{"id":"https://openalex.org/W4415428740","doi":"https://doi.org/10.3233/faia250953","title":"Multi-Hop Privacy Propagation for Differentially Private Federated Learning in Social Networks","display_name":"Multi-Hop Privacy Propagation for Differentially Private Federated Learning in Social Networks","publication_year":2025,"publication_date":"2025-10-21","ids":{"openalex":"https://openalex.org/W4415428740","doi":"https://doi.org/10.3233/faia250953"},"language":null,"primary_location":{"id":"doi:10.3233/faia250953","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia250953","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/faia250953","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108203713","display_name":"Chia-Jui Lin","orcid":"https://orcid.org/0009-0002-8473-6068"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenchen Lin","raw_affiliation_strings":["School of Artificial Intelligence, Sun Yat-sen University, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078667038","display_name":"Xuehe Wang","orcid":"https://orcid.org/0000-0002-6910-468X"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuehe Wang","raw_affiliation_strings":["School of Artificial Intelligence, Sun Yat-sen University, China"],"affiliations":[{"raw_affiliation_string":"School of Artificial Intelligence, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5108203713"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":4.7423,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.95628992,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stackelberg-competition","display_name":"Stackelberg competition","score":0.8671000003814697},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.6377999782562256},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.6067000031471252},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.5960000157356262},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.5853999853134155},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.5175999999046326},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.47870001196861267},{"id":"https://openalex.org/keywords/estimator","display_name":"Estimator","score":0.4000000059604645},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.39010000228881836},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.3898000121116638}],"concepts":[{"id":"https://openalex.org/C199510392","wikidata":"https://www.wikidata.org/wiki/Q1184602","display_name":"Stackelberg competition","level":2,"score":0.8671000003814697},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7458000183105469},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.6377999782562256},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.6067000031471252},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.5960000157356262},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.5853999853134155},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.5175999999046326},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.47870001196861267},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42590001225471497},{"id":"https://openalex.org/C185429906","wikidata":"https://www.wikidata.org/wiki/Q1130160","display_name":"Estimator","level":2,"score":0.4000000059604645},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.39010000228881836},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.3898000121116638},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.3862000107765198},{"id":"https://openalex.org/C91810955","wikidata":"https://www.wikidata.org/wiki/Q7731670","display_name":"Incentive compatibility","level":3,"score":0.36230000853538513},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.3531999886035919},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3382999897003174},{"id":"https://openalex.org/C2776854237","wikidata":"https://www.wikidata.org/wiki/Q6031064","display_name":"Information sharing","level":2,"score":0.33230000734329224},{"id":"https://openalex.org/C102938260","wikidata":"https://www.wikidata.org/wiki/Q1999831","display_name":"Privacy policy","level":3,"score":0.3310000002384186},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.3294000029563904},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.32260000705718994},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.31700000166893005},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.3109999895095825},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3066999912261963},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.2971999943256378},{"id":"https://openalex.org/C22171661","wikidata":"https://www.wikidata.org/wiki/Q1074380","display_name":"Stochastic game","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C137577040","wikidata":"https://www.wikidata.org/wiki/Q431965","display_name":"Information asymmetry","level":2,"score":0.27639999985694885},{"id":"https://openalex.org/C153517567","wikidata":"https://www.wikidata.org/wiki/Q26090","display_name":"Mechanism design","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.26589998602867126},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2628999948501587},{"id":"https://openalex.org/C113336015","wikidata":"https://www.wikidata.org/wiki/Q574010","display_name":"Complete information","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C142189719","wikidata":"https://www.wikidata.org/wiki/Q1276633","display_name":"Interpersonal ties","level":2,"score":0.25780001282691956}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia250953","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia250953","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia250953","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia250953","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Federated":[0],"learning":[1],"(FL)":[2],"enables":[3],"collaborative":[4],"model":[5,205],"training":[6],"across":[7],"decentralized":[8],"clients":[9,21],"without":[10],"sharing":[11],"local":[12],"data,":[13],"thereby":[14],"enhancing":[15],"privacy":[16,31,35,42,49,74,107,127,139],"and":[17,100,146,156,199,212],"facilitating":[18],"collaboration":[19],"among":[20],"connected":[22],"via":[23,57],"social":[24,28,177,217],"networks.":[25],"However,":[26],"these":[27],"connections":[29],"introduce":[30,130],"externalities:":[32],"a":[33,65,77,87,131,169],"client\u2019s":[34],"loss":[36],"depends":[37],"not":[38],"only":[39],"on":[40,47,188],"its":[41],"protection":[43],"strategy":[44],"but":[45],"also":[46],"the":[48,55,83,92,95,116,136,144,149,153,161],"decisions":[50],"of":[51,118,148,152,183],"others,":[52],"propagated":[53],"through":[54,76],"network":[56],"multi-hop":[58,78],"interactions.":[59],"In":[60],"this":[61],"work,":[62],"we":[63,129],"propose":[64],"socially-aware":[66],"privacy-preserving":[67,112],"FL":[68],"mechanism":[69,174],"that":[70,192,214],"systematically":[71],"quantifies":[72],"indirect":[73],"leakage":[75],"propagation":[79],"model.":[80],"We":[81,141],"formulate":[82],"server-client":[84],"interaction":[85],"as":[86,94,102,179],"two-stage":[88],"Stackelberg":[89,162],"game,":[90],"where":[91],"server,":[93],"leader,":[96],"optimizes":[97],"incentive":[98,171],"policies,":[99],"clients,":[101],"followers,":[103],"strategically":[104],"select":[105],"their":[106,111],"budgets,":[108],"which":[109],"determine":[110],"levels":[113],"by":[114,181],"controlling":[115],"magnitude":[117],"added":[119],"noise.":[120],"To":[121],"mitigate":[122],"information":[123],"asymmetry":[124],"in":[125],"networked":[126],"estimation,":[128],"mean-field":[132,154],"estimator":[133,155],"to":[134],"approximate":[135],"average":[137],"external":[138],"risk.":[140],"theoretically":[142],"prove":[143],"existence":[145],"convergence":[147],"fixed":[150],"point":[151],"derive":[157],"closed-form":[158],"expressions":[159],"for":[160,216],"Nash":[163],"Equilibrium.":[164],"Despite":[165],"being":[166],"designed":[167],"from":[168],"client-centric":[170],"perspective,":[172],"our":[173,193],"achieves":[175],"approximately-optimal":[176],"welfare,":[178],"revealed":[180],"Price":[182],"Anarchy":[184],"(PoA)":[185],"analysis.":[186],"Experiments":[187],"diverse":[189],"datasets":[190],"demonstrate":[191],"approach":[194],"significantly":[195],"improves":[196],"client":[197],"utilities":[198],"reduces":[200],"server":[201],"costs":[202],"while":[203],"maintaining":[204],"performance,":[206],"outperforming":[207],"both":[208],"Social-Agnostic":[209],"(SA)":[210],"baselines":[211],"methods":[213],"account":[215],"externalities.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-24T00:00:00"}
