{"id":"https://openalex.org/W4416549570","doi":"https://doi.org/10.1145/3719027.3765044","title":"Harnessing Sparsification in Federated Learning: A Secure, Efficient, and Differentially Private Realization","display_name":"Harnessing Sparsification in Federated Learning: A Secure, Efficient, and Differentially Private Realization","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549570","doi":"https://doi.org/10.1145/3719027.3765044"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3765044","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765044","pdf_url":null,"source":null,"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3719027.3765044","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101682370","display_name":"Shuangqing Xu","orcid":"https://orcid.org/0009-0002-5342-7414"},"institutions":[{"id":"https://openalex.org/I182722699","display_name":"Shenzhen Polytechnic","ror":"https://ror.org/00d2w9g53","country_code":"CN","type":"education","lineage":["https://openalex.org/I182722699"]},{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["CN","HK"],"is_corresponding":true,"raw_author_name":"Shuangqing Xu","raw_affiliation_strings":["Harbin Institute of Technology, Shenzhen, Shenzhen, China and The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, Shenzhen, China and The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I182722699","https://openalex.org/I14243506"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086945099","display_name":"Yifeng Zheng","orcid":"https://orcid.org/0000-0001-7852-6051"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Yifeng Zheng","raw_affiliation_strings":["The Hong Kong Polytechnic University, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"The Hong Kong Polytechnic University, Hong Kong, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007080915","display_name":"Zhongyun Hua","orcid":"https://orcid.org/0000-0002-3529-0541"},"institutions":[{"id":"https://openalex.org/I204983213","display_name":"Harbin Institute of Technology","ror":"https://ror.org/01yqg2h08","country_code":"CN","type":"education","lineage":["https://openalex.org/I204983213"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhongyun Hua","raw_affiliation_strings":["Harbin Institute of Technology, Shenzhen, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Harbin Institute of Technology, Shenzhen, Shenzhen, China","institution_ids":["https://openalex.org/I204983213"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101682370"],"corresponding_institution_ids":["https://openalex.org/I14243506","https://openalex.org/I182722699"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20148308,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2354","last_page":"2368"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9398999810218811,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9398999810218811,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.033399999141693115,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.00930000003427267,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.7677000164985657},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.5773000121116638},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.4788999855518341},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4706999957561493},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.46880000829696655},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.45809999108314514},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.44830000400543213},{"id":"https://openalex.org/keywords/artificial-noise","display_name":"Artificial noise","score":0.4318999946117401}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8176000118255615},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.7677000164985657},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.5773000121116638},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5012000203132629},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.4788999855518341},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4706999957561493},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.46880000829696655},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.45809999108314514},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.44830000400543213},{"id":"https://openalex.org/C2780909371","wikidata":"https://www.wikidata.org/wiki/Q4801092","display_name":"Artificial noise","level":4,"score":0.4318999946117401},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.42149999737739563},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38109999895095825},{"id":"https://openalex.org/C2781089630","wikidata":"https://www.wikidata.org/wiki/Q21856745","display_name":"Realization (probability)","level":2,"score":0.3458999991416931},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3440000116825104},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.34119999408721924},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.33899998664855957},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3181999921798706},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31540000438690186},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.30649998784065247},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.27869999408721924},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2702000141143799},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.267300009727478},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2574000060558319},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2547999918460846},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.25}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3765044","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765044","pdf_url":null,"source":null,"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3719027.3765044","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765044","pdf_url":null,"source":null,"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W1599026900","https://openalex.org/W1968245619","https://openalex.org/W1985623009","https://openalex.org/W2080132708","https://openalex.org/W2112796928","https://openalex.org/W2194775991","https://openalex.org/W2400124473","https://openalex.org/W2473418344","https://openalex.org/W2535690855","https://openalex.org/W2536058570","https://openalex.org/W2767079719","https://openalex.org/W2884909828","https://openalex.org/W2888978899","https://openalex.org/W2963456518","https://openalex.org/W2963470657","https://openalex.org/W2963629772","https://openalex.org/W2995022099","https://openalex.org/W3027749727","https://openalex.org/W3091476023","https://openalex.org/W3096328345","https://openalex.org/W3108672920","https://openalex.org/W3135434750","https://openalex.org/W3192324887","https://openalex.org/W3214260160","https://openalex.org/W3215933531","https://openalex.org/W4221104046","https://openalex.org/W4221146015","https://openalex.org/W4288057784","https://openalex.org/W4307454782","https://openalex.org/W4308338766","https://openalex.org/W4311166015","https://openalex.org/W4381329494","https://openalex.org/W4385187172","https://openalex.org/W4385270023","https://openalex.org/W4385299238","https://openalex.org/W4385653209","https://openalex.org/W4386083022","https://openalex.org/W4388858046","https://openalex.org/W4389722404","https://openalex.org/W4392796938","https://openalex.org/W4400977903","https://openalex.org/W4402264233","https://openalex.org/W4402264312","https://openalex.org/W4403705196","https://openalex.org/W4404213248","https://openalex.org/W4405181409","https://openalex.org/W4405181436","https://openalex.org/W4405184284"],"related_works":[],"abstract_inverted_index":{"Federated":[0],"learning":[1],"(FL)":[2],"enables":[3],"multiple":[4,144],"clients":[5,48],"to":[6,23,37,141,208,250,282],"jointly":[7],"train":[8],"a":[9,40,67,75,95,125,131,152,171,202,224,229],"model":[10,54],"by":[11,47,117,180],"sharing":[12],"only":[13,112,273],"gradient":[14,29,101,108,149],"updates":[15,30],"for":[16,59,79,121,234],"aggregation":[17],"instead":[18],"of":[19,26,130,161,183,231,259],"raw":[20],"data.":[21],"Due":[22],"the":[24,44,52,88,157,175,215,238,283],"transmission":[25],"very":[27],"high-dimensional":[28],"from":[31,39],"many":[32],"clients,":[33],"FL":[34,252],"is":[35],"known":[36],"suffer":[38],"communication":[41,89,187,194,278],"bottleneck.":[42],"Meanwhile,":[43,262],"gradients":[45,115],"shared":[46],"as":[49,51],"well":[50],"trained":[53,216],"may":[55],"also":[56,191],"be":[57],"exploited":[58],"inferring":[60],"private":[61,84],"local":[62],"datasets,":[63],"making":[64],"privacy":[65,211],"still":[66],"critical":[68],"concern":[69],"in":[70,91,164,185,269,276],"FL.":[71,85],"We":[72,196],"present":[73],"Clover,":[74],"novel":[76],"system":[77],"framework":[78],"communication-efficient,":[80],"secure,":[81],"and":[82,97,159,188,256,272,279],"differentially":[83],"To":[86,218],"tackle":[87],"bottleneck":[90],"FL,":[92],"Clover":[93,123,220,245],"follows":[94],"standard":[96],"commonly":[98],"used":[99],"approach---top-k":[100],"sparsification,":[102],"where":[103],"each":[104,165],"client":[105,193],"sparsifies":[106],"its":[107],"update":[109],"such":[110],"that":[111,244],"k":[113],"largest":[114],"(measured":[116],"magnitude)":[118],"are":[119],"preserved":[120],"aggregation.":[122],"provides":[124],"tailored":[126],"mechanism":[127,169,200,207],"built":[128,173],"out":[129],"trending":[132],"distributed":[133,177,204],"trust":[134],"setting":[135],"involving":[136],"three":[137],"servers,":[138],"which":[139],"allows":[140],"efficiently":[142],"aggregate":[143],"sparse":[145,166],"vectors":[146],"(top-k":[147],"sparsified":[148],"updates)":[150],"into":[151],"dense":[153],"vector":[154],"while":[155],"hiding":[156],"values":[158],"indices":[160],"non-zero":[162],"elements":[163],"vector.":[167],"This":[168],"outperforms":[170],"baseline":[172],"on":[174,214,237],"general":[176],"ORAM":[178],"technique":[179],"several":[181],"orders":[182],"magnitude":[184],"server-side":[186,239,277],"runtime,":[189,280],"with":[190,201,221,253],"smaller":[192],"cost.":[195],"further":[197],"integrate":[198],"this":[199],"lightweight":[203,232],"noise":[205],"generation":[206],"offer":[209],"differential":[210],"(DP)":[212],"guarantees":[213],"model.":[217],"harden":[219],"security":[222,265,285],"against":[223],"malicious":[225,264],"server,":[226],"we":[227],"devise":[228],"series":[230],"mechanisms":[233],"integrity":[235],"checks":[236],"computation.":[240],"Extensive":[241],"experiments":[242],"show":[243],"can":[246],"achieve":[247],"utility":[248],"comparable":[249],"vanilla":[251],"central":[254],"DP":[255],"no":[257],"use":[258],"top-k":[260],"sparsification.":[261],"achieving":[263],"introduces":[266],"negligible":[267],"overhead":[268,275],"client-server":[270],"communication,":[271],"modest":[274],"compared":[281],"semi-honest":[284],"counterpart.":[286]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-23T00:00:00"}
