{"id":"https://openalex.org/W4392926742","doi":"https://doi.org/10.1186/s13677-024-00618-8","title":"Privacy-preserving federated learning based on partial low-quality data","display_name":"Privacy-preserving federated learning based on partial low-quality data","publication_year":2024,"publication_date":"2024-03-18","ids":{"openalex":"https://openalex.org/W4392926742","doi":"https://doi.org/10.1186/s13677-024-00618-8"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-024-00618-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-024-00618-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00618-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00618-8","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018915353","display_name":"Huiyong Wang","orcid":"https://orcid.org/0000-0001-5886-9647"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiyong Wang","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China","School of Mathematics and Computing Science, GuiLin University of Electronic Technology, Guilin, 541004, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"School of Mathematics and Computing Science, GuiLin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100438147","display_name":"Qi Wang","orcid":"https://orcid.org/0009-0005-3754-4647"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Wang","raw_affiliation_strings":["School of Mathematics and Computing Science, GuiLin University of Electronic Technology, Guilin, 541004, China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics and Computing Science, GuiLin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078775578","display_name":"Yong Ding","orcid":"https://orcid.org/0000-0002-3571-7576"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Ding","raw_affiliation_strings":["Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, 518055, China","Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, 518055, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101890868","display_name":"Shijie Tang","orcid":"https://orcid.org/0000-0002-3954-9944"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shijie Tang","raw_affiliation_strings":["School of Electronic Engineering and Automation, GuiLin University of Electronic Technology, Guilin, 541004, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Engineering and Automation, GuiLin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100700688","display_name":"Yujue Wang","orcid":"https://orcid.org/0000-0002-0951-8880"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yujue Wang","raw_affiliation_strings":["Hangzhou Innovation Institute, Beihang University, Hangzhou, 310052, China"],"affiliations":[{"raw_affiliation_string":"Hangzhou Innovation Institute, Beihang University, Hangzhou, 310052, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101890868"],"corresponding_institution_ids":["https://openalex.org/I5343935"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":8.0533,"has_fulltext":true,"cited_by_count":24,"citation_normalized_percentile":{"value":0.97815977,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"13","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9803000092506409,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9462000131607056,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.808988630771637},{"id":"https://openalex.org/keywords/data-quality","display_name":"Data quality","score":0.5735071897506714},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5404797792434692},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5138276219367981},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.44210413098335266},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4393939971923828},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42746302485466003},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.42402228713035583},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.36848294734954834},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3303610682487488},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08283880352973938}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.808988630771637},{"id":"https://openalex.org/C24756922","wikidata":"https://www.wikidata.org/wiki/Q1757694","display_name":"Data quality","level":3,"score":0.5735071897506714},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5404797792434692},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5138276219367981},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.44210413098335266},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4393939971923828},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42746302485466003},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.42402228713035583},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.36848294734954834},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3303610682487488},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08283880352973938},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-024-00618-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-024-00618-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00618-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a72580171ad449d585042614cba14198","is_oa":true,"landing_page_url":"https://doaj.org/article/a72580171ad449d585042614cba14198","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-16 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-024-00618-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-024-00618-8","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-024-00618-8","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1156186247","display_name":null,"funder_award_id":"2020YFB1006003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5431623549","display_name":null,"funder_award_id":"61962012","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5857920362","display_name":null,"funder_award_id":"2020YFB1006003","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7303205667","display_name":null,"funder_award_id":"61962012","funder_id":"https://openalex.org/F4320327720","funder_display_name":"Foundation for Innovative Research Groups of the National Natural Science Foundation of China"},{"id":"https://openalex.org/G868048395","display_name":null,"funder_award_id":"2023GXNSFAA026236,","funder_id":"https://openalex.org/F4320313613","funder_display_name":"Natural Science Foundation of Guangxi Zhuang Autonomous Region"}],"funders":[{"id":"https://openalex.org/F4320313613","display_name":"Natural Science Foundation of Guangxi Zhuang Autonomous Region","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327720","display_name":"Foundation for Innovative Research Groups of the National Natural Science Foundation of China","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4392926742.pdf"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W955924517","https://openalex.org/W1522597308","https://openalex.org/W1544327602","https://openalex.org/W1901616594","https://openalex.org/W2072341937","https://openalex.org/W2412094331","https://openalex.org/W2591882872","https://openalex.org/W2604738573","https://openalex.org/W2621345069","https://openalex.org/W2767079719","https://openalex.org/W2806834952","https://openalex.org/W2900720539","https://openalex.org/W2971544778","https://openalex.org/W2982464076","https://openalex.org/W2997554756","https://openalex.org/W3013124972","https://openalex.org/W3016378036","https://openalex.org/W3016632787","https://openalex.org/W3109051775","https://openalex.org/W3135347465","https://openalex.org/W3140753276","https://openalex.org/W3155912831","https://openalex.org/W3159080474","https://openalex.org/W3162893999","https://openalex.org/W3217678969","https://openalex.org/W4206573848","https://openalex.org/W4285792693","https://openalex.org/W4292121845","https://openalex.org/W4318969619"],"related_works":["https://openalex.org/W2055243143","https://openalex.org/W1975289146","https://openalex.org/W2105887828","https://openalex.org/W2122599759","https://openalex.org/W4236520801","https://openalex.org/W1986418932","https://openalex.org/W2357796999","https://openalex.org/W4321636575","https://openalex.org/W1537234410","https://openalex.org/W2741131631"],"abstract_inverted_index":{"Abstract":[0],"Traditional":[1],"machine":[2],"learning":[3,23,136,208],"requires":[4],"collecting":[5],"data":[6,30,61,74,154,168,186],"from":[7,37],"participants":[8,64,121,171],"for":[9,166],"training,":[10],"which":[11,84],"may":[12,47],"lead":[13],"to":[14,27,41,122,146,172],"malicious":[15],"acquisition":[16],"of":[17,72,133,152,176,184,206,212,223],"privacy":[18,31,51,130,149,222],"in":[19,66,75,89],"participants\u2019":[20,29,50,153,224],"data.":[21,225],"Federated":[22,105,157],"provides":[24],"a":[25,38,102,141],"method":[26],"protect":[28,147],"by":[32,63,170],"transferring":[33],"the":[34,45,60,69,76,81,96,129,134,148,156,167,174,181,188,193,203,210,219],"training":[35,77,117,158,205],"process":[36,78],"centralized":[39],"server":[40,46],"terminal":[42],"devices.":[43],"However,":[44],"still":[48],"obtain":[49],"through":[52],"inference":[53],"attacks":[54],"and":[55,68,131,150,221],"other":[56],"methods.":[57],"In":[58],"addition,":[59],"provided":[62],"varies":[65],"quality,":[67],"excessive":[70],"involvement":[71,175],"low-quality":[73,125,177,214],"can":[79,114,201],"render":[80],"model":[82,204],"unusable,":[83],"is":[85],"an":[86],"important":[87],"issue":[88],"current":[90],"mainstream":[91],"federated":[92,135,207],"learning.":[93],"To":[94],"address":[95],"aforementioned":[97],"issues,":[98],"this":[99,199],"paper":[100],"proposes":[101],"Privacy":[103],"Preserving":[104],"Learning":[106],"Scheme":[107],"with":[108,209,227],"Partial":[109],"Low-Quality":[110],"Data":[111],"(PPFL-LQDP).":[112],"It":[113],"achieve":[115],"good":[116,236],"results":[118],"while":[119,216],"allowing":[120],"utilize":[123],"partial":[124,213],"data,":[126,178,215],"thereby":[127,179],"enhancing":[128],"security":[132,151,220],"scheme.":[137],"Specifically,":[138],"we":[139,161,196],"use":[140],"distributed":[142],"Paillier":[143],"cryptographic":[144],"mechanism":[145],"during":[155],"process.":[159],"Additionally,":[160],"construct":[162],"composite":[163],"evaluation":[164],"values":[165],"held":[169],"reduce":[173],"minimizing":[180],"negative":[182],"impact":[183],"such":[185],"on":[187,192],"model.":[189],"Through":[190],"experiments":[191],"MNIST":[194],"dataset,":[195],"demonstrate":[197],"that":[198,232],"scheme":[200,234],"complete":[202],"participation":[211],"effectively":[217],"protecting":[218],"Comparisons":[226],"related":[228],"schemes":[229],"also":[230],"show":[231],"our":[233],"has":[235],"overall":[237],"performance.":[238]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":18},{"year":2024,"cited_by_count":5}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2025-10-10T00:00:00"}
