{"id":"https://openalex.org/W4313173408","doi":"https://doi.org/10.1109/tc.2022.3230904","title":"PrivAim: A Dual-Privacy Preserving and Quality-Aware Incentive Mechanism for Federated Learning","display_name":"PrivAim: A Dual-Privacy Preserving and Quality-Aware Incentive Mechanism for Federated Learning","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4313173408","doi":"https://doi.org/10.1109/tc.2022.3230904"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2022.3230904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2022.3230904","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102020589","display_name":"Dan Wang","orcid":"https://orcid.org/0000-0002-8132-9785"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dan Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015419107","display_name":"Ju Ren","orcid":"https://orcid.org/0000-0003-2782-183X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ju Ren","raw_affiliation_strings":["Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China","Zhongguancun Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100422345","display_name":"Zhibo Wang","orcid":"https://orcid.org/0000-0002-5804-3279"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhibo Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100773308","display_name":"Yichuan Wang","orcid":"https://orcid.org/0000-0001-6575-1954"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yichuan Wang","raw_affiliation_strings":["School of Computer Science and Engineering, Xi&#x0027;an University of Technology, Xi&#x0027;an, China","Shaanxi Key Laboratory for Network Computing and Security Technology, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Xi&#x0027;an University of Technology, Xi&#x0027;an, China","institution_ids":[]},{"raw_affiliation_string":"Shaanxi Key Laboratory for Network Computing and Security Technology, Xi'an, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069049205","display_name":"Yaoxue Zhang","orcid":"https://orcid.org/0000-0001-6717-461X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaoxue Zhang","raw_affiliation_strings":["Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China","Zhongguancun Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, BNRist, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]},{"raw_affiliation_string":"Zhongguancun Laboratory, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102020589"],"corresponding_institution_ids":["https://openalex.org/I139660479"],"apc_list":null,"apc_paid":null,"fwci":3.7475,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.94054377,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.7682220935821533},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7549259662628174},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7253910899162292},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.6514456272125244},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.5365659594535828},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5199655294418335},{"id":"https://openalex.org/keywords/schedule","display_name":"Schedule","score":0.4688001275062561},{"id":"https://openalex.org/keywords/privacy-policy","display_name":"Privacy policy","score":0.4205382466316223},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4167192280292511},{"id":"https://openalex.org/keywords/mechanism-design","display_name":"Mechanism design","score":0.41390347480773926},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.25138452649116516},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.13979259133338928},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.11935386061668396},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11072796583175659},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.0875968337059021}],"concepts":[{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.7682220935821533},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7549259662628174},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7253910899162292},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.6514456272125244},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.5365659594535828},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5199655294418335},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.4688001275062561},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.4205382466316223},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4167192280292511},{"id":"https://openalex.org/C153517567","wikidata":"https://www.wikidata.org/wiki/Q26090","display_name":"Mechanism design","level":2,"score":0.41390347480773926},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.25138452649116516},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.13979259133338928},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.11935386061668396},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11072796583175659},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0875968337059021},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2022.3230904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2022.3230904","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5799999833106995,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1606058619","https://openalex.org/W2109426455","https://openalex.org/W2473418344","https://openalex.org/W2591882872","https://openalex.org/W2594557668","https://openalex.org/W2595135509","https://openalex.org/W2784621220","https://openalex.org/W2807006176","https://openalex.org/W2918718461","https://openalex.org/W2972882814","https://openalex.org/W2984693664","https://openalex.org/W3001989995","https://openalex.org/W3015515533","https://openalex.org/W3016632787","https://openalex.org/W3025029677","https://openalex.org/W3048634206","https://openalex.org/W3091476023","https://openalex.org/W3098064161","https://openalex.org/W3112877893","https://openalex.org/W3114547504","https://openalex.org/W3120176213","https://openalex.org/W3122462552","https://openalex.org/W3131133211","https://openalex.org/W3132132958","https://openalex.org/W3155189475","https://openalex.org/W3168577198","https://openalex.org/W3173540700","https://openalex.org/W3184402277","https://openalex.org/W3195582989","https://openalex.org/W3206985409","https://openalex.org/W4205228770","https://openalex.org/W4205597275","https://openalex.org/W4225666560","https://openalex.org/W4288563649","https://openalex.org/W4318619660","https://openalex.org/W6728757088","https://openalex.org/W6747855403","https://openalex.org/W6752029299","https://openalex.org/W6754199392","https://openalex.org/W6763736615","https://openalex.org/W6790104916","https://openalex.org/W6790704066","https://openalex.org/W6796598752","https://openalex.org/W6800540296"],"related_works":["https://openalex.org/W2116878667","https://openalex.org/W3042284153","https://openalex.org/W1493227450","https://openalex.org/W4241527182","https://openalex.org/W4250923762","https://openalex.org/W576625533","https://openalex.org/W857570378","https://openalex.org/W2163661494","https://openalex.org/W315296216","https://openalex.org/W2900699882"],"abstract_inverted_index":{"Privacy":[0],"protection":[1],"and":[2,22,68,102,120,128,143,171,184,189,195],"incentive":[3,39,58,104],"mechanism":[4,135],"are":[5],"two":[6],"fundamental":[7],"problems":[8,44],"in":[9,94,148],"federated":[10,108],"learning":[11],"(FL),":[12],"which":[13],"aim":[14],"at":[15,186],"protecting":[16],"the":[17,52,56,80,84,117,124,152,201],"privacy":[18,35,53,114],"of":[19,49,87],"data":[20,66,88,138],"owners":[21,139],"stimulating":[23],"them":[24,50],"to":[25,41,115,136,146,200],"share":[26],"more":[27],"resources,":[28],"respectively.":[29],"Recent":[30],"works":[31],"have":[32],"proposed":[33],"differential":[34,113,172],"(DP)":[36],"based":[37],"privacy-preserving":[38],"mechanisms":[40],"solve":[42,91],"both":[43],"simultaneously.":[45],"However,":[46],"almost":[47],"all":[48],"took":[51],"level":[54],"as":[55,65],"only":[57],"item,":[59],"without":[60,150],"considering":[61],"other":[62],"factors,":[63],"such":[64],"quantity":[67],"quality.":[69],"Moreover,":[70],"an":[71],"untrusted":[72,125],"server":[73],"can":[74,179],"further":[75],"infer":[76],"sensitive":[77],"information":[78],"from":[79],"bids":[81],"that":[82,158,177],"reflect":[83],"true":[85,121,153],"costs":[86,122],"owners.":[89],"To":[90],"these":[92],"problems,":[93],"this":[95],"paper,":[96],"we":[97],"propose":[98],"a":[99,131],"dual-privacy":[100],"preserving":[101],"quality-aware":[103],"mechanism,":[105],"PrivAim,":[106],"for":[107],"learning.":[109],"Specifically,":[110],"it":[111],"utilizes":[112],"protect":[116,181],"local":[118],"models":[119],"against":[123],"parameter":[126],"server,":[127],"carefully":[129],"designs":[130],"multi-dimensional":[132],"reverse":[133],"auction":[134],"incentivize":[137],"with":[140],"high":[141],"quality":[142],"low":[144],"cost":[145],"participate":[147],"FL":[149],"knowing":[151],"bids.":[154],"We":[155],"theoretically":[156],"prove":[157],"PrivAim":[159,178],"satisfies":[160],"<inline-formula":[161],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[162],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[163],"notation=\"LaTeX\">$\\Delta":[164],"b$</tex-math></inline-formula>":[165],"-truthfulness,":[166],"individual":[167],"rational,":[168],"computational":[169],"efficiency,":[170],"privacy.":[173],"Extensive":[174],"experiments":[175],"show":[176],"effectively":[180],"bid":[182],"privacy,":[183],"achieve":[185],"least":[187],"21%":[188],"6%":[190],"improvement":[191],"on":[192],"social":[193],"welfare":[194],"model":[196],"accuracy,":[197],"respectively,":[198],"compared":[199],"state-of-the-art.":[202]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":4}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
