{"id":"https://openalex.org/W4416429138","doi":"https://doi.org/10.1109/access.2025.3635532","title":"Privacy Versus Utility in Federated Learning: An Experimental Analysis of Noise Injection Techniques","display_name":"Privacy Versus Utility in Federated Learning: An Experimental Analysis of Noise Injection Techniques","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4416429138","doi":"https://doi.org/10.1109/access.2025.3635532"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3635532","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3635532","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3635532","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120415886","display_name":"N.R. Leope","orcid":null},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Neo R. Leope","raw_affiliation_strings":["Cyber Security Research Group (CySec), Department of Computer Science, EBIT Faculty, University of Pretoria, Pretoria, South Africa","Department of Computer Science, EBIT Faculty, Cyber Security Research Group (CySec), University of Pretoria, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Group (CySec), Department of Computer Science, EBIT Faculty, University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]},{"raw_affiliation_string":"Department of Computer Science, EBIT Faculty, Cyber Security Research Group (CySec), University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088421729","display_name":"Jan H. P. Eloff","orcid":"https://orcid.org/0000-0003-4683-2198"},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Jan H. P. Eloff","raw_affiliation_strings":["Cyber Security Research Group (CySec), Department of Computer Science, EBIT Faculty, University of Pretoria, Pretoria, South Africa","Department of Computer Science, EBIT Faculty, Cyber Security Research Group (CySec), University of Pretoria, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Group (CySec), Department of Computer Science, EBIT Faculty, University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]},{"raw_affiliation_string":"Department of Computer Science, EBIT Faculty, Cyber Security Research Group (CySec), University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029074452","display_name":"Moses Dlamini","orcid":"https://orcid.org/0000-0001-8109-2979"},"institutions":[{"id":"https://openalex.org/I69552723","display_name":"University of Pretoria","ror":"https://ror.org/00g0p6g84","country_code":"ZA","type":"education","lineage":["https://openalex.org/I69552723"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Moses T. Dlamini","raw_affiliation_strings":["Cyber Security Research Group (CySec), Department of Computer Science, EBIT Faculty, University of Pretoria, Pretoria, South Africa","Department of Computer Science, EBIT Faculty, Cyber Security Research Group (CySec), University of Pretoria, Pretoria, South Africa"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Group (CySec), Department of Computer Science, EBIT Faculty, University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]},{"raw_affiliation_string":"Department of Computer Science, EBIT Faculty, Cyber Security Research Group (CySec), University of Pretoria, Pretoria, South Africa","institution_ids":["https://openalex.org/I69552723"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5120415886"],"corresponding_institution_ids":["https://openalex.org/I69552723"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19964588,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"198623","last_page":"198648"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9693999886512756,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9693999886512756,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.00279999990016222,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.0017999999690800905,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8827999830245972},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.666100025177002},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5584999918937683},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.525600016117096},{"id":"https://openalex.org/keywords/gaussian-noise","display_name":"Gaussian noise","score":0.46149998903274536},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.3434000015258789},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.3391999900341034}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8827999830245972},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8093000054359436},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.666100025177002},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5584999918937683},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.525600016117096},{"id":"https://openalex.org/C4199805","wikidata":"https://www.wikidata.org/wiki/Q2725903","display_name":"Gaussian noise","level":2,"score":0.46149998903274536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3569999933242798},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3515999913215637},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3434000015258789},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.3391999900341034},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.33719998598098755},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31850001215934753},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30480000376701355},{"id":"https://openalex.org/C29265498","wikidata":"https://www.wikidata.org/wiki/Q7047719","display_name":"Noise measurement","level":3,"score":0.2985999882221222},{"id":"https://openalex.org/C55037315","wikidata":"https://www.wikidata.org/wiki/Q5421151","display_name":"Experimental data","level":2,"score":0.2939999997615814},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.29249998927116394},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2865000069141388},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2784000039100647},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.27649998664855957},{"id":"https://openalex.org/C160920958","wikidata":"https://www.wikidata.org/wiki/Q7662746","display_name":"Synthetic data","level":2,"score":0.27469998598098755},{"id":"https://openalex.org/C151376022","wikidata":"https://www.wikidata.org/wiki/Q168698","display_name":"Exponential function","level":2,"score":0.2563000023365021}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3635532","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3635532","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:79e6c2ac88d74f9796114383d31373ad","is_oa":true,"landing_page_url":"https://doaj.org/article/79e6c2ac88d74f9796114383d31373ad","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 198623-198648 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3635532","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3635532","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"enables":[3],"decentralized":[4],"model":[5],"training,":[6],"while":[7],"maintaining":[8,149],"the":[9,12,40,45,88,92,106,113,138,146,150,153,160,169],"privacy":[10,32,60,101,173],"of":[11,44,75,108,129,140,152],"underlying":[13],"individual":[14],"datasets.":[15],"Therefore,":[16],"FL":[17,117,185],"can":[18],"resolve":[19],"some":[20],"intrinsically":[21],"privacy-sensitive":[22],"challenges":[23],"in":[24,70,102,116,148,186],"domains,":[25],"such":[26],"as":[27],"healthcare":[28,73],"and":[29,61,84,126,144,174],"finance.":[30],"However,":[31],"preservation":[33],"usually":[34],"comes":[35,136],"with":[36],"a":[37,71,180],"trade-off":[38,57,115,147,171],"on":[39,87,112,176],"usefulness":[41,151],"(i.e.,":[42,79],"utility)":[43],"information.":[46],"The":[47,119],"research":[48],"problem":[49],"is":[50],"how":[51],"to":[52,96,99],"optimize":[53],"this":[54,177],"inversely":[55],"proportional":[56],"balance":[58],"between":[59,172],"utility.":[62,141],"This":[63,142],"study":[64],"uses":[65],"an":[66],"experimental":[67],"comparative":[68],"analysis,":[69],"synthetic":[72],"setting,":[74],"different":[76],"noise":[77,110,130,166],"types":[78,111,128],"Gaussian,":[80],"Laplacian,":[81,124],"Poisson,":[82,125],"Uniform,":[83],"Exponential)":[85],"injected":[86],"client":[89],"side":[90],"at":[91,137],"input-feature":[93],"level":[94],"prior":[95],"local":[97],"training":[98],"enhance":[100],"FL.":[103],"We":[104],"explore":[105],"impact":[107],"these":[109],"privacy\u2013utility":[114],"data.":[118],"findings":[120,161],"indicate":[121],"that":[122,164],"although":[123],"Exponential":[127],"provides":[131],"stronger":[132],"obfuscation":[133],"which":[134],"often":[135],"cost":[139],"confirms":[143],"amplifies":[145],"data":[154],"against":[155],"its":[156],"privacy.":[157],"More":[158],"importantly,":[159],"also":[162],"show":[163],"Gaussian":[165],"generally":[167],"offers":[168],"best":[170],"utility":[175],"task,":[178],"suggesting":[179],"practical":[181],"default":[182],"for":[183],"privacy-aware":[184],"healthcare-like":[187],"environments.":[188]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-20T00:00:00"}
