{"id":"https://openalex.org/W4387385562","doi":"https://doi.org/10.1109/tifs.2023.3322328","title":"LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy Preserving","display_name":"LDS-FL: Loss Differential Strategy Based Federated Learning for Privacy Preserving","publication_year":2023,"publication_date":"2023-10-05","ids":{"openalex":"https://openalex.org/W4387385562","doi":"https://doi.org/10.1109/tifs.2023.3322328"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3322328","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3322328","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070952464","display_name":"Taiyu Wang","orcid":"https://orcid.org/0000-0003-3594-0169"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Taiyu Wang","raw_affiliation_strings":["School of Intelligent Systems Engineering, Sun Yat-Sen University, Shenzhen, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Intelligent Systems Engineering, Sun Yat-Sen University, Shenzhen, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071062179","display_name":"Qinglin Yang","orcid":"https://orcid.org/0000-0002-7263-8914"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinglin Yang","raw_affiliation_strings":["School of Intelligent Systems Engineering, Sun Yat-Sen University, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-7263-8914","affiliations":[{"raw_affiliation_string":"School of Intelligent Systems Engineering, Sun Yat-Sen University, Shenzhen, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050267815","display_name":"Kaiming Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaiming Zhu","raw_affiliation_strings":["School of Intelligent Systems Engineering, Sun Yat-Sen University, Shenzhen, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Intelligent Systems Engineering, Sun Yat-Sen University, Shenzhen, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026553438","display_name":"Junbo Wang","orcid":"https://orcid.org/0000-0002-2748-8953"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junbo Wang","raw_affiliation_strings":["School of Intelligent Systems Engineering, Sun Yat-Sen University, Shenzhen, China"],"raw_orcid":"https://orcid.org/0000-0002-2748-8953","affiliations":[{"raw_affiliation_string":"School of Intelligent Systems Engineering, Sun Yat-Sen University, Shenzhen, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045817362","display_name":"Chunhua Su","orcid":"https://orcid.org/0000-0002-6461-9684"},"institutions":[{"id":"https://openalex.org/I141591182","display_name":"University of Aizu","ror":"https://ror.org/02pg0e883","country_code":"JP","type":"education","lineage":["https://openalex.org/I141591182"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Chunhua Su","raw_affiliation_strings":["School of Computer Science and Engineering, The University of Aizu, Aizuwakamatsu, Japan"],"raw_orcid":"https://orcid.org/0000-0002-6461-9684","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, The University of Aizu, Aizuwakamatsu, Japan","institution_ids":["https://openalex.org/I141591182"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025610878","display_name":"Kento Sato","orcid":"https://orcid.org/0000-0001-7850-2121"},"institutions":[{"id":"https://openalex.org/I4210129730","display_name":"RIKEN Center for Computational Science","ror":"https://ror.org/03r519674","country_code":"JP","type":"facility","lineage":["https://openalex.org/I4210110652","https://openalex.org/I4210129730"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kento Sato","raw_affiliation_strings":["R-CCS RIKEN, Kobe, Japan"],"raw_orcid":"https://orcid.org/0000-0001-7850-2121","affiliations":[{"raw_affiliation_string":"R-CCS RIKEN, Kobe, Japan","institution_ids":["https://openalex.org/I4210129730"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5070952464"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":2.8969,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.92713604,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"1015","last_page":"1030"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8882133960723877},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7989785671234131},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7332873344421387},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.7164837121963501},{"id":"https://openalex.org/keywords/mnist-database","display_name":"MNIST database","score":0.6923190355300903},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.6375854015350342},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6197540163993835},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.553918182849884},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.5497421026229858},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5277600884437561},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.496437132358551},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4711032509803772},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.46733200550079346},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.45060020685195923},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4445101320743561},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35429584980010986},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.32407641410827637},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.3226318657398224}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8882133960723877},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7989785671234131},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7332873344421387},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.7164837121963501},{"id":"https://openalex.org/C190502265","wikidata":"https://www.wikidata.org/wiki/Q17069496","display_name":"MNIST database","level":3,"score":0.6923190355300903},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.6375854015350342},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6197540163993835},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.553918182849884},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.5497421026229858},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5277600884437561},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.496437132358551},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4711032509803772},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46733200550079346},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.45060020685195923},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4445101320743561},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35429584980010986},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32407641410827637},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.3226318657398224},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2023.3322328","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3322328","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.4399999976158142}],"awards":[{"id":"https://openalex.org/G2851562800","display_name":null,"funder_award_id":"62072485","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5096041344","display_name":null,"funder_award_id":"2022A1515011294","funder_id":"https://openalex.org/F4320337111","funder_display_name":"Basic and Applied Basic Research Foundation of Guangdong Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337111","display_name":"Basic and Applied Basic Research Foundation of Guangdong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W1557833142","https://openalex.org/W2051267297","https://openalex.org/W2088492763","https://openalex.org/W2160200253","https://openalex.org/W2194775991","https://openalex.org/W2337093093","https://openalex.org/W2512472178","https://openalex.org/W2535690855","https://openalex.org/W2591882872","https://openalex.org/W2767079719","https://openalex.org/W2781091734","https://openalex.org/W2785456003","https://openalex.org/W2795435272","https://openalex.org/W2930926105","https://openalex.org/W2955213239","https://openalex.org/W2963318081","https://openalex.org/W2963334472","https://openalex.org/W2963456518","https://openalex.org/W2963766684","https://openalex.org/W2964162474","https://openalex.org/W2970408908","https://openalex.org/W2970606380","https://openalex.org/W2979637109","https://openalex.org/W2982302101","https://openalex.org/W2989885118","https://openalex.org/W3007318259","https://openalex.org/W3015625436","https://openalex.org/W3016632787","https://openalex.org/W3023244064","https://openalex.org/W3023387899","https://openalex.org/W3035729345","https://openalex.org/W3036791758","https://openalex.org/W3103245149","https://openalex.org/W3110845456","https://openalex.org/W3158591499","https://openalex.org/W3214437258","https://openalex.org/W3217374154","https://openalex.org/W4210485920","https://openalex.org/W4284971173","https://openalex.org/W4288057780","https://openalex.org/W4362653687","https://openalex.org/W6728757088","https://openalex.org/W6748579526","https://openalex.org/W6752600739","https://openalex.org/W6754341472","https://openalex.org/W6763736615","https://openalex.org/W6765055791","https://openalex.org/W6765541894","https://openalex.org/W6770634426","https://openalex.org/W6777176487","https://openalex.org/W6779715625"],"related_works":["https://openalex.org/W4366307888","https://openalex.org/W4286971788","https://openalex.org/W3199340467","https://openalex.org/W3157608626","https://openalex.org/W3132132958","https://openalex.org/W4322580403","https://openalex.org/W3193217249","https://openalex.org/W4321612632","https://openalex.org/W4280591108","https://openalex.org/W3021849752"],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"has":[3],"attracted":[4],"extraordinary":[5],"attention":[6],"from":[7],"the":[8,38,45,63,76,104,107,120,126,134,156,167],"industry":[9],"and":[10,19,48,72,192],"academia":[11],"due":[12],"to":[13,31,36,61,102,110,148],"its":[14],"advantages":[15],"in":[16,93,188],"privacy":[17,123,180,193],"protection":[18,181],"collaboratively":[20],"training":[21,39],"on":[22,125,142,158],"isolated":[23],"datasets.":[24],"Since":[25],"machine":[26,145],"learning":[27,146],"algorithms":[28],"usually":[29],"try":[30],"find":[32],"an":[33],"optimal":[34],"hypothesis":[35],"fit":[37],"data,":[40],"attackers":[41],"also":[42,185],"can":[43,74,128,165],"exploit":[44],"shared":[46],"models":[47],"reversely":[49],"analyze":[50],"users\u2019":[51],"private":[52],"information.":[53],"However,":[54],"there":[55],"is":[56,101,160],"still":[57],"no":[58],"good":[59],"solution":[60],"solve":[62],"privacy-accuracy":[64],"trade-off,":[65],"by":[66,171],"making":[67],"information":[68],"leakage":[69],"more":[70],"difficult":[71],"meanwhile":[73],"guarantee":[75],"convergence":[77],"of":[78,98,106,122,169,190],"learning.":[79],"In":[80],"this":[81],"work,":[82],"we":[83,137],"propose":[84],"a":[85],"Loss":[86],"Differential":[87],"Strategy":[88],"(LDS)":[89],"for":[90],"parameter":[91,114],"replacement":[92,115],"FL.":[94],"The":[95],"key":[96],"idea":[97],"our":[99,183],"strategy":[100],"maintain":[103],"performance":[105],"Private":[108],"Model":[109],"be":[111,129],"preserved":[112],"through":[113],"with":[116,174,177],"multi-user":[117],"participation,":[118],"while":[119,163],"efficiency":[121],"attacks":[124],"model":[127],"significantly":[130],"reduced.":[131],"To":[132],"evaluate":[133],"proposed":[135],"method,":[136],"have":[138],"conducted":[139],"comprehensive":[140],"experiments":[141],"four":[143],"typical":[144],"datasets":[147],"defend":[149],"against":[150],"membership":[151],"inference":[152],"attack.":[153],"For":[154],"example,":[155],"accuracy":[157,168,191],"MNIST":[159],"near":[161],"99%,":[162],"it":[164],"reduce":[166],"attack":[170],"10.1%":[172],"compared":[173],"FedAvg.":[175],"Compared":[176],"other":[178],"traditional":[179],"mechanisms,":[182],"method":[184],"outperforms":[186],"them":[187],"terms":[189],"preserving.":[194]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
