{"id":"https://openalex.org/W4403331644","doi":"https://doi.org/10.1109/jiot.2024.3478208","title":"A Lightweight and Accuracy-Lossless Privacy-Preserving Method in Federated Learning","display_name":"A Lightweight and Accuracy-Lossless Privacy-Preserving Method in Federated Learning","publication_year":2024,"publication_date":"2024-10-11","ids":{"openalex":"https://openalex.org/W4403331644","doi":"https://doi.org/10.1109/jiot.2024.3478208"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3478208","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3478208","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100412108","display_name":"Zhen Liu","orcid":"https://orcid.org/0009-0009-1684-050X"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhen Liu","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","School of Computer Science and Information Security, Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Computer Science and Information Security, Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050313501","display_name":"Changsong Yang","orcid":"https://orcid.org/0000-0002-5273-8678"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changsong Yang","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, and the Guangxi Engineering Research Center of Industrial Internet Security and Blockchain, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","School of Computer Science and Information Security, Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, and the Guangxi Engineering Research Center of Industrial Internet Security and Blockchain, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Computer Science and Information Security, Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078775578","display_name":"Yong Ding","orcid":"https://orcid.org/0000-0002-3571-7576"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Ding","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, and the Guangxi Engineering Research Center of Industrial Internet Security and Blockchain, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","School of Computer Science and Information Security, Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, and the Guangxi Engineering Research Center of Industrial Internet Security and Blockchain, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Computer Science and Information Security, Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055652863","display_name":"Hai Liang","orcid":"https://orcid.org/0000-0002-7369-5398"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Liang","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","School of Computer Science and Information Security, Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Computer Science and Information Security, Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100700688","display_name":"Yujue Wang","orcid":"https://orcid.org/0000-0002-0951-8880"},"institutions":[{"id":"https://openalex.org/I55712492","display_name":"Zhejiang University of Technology","ror":"https://ror.org/02djqfd08","country_code":"CN","type":"education","lineage":["https://openalex.org/I55712492"]},{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yujue Wang","raw_affiliation_strings":["Research Center of Cyber Science and Technology, Hangzhou Innovation Institute of Beihang University, Hangzhou, Zhejiang, China","Hangzhou Innovation Institute of Beihang University, Hangzhou, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"Research Center of Cyber Science and Technology, Hangzhou Innovation Institute of Beihang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I55712492"]},{"raw_affiliation_string":"Hangzhou Innovation Institute of Beihang University, Hangzhou, Zhejiang, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100412108"],"corresponding_institution_ids":["https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":1.0425,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.81315661,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"12","issue":"3","first_page":"3118","last_page":"3129"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9584000110626221,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9458000063896179,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8520199060440063},{"id":"https://openalex.org/keywords/lossless-compression","display_name":"Lossless compression","score":0.7495946884155273},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4849872589111328},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.44161632657051086},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3567394018173218},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3223826289176941},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.31119030714035034},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.30311721563339233},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27414068579673767}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8520199060440063},{"id":"https://openalex.org/C81081738","wikidata":"https://www.wikidata.org/wiki/Q55542","display_name":"Lossless compression","level":3,"score":0.7495946884155273},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4849872589111328},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.44161632657051086},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3567394018173218},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3223826289176941},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.31119030714035034},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.30311721563339233},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27414068579673767}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3478208","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3478208","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G328423915","display_name":null,"funder_award_id":"62162017","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5431623549","display_name":null,"funder_award_id":"61962012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W133884053","https://openalex.org/W2130486630","https://openalex.org/W2233116163","https://openalex.org/W2794825826","https://openalex.org/W2896938420","https://openalex.org/W2930926105","https://openalex.org/W2966536036","https://openalex.org/W3013310637","https://openalex.org/W3111009493","https://openalex.org/W3133751570","https://openalex.org/W3172312230","https://openalex.org/W3193779274","https://openalex.org/W4306874801","https://openalex.org/W4328053138","https://openalex.org/W4372269210","https://openalex.org/W4383754164","https://openalex.org/W4385627109","https://openalex.org/W4386083129","https://openalex.org/W4386124540","https://openalex.org/W4386831200","https://openalex.org/W4387817870","https://openalex.org/W4389185880","https://openalex.org/W4389370843","https://openalex.org/W4389722404","https://openalex.org/W4391020754","https://openalex.org/W4392459667","https://openalex.org/W4392902052","https://openalex.org/W4399168337","https://openalex.org/W4402264327","https://openalex.org/W6639703010","https://openalex.org/W6728757088","https://openalex.org/W6730047919","https://openalex.org/W6764838729","https://openalex.org/W6768378473","https://openalex.org/W6773039429","https://openalex.org/W6783970114","https://openalex.org/W6788034315","https://openalex.org/W6845905529","https://openalex.org/W6847083137","https://openalex.org/W6849959883","https://openalex.org/W6855605430"],"related_works":["https://openalex.org/W2948148442","https://openalex.org/W2461250372","https://openalex.org/W2394342941","https://openalex.org/W2169853506","https://openalex.org/W2547124190","https://openalex.org/W2350586049","https://openalex.org/W2385628723","https://openalex.org/W2057878850","https://openalex.org/W2032414556","https://openalex.org/W2169871401"],"abstract_inverted_index":{"The":[0,140],"emergence":[1],"of":[2,23,63,81],"big":[3],"data":[4,37,58],"and":[5,19,25,60,88,104,120,131,156,215,223],"artificial":[6],"intelligence":[7],"(AI)":[8],"marks":[9],"a":[10,71,85,129],"significant":[11,47],"milestone":[12],"in":[13],"technological":[14],"advancement,":[15],"impacting":[16],"various":[17],"sectors":[18],"transforming":[20],"the":[21,42,52,55,61,78,110,117,146,158,169,177,182,191,197,210,216,225],"essence":[22],"public":[24],"personal":[26],"activities.":[27],"Traditional":[28],"machine":[29],"learning,":[30,34],"known":[31],"as":[32,70],"centralized":[33],"involves":[35],"collecting":[36],"from":[38,116,152],"multiple":[39],"sources":[40],"for":[41,57,77,112,213],"model":[43,82,94,148,178],"development,":[44],"which":[45],"poses":[46],"privacy":[48,106,189,222],"risks.":[49],"To":[50,123,167],"address":[51,124],"conflict":[53],"between":[54,84],"need":[56],"sharing":[59,80],"protection":[62],"privacy,":[64],"federated":[65],"learning":[66],"(FL)":[67],"has":[68],"emerged":[69],"promising":[72],"solution.":[73],"This":[74],"approach":[75,207],"allows":[76],"continuous":[79],"updates":[83],"central":[86,118,141],"server":[87,119,142],"numerous":[89],"local":[90,121,159],"devices,":[91],"fostering":[92],"collaborative":[93],"development.":[95],"However,":[96],"it":[97],"also":[98],"brings":[99],"about":[100],"considerable":[101],"communication":[102,170,211],"costs":[103],"raises":[105],"concerns":[107],"due":[108],"to":[109,145,149,187],"potential":[111],"sensitive":[113],"information":[114,184],"leakage":[115],"devices.":[122],"these":[125,162],"issues,":[126],"we":[127],"propose":[128],"lightweight":[130],"accuracy-lossless":[132],"privacy-preserving":[133],"FL":[134],"scheme":[135],"based":[136],"on":[137,176],"gradient":[138],"clipping.":[139],"introduces":[143],"noise":[144],"global":[147],"prevent":[150],"clients":[151,214],"extracting":[153],"valuable":[154],"information,":[155],"then":[157],"devices":[160],"train":[161],"models":[163],"using":[164,181,196],"their":[165],"data.":[166],"reduce":[168],"load,":[171],"parameters":[172,193],"with":[173],"less":[174],"impact":[175],"are":[179,194],"removed":[180],"Fisher":[183],"matrix.":[185],"Additionally,":[186],"enhance":[188],"protection,":[190],"client-computed":[192],"perturbed":[195],"Diffie-Hellman":[198],"key":[199],"exchange":[200],"method.":[201],"Our":[202],"experiments":[203],"show":[204],"that":[205],"this":[206],"greatly":[208],"reduces":[209],"load":[212],"server,":[217],"while":[218],"effectively":[219],"safeguarding":[220],"client":[221],"maintaining":[224],"model\u2019s":[226],"accuracy.":[227]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
