{"id":"https://openalex.org/W4386360578","doi":"https://doi.org/10.1109/icccworkshops57813.2023.10233757","title":"Federated Learning-Based Privacy Protection for IoT-based Smart Healthcare Systems","display_name":"Federated Learning-Based Privacy Protection for IoT-based Smart Healthcare Systems","publication_year":2023,"publication_date":"2023-08-10","ids":{"openalex":"https://openalex.org/W4386360578","doi":"https://doi.org/10.1109/icccworkshops57813.2023.10233757"},"language":"en","primary_location":{"id":"doi:10.1109/icccworkshops57813.2023.10233757","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccworkshops57813.2023.10233757","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012086581","display_name":"Fan Jiang","orcid":"https://orcid.org/0000-0003-0634-101X"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fan Jiang","raw_affiliation_strings":["Shaanxi Key Laboratory of Information Communication Network and Security,Xi&#x2019;an,China","Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security,Xi&#x2019;an,China","institution_ids":[]},{"raw_affiliation_string":"Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080987750","display_name":"Zidong Chen","orcid":"https://orcid.org/0000-0001-7795-4804"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zidong Chen","raw_affiliation_strings":["Shaanxi Key Laboratory of Information Communication Network and Security,Xi&#x2019;an,China","Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security,Xi&#x2019;an,China","institution_ids":[]},{"raw_affiliation_string":"Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100349496","display_name":"Lei Liu","orcid":"https://orcid.org/0000-0001-8173-0408"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Liu","raw_affiliation_strings":["Shaanxi Key Laboratory of Information Communication Network and Security,Xi&#x2019;an,China","Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security,Xi&#x2019;an,China","institution_ids":[]},{"raw_affiliation_string":"Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025530726","display_name":"Junxuan Wang","orcid":"https://orcid.org/0000-0002-5386-9012"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junxuan Wang","raw_affiliation_strings":["Shaanxi Key Laboratory of Information Communication Network and Security,Xi&#x2019;an,China","Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Shaanxi Key Laboratory of Information Communication Network and Security,Xi&#x2019;an,China","institution_ids":[]},{"raw_affiliation_string":"Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5012086581"],"corresponding_institution_ids":["https://openalex.org/I4210136859"],"apc_list":null,"apc_paid":null,"fwci":0.8757,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.7887713,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8863304853439331},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8614238500595093},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8380410671234131},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.7467860579490662},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6679671406745911},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4622459411621094},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45835840702056885},{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.45769554376602173},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4216599762439728},{"id":"https://openalex.org/keywords/noise","display_name":"Noise (video)","score":0.4162677526473999},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.30237340927124023},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.22588256001472473},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.18998587131500244}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8863304853439331},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8614238500595093},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8380410671234131},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.7467860579490662},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6679671406745911},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4622459411621094},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45835840702056885},{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.45769554376602173},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4216599762439728},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.4162677526473999},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30237340927124023},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.22588256001472473},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.18998587131500244},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccworkshops57813.2023.10233757","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccworkshops57813.2023.10233757","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE/CIC International Conference on Communications in China (ICCC Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2083761388","https://openalex.org/W2914630606","https://openalex.org/W2963965291","https://openalex.org/W3012990321","https://openalex.org/W3013310637","https://openalex.org/W3016632787","https://openalex.org/W3157850870","https://openalex.org/W3163893137","https://openalex.org/W4224526847","https://openalex.org/W4283210780","https://openalex.org/W4289536603","https://openalex.org/W4301242115","https://openalex.org/W4317436377","https://openalex.org/W6751920018","https://openalex.org/W6770634426"],"related_works":["https://openalex.org/W4386820853","https://openalex.org/W4390887375","https://openalex.org/W2094069016","https://openalex.org/W4212859770","https://openalex.org/W1484081998","https://openalex.org/W3036675567","https://openalex.org/W2955273252","https://openalex.org/W2518050971","https://openalex.org/W1507098372","https://openalex.org/W2092515448"],"abstract_inverted_index":{"In":[0],"this":[1,41],"paper,":[2],"we":[3,43,98],"propose":[4],"a":[5,46,62,79,150],"Federated":[6],"Privacy-Enhanced":[7],"Healthcare":[8],"(FPEH)":[9],"learning":[10],"framework":[11],"based":[12],"on":[13],"Gaussian":[14,47,76],"differential":[15,48],"privacy":[16,24,35,140],"and":[17,72,128,148],"Paillier":[18,100],"homomorphic":[19,101],"encryption":[20,102],"to":[21,51,54,68,86,103],"enhance":[22,69],"data":[23,34,144],"protection":[25],"for":[26],"IoT-based":[27],"smart":[28],"healthcare":[29],"systems.":[30],"To":[31],"address":[32],"the":[33,38,55,58,70,75,88,91,105,111,114,119,134,139,142,156],"issues":[36],"of":[37,74,90,113,141],"clients":[39],"in":[40,57],"scenario,":[42],"first":[44],"apply":[45],"privacy-based":[49],"mechanism":[50,82],"add":[52],"noise":[53],"parameters":[56],"client":[59,92],"models.":[60],"Secondly,":[61],"constant":[63],"factor":[64],"is":[65,83],"initially":[66],"introduced":[67],"randomness":[71],"unpredictability":[73],"noise.":[77,96],"Furthermore,":[78],"gradient":[80],"clipping":[81],"also":[84],"adopted":[85],"ensure":[87],"effectiveness":[89],"model":[93,107],"after":[94],"adding":[95],"Finally,":[97],"employ":[99],"encrypt":[104],"noisy":[106],"parameters,":[108],"further":[109],"ensuring":[110],"security":[112],"original":[115,143],"data.":[116],"We":[117],"evaluate":[118],"proposed":[120,135],"method":[121,136],"by":[122],"applying":[123],"two":[124],"datasets,":[125],"namely":[126],"MNIST":[127],"PneumoniaMNIST.":[129],"Simulation":[130],"results":[131],"demonstrate":[132],"that":[133],"can":[137],"protect":[138],"from":[145],"being":[146],"leaked":[147],"achieve":[149],"similar":[151],"test":[152],"accuracy":[153],"level":[154],"as":[155],"comparison":[157],"algorithms.":[158]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
