{"id":"https://openalex.org/W4225986291","doi":"https://doi.org/10.1093/comjnl/bxac060","title":"Privacy-Enhanced Federated Generative Adversarial Networks for Internet of Things","display_name":"Privacy-Enhanced Federated Generative Adversarial Networks for Internet of Things","publication_year":2022,"publication_date":"2022-04-14","ids":{"openalex":"https://openalex.org/W4225986291","doi":"https://doi.org/10.1093/comjnl/bxac060"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxac060","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxac060","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063748382","display_name":"Qingkui Zeng","orcid":"https://orcid.org/0000-0002-4984-4955"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingkui Zeng","raw_affiliation_strings":["School of Computer and Software , Nanjing University of Information Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software , Nanjing University of Information Science and Technology, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011097515","display_name":"Liwen Zhou","orcid":"https://orcid.org/0000-0001-5547-5925"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liwen Zhou","raw_affiliation_strings":["School of Computer and Software , Nanjing University of Information Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software , Nanjing University of Information Science and Technology, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072315579","display_name":"Zhuotao Lian","orcid":"https://orcid.org/0000-0003-2938-6368"},"institutions":[{"id":"https://openalex.org/I141591182","display_name":"University of Aizu","ror":"https://ror.org/02pg0e883","country_code":"JP","type":"education","lineage":["https://openalex.org/I141591182"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Zhuotao Lian","raw_affiliation_strings":["Department of Computer Science and Engineering , the University of Aizu, Japan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering , the University of Aizu, Japan","institution_ids":["https://openalex.org/I141591182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056303769","display_name":"Huakun Huang","orcid":"https://orcid.org/0000-0003-2853-8892"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huakun Huang","raw_affiliation_strings":["School of Computer Science and Cyber Engineering , Guangzhou University, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Cyber Engineering , Guangzhou University, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078674769","display_name":"Jungyoon Kim","orcid":"https://orcid.org/0000-0002-2396-9514"},"institutions":[{"id":"https://openalex.org/I12832649","display_name":"Gachon University","ror":"https://ror.org/03ryywt80","country_code":"KR","type":"education","lineage":["https://openalex.org/I12832649"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jung Yoon Kim","raw_affiliation_strings":["College of Future Industry , Gachon University, South Korea"],"affiliations":[{"raw_affiliation_string":"College of Future Industry , Gachon University, South Korea","institution_ids":["https://openalex.org/I12832649"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5072315579","https://openalex.org/A5078674769"],"corresponding_institution_ids":["https://openalex.org/I12832649","https://openalex.org/I141591182"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":1.3262,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.83156847,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"65","issue":"11","first_page":"2860","last_page":"2869"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8425683975219727},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.7633848786354065},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7630609273910522},{"id":"https://openalex.org/keywords/discriminator","display_name":"Discriminator","score":0.6387817859649658},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6136761903762817},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5065332651138306},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4911782443523407},{"id":"https://openalex.org/keywords/gradient-descent","display_name":"Gradient descent","score":0.45789605379104614},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44405147433280945},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4111810624599457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35019630193710327},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.317382276058197},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23164650797843933},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15927588939666748},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.14406108856201172},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.12841546535491943}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8425683975219727},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.7633848786354065},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7630609273910522},{"id":"https://openalex.org/C2779803651","wikidata":"https://www.wikidata.org/wiki/Q5282088","display_name":"Discriminator","level":3,"score":0.6387817859649658},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6136761903762817},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5065332651138306},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4911782443523407},{"id":"https://openalex.org/C153258448","wikidata":"https://www.wikidata.org/wiki/Q1199743","display_name":"Gradient descent","level":3,"score":0.45789605379104614},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44405147433280945},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4111810624599457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35019630193710327},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.317382276058197},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23164650797843933},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15927588939666748},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.14406108856201172},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.12841546535491943},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxac060","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxac060","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G1925265564","display_name":null,"funder_award_id":"62001126","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W2473418344","https://openalex.org/W2739748921","https://openalex.org/W2741358105","https://openalex.org/W2774347471","https://openalex.org/W2789226849","https://openalex.org/W2952515811","https://openalex.org/W2963819344","https://openalex.org/W2986458967","https://openalex.org/W3016219164","https://openalex.org/W3021749880","https://openalex.org/W3043320740","https://openalex.org/W3080594820","https://openalex.org/W3084847664","https://openalex.org/W3101073882","https://openalex.org/W3103802018","https://openalex.org/W3137672894","https://openalex.org/W3153791152","https://openalex.org/W3157242219","https://openalex.org/W3190437803","https://openalex.org/W3196522895","https://openalex.org/W3210066319","https://openalex.org/W3211851149","https://openalex.org/W3214181042","https://openalex.org/W4206452975","https://openalex.org/W4206759694","https://openalex.org/W4210269187","https://openalex.org/W4212774754","https://openalex.org/W4224943538","https://openalex.org/W4238869514","https://openalex.org/W4246246172","https://openalex.org/W4281730220","https://openalex.org/W4283072760","https://openalex.org/W4287758287","https://openalex.org/W4295521014","https://openalex.org/W4320013936","https://openalex.org/W4389474206","https://openalex.org/W6735913928","https://openalex.org/W6741832134","https://openalex.org/W6748503580","https://openalex.org/W6764399619","https://openalex.org/W6779062925","https://openalex.org/W6779499942","https://openalex.org/W6786061324","https://openalex.org/W6794239526","https://openalex.org/W6800433328","https://openalex.org/W6802929972","https://openalex.org/W6810815564"],"related_works":["https://openalex.org/W4293202849","https://openalex.org/W1980965563","https://openalex.org/W1489300767","https://openalex.org/W4380714744","https://openalex.org/W2387995142","https://openalex.org/W4319453655","https://openalex.org/W2089959425","https://openalex.org/W2964074194","https://openalex.org/W2057775761","https://openalex.org/W2985313479"],"abstract_inverted_index":{"Abstract":[0],"Federated":[1],"generative":[2],"adversarial":[3],"networks":[4],"are":[5],"designed":[6],"to":[7,34,80],"collaborate":[8],"across":[9],"the":[10,21,35,67,81,88,94,102,106,110,116,121,133],"communication":[11],"and":[12,54,91],"privacy-constrained":[13],"edge":[14,30,82,85],"servers":[15,31],"participating":[16],"in":[17,20],"training.":[18],"However,":[19],"Internet":[22],"of":[23,37,69,115],"Things":[24],"scenario,":[25],"local":[26,89],"updates":[27],"uploaded":[28],"by":[29,132],"can":[32,42],"lead":[33],"risk":[36],"privacy":[38,49,68,75,99],"breaches.":[39],"Gradient-sanitized-based":[40],"approaches":[41,135],"transmit":[43],"sanitized":[44],"sensitive":[45],"data":[46,72],"with":[47,125],"strict":[48],"guarantees,":[50],"but":[51],"gradient":[52,103,111],"clipping":[53],"perturbation":[55],"severely":[56],"degrade":[57],"convergence":[58],"performance.":[59],"In":[60],"this":[61],"paper,":[62],"our":[63],"proposed":[64],"algorithm":[65,122],"enhances":[66],"terminated":[70],"raw":[71],"through":[73],"differential":[74],"before":[76],"it":[77],"is":[78],"transmitted":[79],"server.":[83],"The":[84,113],"server":[86],"trains":[87],"generator":[90],"discriminator":[92],"using":[93],"perturbed":[95],"data,":[96],"which":[97],"provides":[98],"guarantees":[100],"for":[101],"attack":[104],"on":[105],"FedGAN":[107],"without":[108],"compromising":[109],"accuracy.":[112],"results":[114],"experimental":[117],"evaluation":[118],"show":[119],"that":[120,130],"generates":[123],"images":[124],"slightly":[126],"better":[127],"quality":[128],"than":[129],"generated":[131],"gradient-sanitized-based":[134],"while":[136],"maintaining":[137],"privacy.":[138]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
