{"id":"https://openalex.org/W4414538921","doi":"https://doi.org/10.1109/icc52391.2025.11161862","title":"CSPFed: Compressed Sensing-Enhanced Privacy-Preserving Federated Learning for Efficient Multi-Domain Scenarios","display_name":"CSPFed: Compressed Sensing-Enhanced Privacy-Preserving Federated Learning for Efficient Multi-Domain Scenarios","publication_year":2025,"publication_date":"2025-06-08","ids":{"openalex":"https://openalex.org/W4414538921","doi":"https://doi.org/10.1109/icc52391.2025.11161862"},"language":"en","primary_location":{"id":"doi:10.1109/icc52391.2025.11161862","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015453213","display_name":"Rui Xiong","orcid":"https://orcid.org/0009-0004-4670-5185"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Rui Xiong","raw_affiliation_strings":["School of Computer Science, Chongqing University,Chongqing,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Chongqing University,Chongqing,China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101492966","display_name":"Hongying Zheng","orcid":"https://orcid.org/0000-0001-8872-9995"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongying Zheng","raw_affiliation_strings":["School of Computer Science, Chongqing University,Chongqing,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Chongqing University,Chongqing,China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100729507","display_name":"Di Xiao","orcid":"https://orcid.org/0000-0002-6958-5807"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Di Xiao","raw_affiliation_strings":["School of Computer Science, Chongqing University,Chongqing,China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Chongqing University,Chongqing,China","institution_ids":["https://openalex.org/I158842170"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015453213"],"corresponding_institution_ids":["https://openalex.org/I158842170"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14461265,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"392","last_page":"397"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.7289000153541565},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6326000094413757},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.6209999918937683},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.617900013923645},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5800999999046326},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5767999887466431},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5187000036239624},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4731999933719635}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.835099995136261},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.7289000153541565},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6326000094413757},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.6209999918937683},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.617900013923645},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5800999999046326},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5767999887466431},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5187000036239624},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4731999933719635},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.40869998931884766},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3995000123977661},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3935000002384186},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.383899986743927},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.3407000005245209},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33009999990463257},{"id":"https://openalex.org/C127576917","wikidata":"https://www.wikidata.org/wiki/Q624630","display_name":"Competitor analysis","level":2,"score":0.329800009727478},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32910001277923584},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.32199999690055847},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3149999976158142},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2976999878883362},{"id":"https://openalex.org/C2779582901","wikidata":"https://www.wikidata.org/wiki/Q21013010","display_name":"Distributed learning","level":2,"score":0.2976999878883362},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.29409998655319214},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2736000120639801},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.25380000472068787},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2529999911785126},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.250900000333786}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc52391.2025.11161862","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc52391.2025.11161862","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2025 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W3091870957","https://openalex.org/W3135434750","https://openalex.org/W3204874618","https://openalex.org/W4283796083","https://openalex.org/W4327643804","https://openalex.org/W4386076561","https://openalex.org/W4403758710"],"related_works":[],"abstract_inverted_index":{"Federated":[0,60],"Learning":[1,62],"enables":[2],"collaborative":[3],"model":[4,45,112],"training":[5],"across":[6],"multiple":[7,19],"devices":[8],"without":[9],"sharing":[10],"raw":[11],"data.":[12],"However,":[13],"when":[14],"private":[15,72],"data":[16,97,117],"originates":[17],"from":[18],"domains":[20,31],"with":[21],"different":[22],"feature":[23],"distributions,":[24],"the":[25,54,65,68,84,102,121,134,137,141],"model's":[26],"generalization":[27,66],"ability":[28],"on":[29,71,127],"unseen":[30],"can":[32],"deteriorate.":[33],"Moreover,":[34],"existing":[35],"methods":[36],"often":[37],"overlook":[38],"privacy":[39],"protection":[40],"and":[41,101,140],"communication":[42,108],"overhead":[43,109],"during":[44],"performance":[46],"enhancement.":[47],"To":[48],"address":[49],"these":[50],"challenges,":[51],"we":[52,58,75,87],"propose":[53,88],"CSPFed":[55,119],"Framework.":[56],"First,":[57],"introduce":[59],"Prototype":[61],"to":[63,95],"improve":[64],"of":[67,83,136,143],"Global":[69],"Model":[70],"domains.":[73],"Next,":[74],"employ":[76],"improved":[77],"Compressed":[78],"Sensing":[79],"for":[80],"lossy":[81],"compression":[82],"model.":[85],"Finally,":[86],"a":[89],"block-based":[90],"CKKS":[91],"Homomorphic":[92],"Encryption":[93],"Algorithm":[94],"encrypt":[96],"transmitted":[98],"between":[99],"clients":[100],"server.":[103],"This":[104],"framework":[105],"significantly":[106],"reduces":[107],"while":[110,115],"enhancing":[111],"accuracy,":[113],"all":[114],"ensuring":[116],"privacy.":[118],"outperforms":[120],"best":[122],"competitors":[123],"by":[124],"5.59":[125],"%":[126],"two":[128],"public":[129],"datasets.":[130],"Empirical":[131],"results":[132],"demonstrate":[133],"effectiveness":[135],"proposed":[138],"solution":[139],"efficiency":[142],"its":[144],"key":[145],"components.":[146]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
