{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T15:22:33Z","timestamp":1771514553262,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NIH (National Institutes of Health)","doi-asserted-by":"publisher","award":["R01ES033241, R01LM013712"],"award-info":[{"award-number":["R01ES033241, R01LM013712"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2124104, CNS-2125530, IIS-2302968"],"award-info":[{"award-number":["CNS-2124104, CNS-2125530, IIS-2302968"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB3101100"],"award-info":[{"award-number":["2021YFB3101100"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172423, 62206207, 62102352, U23A20306"],"award-info":[{"award-number":["62172423, 62206207, 62102352, U23A20306"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670351","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"303-317","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Cross-silo Federated Learning with Record-level Personalized Differential Privacy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7990-3824","authenticated-orcid":false,"given":"Junxu","family":"Liu","sequence":"first","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4110-2068","authenticated-orcid":false,"given":"Jian","family":"Lou","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7354-0428","authenticated-orcid":false,"given":"Li","family":"Xiong","sequence":"additional","affiliation":[{"name":"Emory University, Atlanta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2921-2827","authenticated-orcid":false,"given":"Jinfei","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, Zhejiang, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7889-2120","authenticated-orcid":false,"given":"Xiaofeng","family":"Meng","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Martin Abadi Andy Chu Ian Goodfellow H Brendan McMahan Ilya Mironov Kunal Talwar and Li Zhang. 2016. Deep learning with differential privacy. In CCS. 308--318.","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","unstructured":"Borja Balle Gilles Barthe and Marco Gaboardi. 2018. Privacy amplification by subsampling: Tight analyses via couplings and divergences. In NeurIPS. 6280--6290."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Franziska Boenisch Christopher M\u00fchl Adam Dziedzic Roy Rinberg and Nicolas Papernot. 2023. Have it your way: Individualized Privacy Assignment for DP-SGD. In NeurIPS. 19073--19103.","DOI":"10.56553\/popets-2023-0010"},{"key":"e_1_3_2_1_4_1","volume-title":"Manning","author":"Bowman Samuel R.","year":"2015","unstructured":"Samuel R. Bowman, Gabor Angeli, Christopher Potts, and Christopher D. Manning. 2015. A large annotated corpus for learning natural language inference. In EMNLP. 632--642."},{"key":"e_1_3_2_1_5_1","volume-title":"Shiva Prasad Kasiviswanathan, and Hongxia Jin","author":"Chen Rui","year":"2016","unstructured":"Rui Chen, Haoran Li, A Kai Qin, Shiva Prasad Kasiviswanathan, and Hongxia Jin. 2016. Private spatial data aggregation in the local setting. In ICDE. 289--300."},{"key":"e_1_3_2_1_6_1","volume-title":"EEFL: High-Speed Wireless Communications Inspired Energy Efficient Federated Learning over Mobile Devices. In MobiSys. 544--556.","author":"Chen Rui","year":"2023","unstructured":"Rui Chen, Qiyu Wan, Xinyue Zhang, Xiaoqi Qin, Yanzhao Hou, Di Wang, Xin Fu, and Miao Pan. 2023. EEFL: High-Speed Wireless Communications Inspired Energy Efficient Federated Learning over Mobile Devices. In MobiSys. 544--556."},{"key":"e_1_3_2_1_7_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In NAACL-HLT. 4171--4186.","author":"Devlin Jacob","year":"2019","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2019. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. In NAACL-HLT. 4171--4186."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Frank McSherry Kobbi Nissim and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In TCC. 265--284.","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_9_1","first-page":"3","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, Vol. 9, 3--4 (2014), 211--407.","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"e_1_3_2_1_10_1","volume-title":"Concentrated differential privacy. arXiv:1603.01887","author":"Dwork Cynthia","year":"2016","unstructured":"Cynthia Dwork and Guy N Rothblum. 2016. Concentrated differential privacy. arXiv:1603.01887 (2016)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775051.2677005"},{"key":"e_1_3_2_1_12_1","unstructured":"Vitaly Feldman and Tijana Zrnic. 2021. Individual privacy accounting via a R\u00e9nyi filter. In NeurIPS. 28080--28091."},{"key":"e_1_3_2_1_13_1","volume-title":"Zhili Chen, and Yang Cao.","author":"Fu Jie","year":"2024","unstructured":"Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen, and Yang Cao. 2024. Differentially private federated learning: A systematic review. arXiv:2405.08299 (2024)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14778\/3648160.3648164"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/3611540.3611617"},{"key":"e_1_3_2_1_16_1","volume-title":"Differentially private federated learning: A client level perspective. arXiv:1712.07557","author":"Geyer Robin C","year":"2017","unstructured":"Robin C Geyer, Tassilo Klein, and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. arXiv:1712.07557 (2017)."},{"key":"e_1_3_2_1_17_1","volume-title":"Suhas Diggavi, Peter Kairouz, and Ananda Theertha Suresh.","author":"Girgis Antonious","year":"2021","unstructured":"Antonious Girgis, Deepesh Data, Suhas Diggavi, Peter Kairouz, and Ananda Theertha Suresh. 2021. Shuffled Model of Differential Privacy in Federated Learning. In AISTATS. 2521--2529."},{"key":"e_1_3_2_1_18_1","volume-title":"An empirical investigation of catastrophic forgetting in gradient-based neural networks. arXiv:1312.6211","author":"Goodfellow Ian J","year":"2013","unstructured":"Ian J Goodfellow, Mehdi Mirza, Da Xiao, Aaron Courville, and Yoshua Bengio. 2013. An empirical investigation of catastrophic forgetting in gradient-based neural networks. arXiv:1312.6211 (2013)."},{"key":"e_1_3_2_1_19_1","unstructured":"Filip Hanzely Slavom\u00edr Hanzely Samuel Horv\u00e1th and Peter Richt\u00e1rik. 2020. Lower bounds and optimal algorithms for personalized federated learning. In NeurIPS. 2304--2315."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Kaiming He Xiangyu Zhang Shaoqing Ren and Jian Sun. 2016. Deep residual learning for image recognition. In CVPR. 770--778.","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Briland Hitaj Giuseppe Ateniese and Fernando Perez-Cruz. 2017. Deep models under the GAN: information leakage from collaborative deep learning. In CCS. 603--618.","DOI":"10.1145\/3133956.3134012"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Zach Jorgensen Ting Yu and Graham Cormode. 2015. Conservative or liberal? Personalized differential privacy. In ICDE. 1023--1034.","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"e_1_3_2_1_23_1","volume-title":"Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, et al.","author":"Kairouz Peter","year":"2021","unstructured":"Peter Kairouz, H Brendan McMahan, Brendan Avent, Aur\u00e9lien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, et al. 2021. Advances and open problems in federated learning. Foundations and trends\u00ae in machine learning, Vol. 14, 1--2 (2021), 1--210."},{"key":"e_1_3_2_1_24_1","volume-title":"Scaffold: Stochastic controlled averaging for federated learning. In ICML. 5132--5143.","author":"Karimireddy Sai Praneeth","year":"2020","unstructured":"Sai Praneeth Karimireddy, Satyen Kale, Mehryar Mohri, Sashank Reddi, Sebastian Stich, and Ananda Theertha Suresh. 2020. Scaffold: Stochastic controlled averaging for federated learning. In ICML. 5132--5143."},{"key":"e_1_3_2_1_25_1","volume-title":"ULDP-FL: Federated Learning with Across Silo User-Level Differential Privacy. arXiv:2308.12210","author":"Kato Fumiyuki","year":"2023","unstructured":"Fumiyuki Kato, Li Xiong, Shun Takagi, Yang Cao, and Masatoshi Yoshikawa. 2023. ULDP-FL: Federated Learning with Across Silo User-Level Differential Privacy. arXiv:2308.12210 (2023)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1611835114"},{"key":"e_1_3_2_1_27_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009) 1--58."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Ninghui Li Wahbeh Qardaji and Dong Su. 2012. On sampling anonymization and differential privacy or k-anonymization meets differential privacy. In ASIACCS. 32--33.","DOI":"10.1145\/2414456.2414474"},{"key":"e_1_3_2_1_30_1","volume-title":"Ditto: Fair and robust federated learning through personalization. In ICML. 6357--6368.","author":"Li Tian","year":"2021","unstructured":"Tian Li, Shengyuan Hu, Ahmad Beirami, and Virginia Smith. 2021. Ditto: Fair and robust federated learning through personalization. In ICML. 6357--6368."},{"key":"e_1_3_2_1_31_1","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume":"2","author":"Li Tian","year":"2020","unstructured":"Tian Li, Anit Kumar Sahu, Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, and Virginia Smith. 2020. Federated optimization in heterogeneous networks. Proceedings of Machine Learning and Systems, Vol. 2 (2020), 429--450.","journal-title":"Proceedings of Machine Learning and Systems"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14778\/3583140.3583146"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14778\/3503585.3503592"},{"key":"e_1_3_2_1_34_1","volume-title":"Tsubasa Takahashi, Jinfei Liu, and Masatoshi Yoshikawa.","author":"Liu Shang","year":"2024","unstructured":"Shang Liu, Yang Cao, Takao Murakami, Weiran Liu, Seng Pei Liew, Tsubasa Takahashi, Jinfei Liu, and Masatoshi Yoshikawa. 2024. Federated graph analytics with differential privacy. arXiv:2405.20576 (2024)."},{"key":"e_1_3_2_1_35_1","unstructured":"Yixuan Liu Suyun Zhao Li Xiong Yuhan Liu and Hong Chen. 2023. Echo of neighbors: privacy amplification for personalized private federated learning with shuffle model. In AAAI. 2008--2020."},{"key":"e_1_3_2_1_36_1","volume-title":"Zhiwei Steven Wu, and Virginia Smith","author":"Liu Ziyu","year":"2022","unstructured":"Ziyu Liu, Shengyuan Hu, Zhiwei Steven Wu, and Virginia Smith. 2022. On Privacy and Personalization in Cross-Silo Federated Learning. In NeurIPS. 5925--5940."},{"key":"e_1_3_2_1_37_1","unstructured":"Andrew Lowy Ali Ghafelebashi and Meisam Razaviyayn. 2023. Private Non-Convex Federated Learning Without a Trusted Server. In AISTATS. 5749--5786."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449832"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Samuel Maddock Graham Cormode Tianhao Wang Carsten Maple and Somesh Jha. 2022. Federated Boosted Decision Trees with Differential Privacy. In CCS. 2249--2263.","DOI":"10.1145\/3548606.3560687"},{"key":"e_1_3_2_1_40_1","volume-title":"Noise-Aware Algorithm for Heterogeneous Differentially Private Federated Learning. arXiv:2406.03519","author":"Malekmohammadi Saber","year":"2024","unstructured":"Saber Malekmohammadi, Yaoliang Yu, and Yang Cao. 2024. Noise-Aware Algorithm for Heterogeneous Differentially Private Federated Learning. arXiv:2406.03519 (2024)."},{"key":"e_1_3_2_1_41_1","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In AISTATS. 1273--1282."},{"key":"e_1_3_2_1_42_1","volume-title":"Learning differentially private recurrent language models. arXiv:1710.06963","author":"McMahan H Brendan","year":"2017","unstructured":"H Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. 2017. Learning differentially private recurrent language models. arXiv:1710.06963 (2017)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Ilya Mironov. 2017. R\u00e9nyi differential privacy. In CSF. 263--275.","DOI":"10.1109\/CSF.2017.11"},{"key":"e_1_3_2_1_44_1","volume-title":"R\u00e9nyi differential privacy of the sampled Gaussian mechanism. arXiv:1908.10530","author":"Mironov Ilya","year":"2019","unstructured":"Ilya Mironov, Kunal Talwar, and Li Zhang. 2019. R\u00e9nyi differential privacy of the sampled Gaussian mechanism. arXiv:1908.10530 (2019)."},{"key":"e_1_3_2_1_45_1","unstructured":"Maxence Noble Aur\u00e9lien Bellet and Aymeric Dieuleveut. 2022. Differentially private federated learning on heterogeneous data. In AISTATS. 10110--10145."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3624010"},{"key":"e_1_3_2_1_47_1","unstructured":"Ryan M Rogers Aaron Roth Jonathan Ullman and Salil Vadhan. 2016. Privacy odometers and filters: Pay-as-you-go composition. In NeurIPS. 1929--1937."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1080\/14697680500040413"},{"key":"e_1_3_2_1_49_1","first-page":"38","article-title":"On the intertrade waiting-time distribution","volume":"3","author":"Scalas Enrico","year":"2005","unstructured":"Enrico Scalas, Rudolf Gorenflo, Hugh Luckock, Francesco Mainardi, Maurizio Mantelli, and Marco Raberto. 2005. On the intertrade waiting-time distribution. Finance Letters, Vol. 3, 1 (2005), 38--43.","journal-title":"Finance Letters"},{"key":"e_1_3_2_1_50_1","volume-title":"Flamby: Datasets and benchmarks for cross-silo federated learning in realistic healthcare settings. arXiv:2210.04620","author":"du Terrail Jean Ogier","year":"2022","unstructured":"Jean Ogier du Terrail, Samy-Safwan Ayed, Edwige Cyffers, Felix Grimberg, Chaoyang He, Regis Loeb, Paul Mangold, Tanguy Marchand, Othmane Marfoq, Erum Mushtaq, et al. 2022. Flamby: Datasets and benchmarks for cross-silo federated learning in realistic healthcare settings. arXiv:2210.04620 (2022)."},{"key":"e_1_3_2_1_51_1","volume-title":"Mehmet Emre Gursoy, and Ling Liu","author":"Tolpegin Vale","year":"2020","unstructured":"Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, and Ling Liu. 2020. Data poisoning attacks against federated learning systems. In ESORICS. 480--501."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Yu-Xiang Wang Borja Balle and Shiva Prasad Kasiviswanathan. 2019. Subsampled R\u00e9nyi Differential Privacy and Analytical Moments Accountant. In AISTATS. 2521--2529.","DOI":"10.29012\/jpc.723"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Zhibo Wang Mengkai Song Zhifei Zhang Yang Song Qian Wang and Hairong Qi. 2019. Beyond inferring class representatives: User-level privacy leakage from federated learning. In INFOCOM. 2512--2520.","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1013140107"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589264"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103672"},{"key":"e_1_3_2_1_58_1","volume-title":"MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning","author":"Zhang Xiaoyu","year":"2023","unstructured":"Xiaoyu Zhang, Shen Lin, Chao Chen, and Xiaofeng Chen. 2023. MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning. IEEE Transactions on Dependable and Secure Computing (2023)."},{"key":"e_1_3_2_1_59_1","unstructured":"Ligeng Zhu Zhijian Liu and Song Han. 2019. Deep leakage from gradients. In NeurIPS. 14774--14784."},{"key":"e_1_3_2_1_60_1","unstructured":"Yuqing Zhu and Yu-Xiang Wang. 2019. Poission subsampled R\u00e9nyi differential privacy. In ICML. 7634--7642."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670351","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:52:37Z","timestamp":1755841957000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670351"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":60,"alternative-id":["10.1145\/3658644.3670351","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670351","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}