27,29-117,119-141,143-191,193-219,221-235,237-259,261-267,269-277,279-286,a1-a2.","journal-title":"Foundations and Trends in Theoretical Computer ence"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2014.V6.894"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2016.V8.1050"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJCTE.2015.V7.983"}],"event":{"name":"ICIT 2022: IoT and Smart City","location":"Shanghai China","acronym":"ICIT 2022"},"container-title":["Proceedings of the 2022 10th International Conference on Information Technology: IoT and Smart City"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582197.3582244","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3582197.3582244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:32Z","timestamp":1750182692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582197.3582244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,23]]},"references-count":24,"alternative-id":["10.1145\/3582197.3582244","10.1145\/3582197"],"URL":"https:\/\/doi.org\/10.1145\/3582197.3582244","relation":{},"subject":[],"published":{"date-parts":[[2022,12,23]]},"assertion":[{"value":"2023-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}