{"id":"https://openalex.org/W4416250159","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228649","title":"Coarse-Grained Dynamic Differential Privacy Federated Learning based on D3QN","display_name":"Coarse-Grained Dynamic Differential Privacy Federated Learning based on D3QN","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4416250159","doi":"https://doi.org/10.1109/ijcnn64981.2025.11228649"},"language":null,"primary_location":{"id":"doi:10.1109/ijcnn64981.2025.11228649","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228649","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100624236","display_name":"Jiguo Yu","orcid":"https://orcid.org/0000-0001-6451-1158"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jingbo Yu","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Engineering,Hefei,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Engineering,Hefei,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011438608","display_name":"Tao Wu","orcid":"https://orcid.org/0000-0003-1344-835X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Wu","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Engineering,Hefei,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Engineering,Hefei,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5099049961","display_name":"Nina Shu","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Nina Shu","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Engineering,Hefei,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Engineering,Hefei,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039175412","display_name":"Huaixi Wang","orcid":"https://orcid.org/0000-0002-6277-850X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaixi Wang","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Engineering,Hefei,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Engineering,Hefei,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kang Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kang Yan","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Engineering,Hefei,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Engineering,Hefei,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032920673","display_name":"Lanlan Qi","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lanlan Qi","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Engineering,Hefei,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Engineering,Hefei,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089117577","display_name":"Ru Jiang","orcid":"https://orcid.org/0000-0002-9232-8593"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruhao Jiang","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Engineering,Hefei,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Engineering,Hefei,China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110377250","display_name":"Chao Chang","orcid":"https://orcid.org/0009-0008-4073-8276"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Chang","raw_affiliation_strings":["National University of Defense Technology,College of Electronic Engineering,Hefei,China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology,College of Electronic Engineering,Hefei,China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5100624236"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18003797,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9638000130653381,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9638000130653381,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.005900000222027302,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11307","display_name":"Domain Adaptation and Few-Shot Learning","score":0.0027000000700354576,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7111999988555908},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5044999718666077},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.4627000093460083},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4302999973297119},{"id":"https://openalex.org/keywords/budget-constraint","display_name":"Budget constraint","score":0.4203000068664551},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4198000133037567},{"id":"https://openalex.org/keywords/variable","display_name":"Variable (mathematics)","score":0.4104999899864197},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.38960000872612},{"id":"https://openalex.org/keywords/markov-decision-process","display_name":"Markov decision process","score":0.3874000012874603}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.819100022315979},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7111999988555908},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5044999718666077},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.4627000093460083},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4302999973297119},{"id":"https://openalex.org/C8505890","wikidata":"https://www.wikidata.org/wiki/Q605095","display_name":"Budget constraint","level":2,"score":0.4203000068664551},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4198000133037567},{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.4104999899864197},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.38960000872612},{"id":"https://openalex.org/C106189395","wikidata":"https://www.wikidata.org/wiki/Q176789","display_name":"Markov decision process","level":3,"score":0.3874000012874603},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.35019999742507935},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.34200000762939453},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.3407999873161316},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.30880001187324524},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.3052999973297119},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2987000048160553},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.2818000018596649},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.27889999747276306},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.27570000290870667},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.27410000562667847},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.2687000036239624},{"id":"https://openalex.org/C163836022","wikidata":"https://www.wikidata.org/wiki/Q6771326","display_name":"Markov model","level":3,"score":0.26570001244544983},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.262800008058548},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.26249998807907104},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.2590000033378601},{"id":"https://openalex.org/C93959086","wikidata":"https://www.wikidata.org/wiki/Q6888345","display_name":"Model selection","level":2,"score":0.2578999996185303},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.250900000333786},{"id":"https://openalex.org/C74750220","wikidata":"https://www.wikidata.org/wiki/Q2662197","display_name":"Differential evolution","level":2,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ijcnn64981.2025.11228649","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ijcnn64981.2025.11228649","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 International Joint Conference on Neural Networks (IJCNN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2798720628","https://openalex.org/W2911978475","https://openalex.org/W2963062476","https://openalex.org/W3022244822","https://openalex.org/W3023244064","https://openalex.org/W3047304572","https://openalex.org/W3091476023","https://openalex.org/W3173181676","https://openalex.org/W3209752568","https://openalex.org/W3209767145","https://openalex.org/W4206236322","https://openalex.org/W4324268094","https://openalex.org/W4328028544","https://openalex.org/W4386243234","https://openalex.org/W4386243278","https://openalex.org/W4386260624","https://openalex.org/W4386260712","https://openalex.org/W4387870218","https://openalex.org/W4388040455","https://openalex.org/W4392904506"],"related_works":[],"abstract_inverted_index":{"Federated":[0],"learning":[1,11],"(FL)":[2],"with":[3,51,87,99,105],"differential":[4],"privacy":[5,44,64,78,92,101,107,116,153,228,267],"(DP)":[6],"is":[7,45,257],"a":[8,25,46,110,189,210,217],"promising":[9],"distributed":[10],"framework":[12],"for":[13,113,244,301,313],"protecting":[14],"user":[15],"privacy.":[16],"However,":[17],"the":[18,28,31,58,62,74,144,158,163,169,173,177,184,198,206,233,245,253,265,277,289],"introduction":[19],"of":[20,30,61,70,76,90,148,165,176,183,255,279],"DP":[21],"noise":[22],"leads":[23],"to":[24,120,171,286],"decrease":[26],"in":[27,49,66,181],"accuracy":[29,224,296],"FL":[32,50,96,136],"model":[33,40,83,97,122,137,223,294],"and":[34,128,151,168,299,304,308,311],"may":[35],"even":[36],"hinder":[37],"convergence.":[38],"Improving":[39],"performance":[41,98],"while":[42,225],"maintaining":[43],"significant":[47,159],"challenge":[48],"DP.":[52],"Existing":[53],"works":[54],"primarily":[55],"focus":[56],"on":[57,82,197],"fine-grained":[59],"allocation":[60,89],"same":[63,266],"budget":[65,79,93,102,117,154,229,268],"each":[67],"global":[68,293],"iteration":[69],"FL,":[71],"without":[72],"considering":[73],"impact":[75],"varying":[77],"per":[80,118,269],"round":[81,119],"performance.":[84,123,138],"Preliminary":[85],"experiments":[86,272],"manual":[88],"non-uniform":[91],"suggest":[94],"that":[95,220,239,252,261],"variable":[100],"outperforms":[103],"those":[104],"uniform":[106],"budget,":[108],"providing":[109],"potential":[111],"basis":[112],"dynamically":[114],"adjusting":[115],"enhance":[121],"Additionally,":[124],"client":[125,149],"data":[126,315],"heterogeneity":[127,130],"device":[129],"are":[131],"also":[132],"crucial":[133],"factors":[134],"affecting":[135],"In":[139],"this":[140],"paper,":[141],"we":[142,187,237],"investigate":[143],"joint":[145],"optimization":[146,166,178,185,207],"problem":[147,179],"selection":[150],"overall":[152],"allocation.":[155,230],"To":[156],"address":[157],"challenges":[160],"posed":[161],"by":[162,263,297,309],"coupling":[164],"variables":[167],"inability":[170],"express":[172],"objective":[174],"function":[175,219],"explicitly":[180],"terms":[182],"variables,":[186],"propose":[188],"Coarse-Grained":[190],"Dynamic":[191],"Differential":[192],"Privacy":[193],"(CGDDP)":[194],"scheme":[195,291],"based":[196],"Dueling":[199],"Double":[200],"Deep":[201],"Q":[202],"Network":[203],"(D3QN),":[204],"modeling":[205],"task":[208],"as":[209],"Markov":[211],"Decision":[212],"Process.":[213],"We":[214],"carefully":[215],"design":[216],"reward":[218],"encourages":[221],"higher":[222],"penalizing":[226],"excessive":[227],"By":[231],"introducing":[232],"sequential":[234],"composition":[235],"theorem,":[236],"prove":[238],"CGDDP":[240,256],"provides":[241],"(\u03b5,":[242],"\u03b4)-D\u03a1":[243],"entire":[246],"local":[247],"model.":[248],"Theoretical":[249],"analysis":[250],"confirms":[251],"security":[254],"no":[258],"less":[259],"than":[260],"achieved":[262],"allocating":[264],"round.":[270],"Extensive":[271],"under":[273],"various":[274],"configurations":[275],"validate":[276],"effectiveness":[278],"CGDDP.":[280],"The":[281],"results":[282],"show":[283],"that,":[284],"compared":[285],"traditional":[287],"methods,":[288],"proposed":[290],"improves":[292],"prediction":[295],"5.78%":[298],"4.8%":[300],"non-IID":[302],"MNIST":[303],"FashionMNIST":[305],"datasets,":[306],"respectively,":[307],"17.78%":[310],"7.53%":[312],"IID":[314],"distributions.":[316]},"counts_by_year":[],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-11-14T00:00:00"}
