{"id":"https://openalex.org/W4409640931","doi":"https://doi.org/10.1109/tce.2025.3562767","title":"GHPPFL: A Privacy Preserving Federated Learning Based on Gradient Compression and Homomorphic Encryption in Consumer App Security","display_name":"GHPPFL: A Privacy Preserving Federated Learning Based on Gradient Compression and Homomorphic Encryption in Consumer App Security","publication_year":2025,"publication_date":"2025-04-21","ids":{"openalex":"https://openalex.org/W4409640931","doi":"https://doi.org/10.1109/tce.2025.3562767"},"language":"en","primary_location":{"id":"doi:10.1109/tce.2025.3562767","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3562767","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100358440","display_name":"Qiong Li","orcid":"https://orcid.org/0000-0002-5338-0524"},"institutions":[{"id":"https://openalex.org/I4210101171","display_name":"Zhejiang Industry Polytechnic College","ror":"https://ror.org/0192j7z55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210101171"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiong Li","raw_affiliation_strings":["Hunan Engineering Technology Research Center of Digitalization of CNC Machining Process for Precision Parts, Hunan Industry Polytechnic, Changsha, China","Hunan Engineering Technology Research Center of Digitalization of CNC Machining Process for Precision Parts, Changsha, China"],"raw_orcid":"https://orcid.org/0000-0002-5338-0524","affiliations":[{"raw_affiliation_string":"Hunan Engineering Technology Research Center of Digitalization of CNC Machining Process for Precision Parts, Hunan Industry Polytechnic, Changsha, China","institution_ids":["https://openalex.org/I4210101171"]},{"raw_affiliation_string":"Hunan Engineering Technology Research Center of Digitalization of CNC Machining Process for Precision Parts, Changsha, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5117235435","display_name":"Rongsheng Cai","orcid":null},"institutions":[{"id":"https://openalex.org/I4210154330","display_name":"Liming Vocational University","ror":"https://ror.org/059s9d453","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210154330"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rongsheng Cai","raw_affiliation_strings":["School of Information and Electronic Engineering, Liming Vocational University, Quanzhou, China","Liming Vocational University, Quanzhou, China"],"raw_orcid":"https://orcid.org/0009-0007-8908-3074","affiliations":[{"raw_affiliation_string":"School of Information and Electronic Engineering, Liming Vocational University, Quanzhou, China","institution_ids":["https://openalex.org/I4210154330"]},{"raw_affiliation_string":"Liming Vocational University, Quanzhou, China","institution_ids":["https://openalex.org/I4210154330"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011340503","display_name":"Yizhao Zhu","orcid":"https://orcid.org/0009-0003-5516-6585"},"institutions":[{"id":"https://openalex.org/I4210101171","display_name":"Zhejiang Industry Polytechnic College","ror":"https://ror.org/0192j7z55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210101171"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yizhao Zhu","raw_affiliation_strings":["Hunan Engineering Technology Research Center of Digitalization of CNC Machining Process for Precision Parts, Hunan Industry Polytechnic, Changsha, China","Hunan Engineering Technology Research Center of Digitalization of CNC Machining Process for Precision Parts, Changsha, China"],"raw_orcid":"https://orcid.org/0009-0003-5516-6585","affiliations":[{"raw_affiliation_string":"Hunan Engineering Technology Research Center of Digitalization of CNC Machining Process for Precision Parts, Hunan Industry Polytechnic, Changsha, China","institution_ids":["https://openalex.org/I4210101171"]},{"raw_affiliation_string":"Hunan Engineering Technology Research Center of Digitalization of CNC Machining Process for Precision Parts, Changsha, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100358440"],"corresponding_institution_ids":["https://openalex.org/I4210101171"],"apc_list":null,"apc_paid":null,"fwci":10.8663,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.97890115,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"71","issue":"2","first_page":"5090","last_page":"5099"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9567999839782715,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8956595659255981},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7162734270095825},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.542656660079956},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.45345139503479004},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4340444803237915}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8956595659255981},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7162734270095825},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.542656660079956},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.45345139503479004},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4340444803237915}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tce.2025.3562767","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tce.2025.3562767","pdf_url":null,"source":{"id":"https://openalex.org/S126824455","display_name":"IEEE Transactions on Consumer Electronics","issn_l":"0098-3063","issn":["0098-3063","1558-4127"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Consumer Electronics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W2801874531","https://openalex.org/W2900996896","https://openalex.org/W2912213068","https://openalex.org/W2917742948","https://openalex.org/W2940534673","https://openalex.org/W2979658571","https://openalex.org/W2981930049","https://openalex.org/W3028719682","https://openalex.org/W3120721446","https://openalex.org/W3174842369","https://openalex.org/W3185360874","https://openalex.org/W3188217491","https://openalex.org/W3193351399","https://openalex.org/W3193779274","https://openalex.org/W3206162503","https://openalex.org/W4210368049","https://openalex.org/W4210490391","https://openalex.org/W4210616970","https://openalex.org/W4285206772","https://openalex.org/W4285235045","https://openalex.org/W4295832541","https://openalex.org/W4312396751","https://openalex.org/W4313316095","https://openalex.org/W4319027606","https://openalex.org/W4322576473","https://openalex.org/W4323363023","https://openalex.org/W4365128754","https://openalex.org/W4386275563","https://openalex.org/W4387010736","https://openalex.org/W4387986831","https://openalex.org/W4389104772","https://openalex.org/W4390348498","https://openalex.org/W4391249105","https://openalex.org/W4392826972","https://openalex.org/W4393973089","https://openalex.org/W4402371435","https://openalex.org/W4404630194","https://openalex.org/W4406048541","https://openalex.org/W4406067657","https://openalex.org/W4406220612","https://openalex.org/W6781175393","https://openalex.org/W6810249531"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4408218896","https://openalex.org/W2539930818","https://openalex.org/W4406779505","https://openalex.org/W4403623784","https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W4408501329"],"abstract_inverted_index":{"As":[0],"Artificial":[1],"Intelligence":[2],"(AI)":[3],"progresses,":[4],"the":[5,31,72,101,104,114],"application":[6],"of":[7,33,86,103,118],"federated":[8,48,119],"learning":[9,25,49],"in":[10],"areas":[11],"such":[12],"as":[13],"consumer":[14],"app":[15],"security":[16,37,117],"and":[17,112,116],"intelligent":[18],"transportation":[19],"systems":[20],"is":[21,64,81],"increasing":[22],"rapidly.":[23],"Federated":[24],"allows":[26],"model":[27,73],"training":[28],"without":[29],"necessitating":[30],"sharing":[32],"local":[34],"data,":[35],"yet":[36],"issues":[38],"present":[39],"obstacles":[40],"to":[41,66,83],"its":[42],"advancement.":[43],"This":[44],"paper":[45],"presents":[46],"a":[47,59,97],"method":[50],"that":[51,92],"merges":[52],"gradient":[53,61,87],"compression":[54,62],"with":[55],"homomorphic":[56,79],"encryption.":[57],"Firstly,":[58],"unique":[60],"technique":[63],"proposed":[65,94],"reduce":[67],"data":[68,110],"transfer":[69],"by":[70],"compressing":[71],"parameters":[74],"exchanged":[75],"among":[76],"clients.":[77],"Then,":[78],"encryption":[80],"utilized":[82],"prevent":[84],"breaches":[85],"privacy.":[88],"Experimental":[89],"results":[90],"demonstrate":[91],"our":[93],"approach":[95],"has":[96],"minimal":[98],"impact":[99],"on":[100],"accuracy":[102],"global":[105],"model,":[106],"while":[107],"it":[108],"reduces":[109],"transmission":[111],"improves":[113],"privacy":[115],"learning.":[120]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
