{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T10:10:01Z","timestamp":1755857401795,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1145\/3625469.3625506","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:17:21Z","timestamp":1700569041000},"page":"69-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Cross-organization Privacy Protection Method Based on Federated Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-4567-228X","authenticated-orcid":false,"given":"Wanting","family":"Yin","sequence":"first","affiliation":[{"name":"State Grid Energy Research Institute Co. Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8991-813X","authenticated-orcid":false,"given":"Yixin","family":"Sun","sequence":"additional","affiliation":[{"name":"State Grid Energy Research Institute Co. Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4583-8388","authenticated-orcid":false,"given":"Xinda","family":"Li","sequence":"additional","affiliation":[{"name":"State Grid Energy Research Institute Co. Ltd., China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8594-5641","authenticated-orcid":false,"given":"Rongjia","family":"Song","sequence":"additional","affiliation":[{"name":"Experimental Center of Data Science and Intelligent Decision Making, Hangzhou Dianzi University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.013"},{"key":"e_1_3_2_1_2_1","volume-title":"Automated latent fingerprint recognition[J]","author":"Cao K","year":"2018","unstructured":"Cao K, Jain A K. Automated latent fingerprint recognition[J]. IEEE transactions on pattern analysis and machine intelligence, 2018, 41(4): 788-800."},{"key":"e_1_3_2_1_3_1","volume-title":"Federated learning: Challenges, methods, and future directions[J]","author":"Li T","year":"2020","unstructured":"[3] Li T, Sahu A K, Talwalkar A, Federated learning: Challenges, methods, and future directions[J]. IEEE signal processing magazine, 2020, 37(3): 50-60."},{"key":"e_1_3_2_1_4_1","first-page":"1525","article-title":"al., Petri net-based hierarchical business processing[J]","volume":"2020","author":"Liu C","unstructured":"Liu C, Cheng L, Zeng QT, et.al., Petri net-based hierarchical business processing[J]. Computer Integrated Manufacturing Systems,2020,26(6):1525-1537.","journal-title":"Computer Integrated Manufacturing Systems"},{"issue":"4","key":"e_1_3_2_1_5_1","first-page":"30","article-title":"al. Research on Continuity of TD-LTE multi frequency and layered network[J]","volume":"29","author":"Feng H Q","year":"2016","unstructured":"Feng H Q, Du J J, Meng Y T, et.al. Research on Continuity of TD-LTE multi frequency and layered network[J]. Telecom Engineering Technics and Standardization. 2016,29(4):30-33.","journal-title":"Telecom Engineering Technics and Standardization"},{"key":"e_1_3_2_1_6_1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data[C]\/\/Artificial intelligence and statistics","volume":"2017","author":"McMahan B","unstructured":"McMahan B, Moore E, Ramage D, Communication-efficient learning of deep networks from decentralized data[C]\/\/Artificial intelligence and statistics. PMLR, 2017: 1273-1282.","journal-title":"PMLR"},{"key":"e_1_3_2_1_7_1","volume-title":"Learning differentially private recurrent language models[J]. arXiv preprint arXiv:1710.06963","author":"McMahan H B","year":"2017","unstructured":"McMahan H B, Ramage D, Talwar K, Learning differentially private recurrent language models[J]. arXiv preprint arXiv:1710.06963, 2017."},{"key":"e_1_3_2_1_8_1","volume-title":"Secure multiparty computation for privacy preserving data mining[M]\/\/Encyclopedia of Data Warehousing and Mining. IGI global","author":"Lindell Y.","year":"2005","unstructured":"Lindell Y. Secure multiparty computation for privacy preserving data mining[M]\/\/Encyclopedia of Data Warehousing and Mining. IGI global, 2005: 1005-1009."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Bonawitz K Ivanov V Kreuter B Practical secure aggregation for privacy-preserving machine learning[C]\/\/proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017: 1175-1191.","DOI":"10.1145\/3133956.3133982"},{"volume-title":"Attribute-based encryption for fine-grained access control of encrypted data[C]\/\/Proceedings of the 13th ACM conference on Computer and communications security. 2006: 89-98","author":"Goyal V","key":"e_1_3_2_1_10_1","unstructured":"Goyal V, Pandey O, Sahai A, Attribute-based encryption for fine-grained access control of encrypted data[C]\/\/Proceedings of the 13th ACM conference on Computer and communications security. 2006: 89-98."},{"key":"e_1_3_2_1_11_1","first-page":"1","volume":"2021","author":"Mo Qi","unstructured":"Mo Qi, Xiang JiXiang, Wang Yu, Compliance Verification of Collaborative Business Process Based on Process Abstraction[J\/OL]. Computer Integrated Manufacturing Systems, 2021: 1-15(in Chinese).","journal-title":"Computer Integrated Manufacturing Systems"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2617331"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2005.03.008"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2987958"},{"key":"e_1_3_2_1_15_1","first-page":"1019","article-title":"Transfer learning for visual categorization: A survey[J]","volume":"2015","unstructured":"SHAO L, ZHU F, LI X L. Transfer learning for visual categorization: A survey[J]. IEEE Transactions on Neural Networks and Learning Systems,2015,26(5):1019-1034.","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"key":"e_1_3_2_1_16_1","volume-title":"Petri nets: An introduction[M]","author":"Reisig W.","year":"2012","unstructured":"Reisig W. Petri nets: An introduction[M]. Berlin, Germany: Springer, 2012."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126698000043"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","unstructured":"Saeed Samet \"Privacy-Preserving Logistic Regression \" 2015 6(3): 88-95. doi: 10.12720\/jait.6.3.88-95","DOI":"10.12720\/jait.6.3.88-95"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3131175"},{"key":"e_1_3_2_1_21_1","volume-title":"DP-FL: a novel differentially private federated learning framework for the unbalanced data.\u00a0World Wide Web\u00a0","author":"Xixi","year":"2020","unstructured":"HUANG, Xixi, DP-FL: a novel differentially private federated learning framework for the unbalanced data.\u00a0World Wide Web\u00a0, 2020, 23: 2529-2545."},{"key":"e_1_3_2_1_22_1","volume-title":"Danilo Menegatti, An Adaptive Model Averaging Procedure for Federated Learning (AdaFed). Journal of Advances in Information Technology Vol","author":"Alessandro Giuseppi","year":"2022","unstructured":"Alessandro Giuseppi, Lucrezia Della Torre, Danilo Menegatti, An Adaptive Model Averaging Procedure for Federated Learning (AdaFed). Journal of Advances in Information Technology Vol, 2022, 13.6:539-548."},{"key":"e_1_3_2_1_23_1","first-page":"2886795","article-title":"Security and Privacy Threats to Federated Learning: Issues, Methods, and Challenges","volume":"2022","author":"Junpeng Zhang","year":"2022","unstructured":"Junpeng Zhang, Hui Zhu, Fengwei Wang, Jiaqi Zhao, Qi Xu, Hui Li, \"Security and Privacy Threats to Federated Learning: Issues, Methods, and Challenges\",\u00a0Security and Communication Networks, vol. 2022, Article ID 2886795, 24 pages, 2022.","journal-title":"\u00a0Security and Communication Networks"}],"event":{"name":"IMMS 2023: 2023 the 6th International Conference on Information Management and Management Science","acronym":"IMMS 2023","location":"Chengdu China"},"container-title":["Proceedings of the 2023 6th International Conference on Information Management and Management Science"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625469.3625506","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3625469.3625506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T09:43:35Z","timestamp":1755855815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3625469.3625506"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":23,"alternative-id":["10.1145\/3625469.3625506","10.1145\/3625469"],"URL":"https:\/\/doi.org\/10.1145\/3625469.3625506","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}