{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:43Z","timestamp":1750309363107,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T00:00:00Z","timestamp":1720137600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the National Key R&D Program of China","award":["2023YFB2704200"],"award-info":[{"award-number":["2023YFB2704200"]}]},{"name":"Beijing Natural Science Foundation","award":["L221014"],"award-info":[{"award-number":["L221014"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,5]]},"DOI":"10.1145\/3674399.3674450","type":"proceedings-article","created":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T22:26:48Z","timestamp":1722378408000},"page":"138-143","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Fed-AttGRU Privacy-preserving Federated Interest Recommendation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4154-5338","authenticated-orcid":false,"given":"Jun","family":"Wan","sequence":"first","affiliation":[{"name":"Shuohuang Railway Development Co.,Ltd, National Energy Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1141-504X","authenticated-orcid":false,"given":"Cheng","family":"Chi","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communications Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7118-0539","authenticated-orcid":false,"given":"Haoyuan","family":"Yu","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8716-8943","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communications Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3759-4706","authenticated-orcid":false,"given":"Xiangrui","family":"Xu","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1456-562X","authenticated-orcid":false,"given":"Hongmei","family":"Lyu","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5974-1589","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Jiaotong University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part I. Vol.\u00a04051","author":"Bugliesi Michele","year":"2006","unstructured":"Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener. 2006. Automata, Languages and Programming: 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part I. Vol.\u00a04051. Springer."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186058"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3381006","article-title":"PMF: A privacy-preserving human mobility prediction framework via federated learning","volume":"4","author":"Feng Jie","year":"2020","unstructured":"Jie Feng, Can Rong, Funing Sun, Diansheng Guo, and Yong Li. 2020. PMF: A privacy-preserving human mobility prediction framework via federated learning. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4, 1 (2020), 1\u201321.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_2_1_4_1","volume-title":"Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557","author":"Geyer C","year":"2017","unstructured":"Robin\u00a0C Geyer, Tassilo Klein, and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 (2017)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2777990"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-023-3282-7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00105-6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i7.26083"},{"key":"e_1_3_2_1_9_1","volume-title":"33st USENIX Security Symposium (USENIX Security 24)","author":"Lyu Xiaoting","year":"2024","unstructured":"Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, and Xiangliang Zhang. 2024. Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning. In 33st USENIX Security Symposium (USENIX Security 24)."},{"key":"e_1_3_2_1_10_1","volume-title":"KDD","author":"Lyu Xiaoting","year":"2024","unstructured":"Xiaoting Lyu, Yufei Han, Wei Wang, Hangwei Qian, Ivor Tsang, and Xiangliang Zhang. 2024. Cross-Context Backdoor Attacks against Graph Prompt Learning. In KDD 2024."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.108441"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/357980.358017"},{"key":"e_1_3_2_1_13_1","unstructured":"Pierangela Samarati and Latanya Sweeney. 1998. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. (1998)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2988450.2988452"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2991\/iscde-19.2019.34"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-022-1572-0"},{"key":"e_1_3_2_1_17_1","volume-title":"The 22nd International Conference on Artificial Intelligence and Statistics. PMLR, 1226\u20131235","author":"Wang Yu-Xiang","year":"2019","unstructured":"Yu-Xiang Wang, Borja Balle, and Shiva\u00a0Prasad Kasiviswanathan. 2019. Subsampled r\u00e9nyi differential privacy and analytical moments accountant. In The 22nd International Conference on Artificial Intelligence and Statistics. PMLR, 1226\u20131235."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2020.12.091"},{"key":"e_1_3_2_1_19_1","volume-title":"CGIR: conditional generative instance reconstruction attacks against federated learning","author":"Xu Xiangrui","year":"2022","unstructured":"Xiangrui Xu, Pengrui Liu, Wei Wang, Hong-Liang Ma, Bin Wang, Zhen Han, and Yufei Han. 2022. CGIR: conditional generative instance reconstruction attacks against federated learning. IEEE Transactions on Dependable and Secure Computing (2022)."},{"key":"e_1_3_2_1_20_1","volume-title":"Fedcomm: A privacy-enhanced and efficient authentication protocol for federated learning in vehicular ad-hoc networks","author":"Yuan Xiaohan","year":"2023","unstructured":"Xiaohan Yuan, Jiqiang Liu, Bin Wang, Wei Wang, Tao Li, Xiaobo Ma, and Witold Pedrycz. 2023. Fedcomm: A privacy-enhanced and efficient authentication protocol for federated learning in vehicular ad-hoc networks. IEEE Transactions on Information Forensics and Security (2023)."}],"event":{"name":"ACM-TURC '24: ACM Turing Award Celebration Conference 2024","acronym":"ACM-TURC '24","location":"Changsha China"},"container-title":["ACM Turing Award Celebration Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674399.3674450","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3674399.3674450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:03Z","timestamp":1750291563000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674399.3674450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,5]]},"references-count":20,"alternative-id":["10.1145\/3674399.3674450","10.1145\/3674399"],"URL":"https:\/\/doi.org\/10.1145\/3674399.3674450","relation":{},"subject":[],"published":{"date-parts":[[2024,7,5]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}