{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T08:33:22Z","timestamp":1777106002626,"version":"3.51.4"},"reference-count":63,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T00:00:00Z","timestamp":1637625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61\u2009872\u2009416"],"award-info":[{"award-number":["61\u2009872\u2009416"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62\u2009071\u2009192"],"award-info":[{"award-number":["62\u2009071\u2009192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62\u2009171\u2009189"],"award-info":[{"award-number":["62\u2009171\u2009189"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62\u2009172\u2009438"],"award-info":[{"award-number":["62\u2009172\u2009438"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1806904"],"award-info":[{"award-number":["2020YFB1806904"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2019kfyXJJS017"],"award-info":[{"award-number":["2019kfyXJJS017"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["31\u2009512\u2009111\u2009310"],"award-info":[{"award-number":["31\u2009512\u2009111\u2009310"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["31\u2009732\u2009111\u2009303"],"award-info":[{"award-number":["31\u2009732\u2009111\u2009303"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Communications and Networks"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1016\/j.dcan.2021.11.006","type":"journal-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T18:28:05Z","timestamp":1638296885000},"page":"446-454","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":58,"title":["Safeguarding cross-silo federated learning with local differential privacy"],"prefix":"10.1016","volume":"8","author":[{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0000-0003-1963-4954","authenticated-orcid":false,"given":"Chen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xinkui","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Gaoyang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tianping","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Peng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/orcid.org\/0000-0001-7013-9081","authenticated-orcid":false,"given":"Shaohua","family":"Wan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.dcan.2021.11.006_bib1","doi-asserted-by":"crossref","first-page":"1033","DOI":"10.1109\/JIOT.2018.2799545","article-title":"ILLIA: enabling k-anonymity-based privacy preserving against location injection attacks in continuous lbs queries","volume":"5","author":"Zhao","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.dcan.2021.11.006_bib2","unstructured":"L. Qi, X. Wang, X. Xu, W. Dou, S. Li, Privacy-aware Cross-Platform Service Recommendation Based on Enhanced Locality-Sensitive Hashing, IEEE Transactions on Network Science and Engineering."},{"issue":"6","key":"10.1016\/j.dcan.2021.11.006_bib3","doi-asserted-by":"crossref","first-page":"5116","DOI":"10.1109\/JIOT.2020.2974669","article-title":"Drive2friends: inferring social relationships from individual vehicle mobility data","volume":"7","author":"Li","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"11","key":"10.1016\/j.dcan.2021.11.006_bib4","doi-asserted-by":"crossref","first-page":"8391","DOI":"10.1007\/s11227-019-03104-0","article-title":"A\u00a0survey of local differential privacy for securing internet of vehicles","volume":"76","author":"Zhao","year":"2020","journal-title":"J.\u00a0Supercomput."},{"issue":"9","key":"10.1016\/j.dcan.2021.11.006_bib5","doi-asserted-by":"crossref","first-page":"6172","DOI":"10.1109\/TII.2019.2959258","article-title":"Dynamic resource provisioning with fault tolerance for data-intensive meteorological workflows in cloud","volume":"16","author":"Xu","year":"2020","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.dcan.2021.11.006_bib6","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.ins.2019.11.021","article-title":"Spatial-temporal data-driven service recommendation with privacy-preservation","volume":"515","author":"Qi","year":"2020","journal-title":"Inf. Sci."},{"issue":"4","key":"10.1016\/j.dcan.2021.11.006_bib7","doi-asserted-by":"crossref","first-page":"2828","DOI":"10.1109\/JIOT.2019.2962863","article-title":"A\u00a0joint information and energy cooperation framework for cr-enabled macro\u2013femto heterogeneous networks","volume":"7","author":"Xiao","year":"2019","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.dcan.2021.11.006_bib8","first-page":"1","article-title":"Pushing the limits of transmission concurrency for low power wireless networks","volume":"16","author":"Liu","year":"2020","journal-title":"ACM Trans. Sens. Netw."},{"key":"10.1016\/j.dcan.2021.11.006_bib9","unstructured":"K. Peng, M. Li, H. Huang, C. Wang, S. Wan, K.-K. R. Choo, Security challenges and opportunities for smart contracts in internet of things: a survey, IEEE Internet Things J.."},{"key":"10.1016\/j.dcan.2021.11.006_bib10","unstructured":"W. Zhong, X. Yin, X. Zhang, S. Li, W. Dou, R. Wang, L. Qi, Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment, Comput. Commun.."},{"issue":"7","key":"10.1016\/j.dcan.2021.11.006_bib11","doi-asserted-by":"crossref","first-page":"1629","DOI":"10.1109\/TPDS.2020.3041029","article-title":"A\u00a0game-based approach for cost-aware task assignment with qos constraint in collaborative edge and cloud environments","volume":"32","author":"Long","year":"2021","journal-title":"IEEE Trans. Parallel Distr. Syst."},{"issue":"6245","key":"10.1016\/j.dcan.2021.11.006_bib12","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1126\/science.aaa8415","article-title":"Machine learning: trends, perspectives, and prospects","volume":"349","author":"Jordan","year":"2015","journal-title":"Science"},{"key":"10.1016\/j.dcan.2021.11.006_bib13","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1016\/j.cma.2018.10.046","article-title":"Smart finite elements: a novel machine learning application","volume":"345","author":"Capuano","year":"2019","journal-title":"Comput. Methods Appl. Mech. Eng."},{"issue":"2","key":"10.1016\/j.dcan.2021.11.006_bib14","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/MVT.2018.2811185","article-title":"Machine learning for vehicular networks: recent advances and application examples","volume":"13","author":"Ye","year":"2018","journal-title":"IEEE Veh. Technol. Mag."},{"issue":"4","key":"10.1016\/j.dcan.2021.11.006_bib15","doi-asserted-by":"crossref","first-page":"3072","DOI":"10.1109\/COMST.2019.2924243","article-title":"Application of machine learning in wireless networks: key techniques and open issues","volume":"21","author":"Sun","year":"2019","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"10.1016\/j.dcan.2021.11.006_bib16","doi-asserted-by":"crossref","first-page":"1383","DOI":"10.1109\/COMST.2018.2880039","article-title":"An overview on application of machine learning techniques in optical networks","volume":"21","author":"Musumeci","year":"2018","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"10","key":"10.1016\/j.dcan.2021.11.006_bib17","doi-asserted-by":"crossref","first-page":"4773","DOI":"10.1029\/2018GL077870","article-title":"Machine learning seismic wave discrimination: application to earthquake early warning","volume":"45","author":"Li","year":"2018","journal-title":"Geophys. Res. Lett."},{"issue":"2","key":"10.1016\/j.dcan.2021.11.006_bib18","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/MIS.2018.111145153","article-title":"Predicting adversarial cyber-intrusion stages using autoregressive neural networks","volume":"33","author":"Rege","year":"2018","journal-title":"IEEE Intell. Syst."},{"issue":"3","key":"10.1016\/j.dcan.2021.11.006_bib19","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1109\/TSUSC.2019.2930526","article-title":"MIASec: enabling data indistinguishability against membership inference attacks in MLaaS","volume":"5","author":"Wang","year":"2020","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"10.1016\/j.dcan.2021.11.006_bib20","series-title":"Proc. of IEEE\/ACM IWQoS","article-title":"Enabling efficient client-level data removal from federated learning models","author":"Liu","year":"2021"},{"issue":"1","key":"10.1016\/j.dcan.2021.11.006_bib21","first-page":"1","article-title":"Location privacy-preserving mechanisms in location-based services: a comprehensive survey","volume":"54","author":"Jiang","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.dcan.2021.11.006_bib22","series-title":"Proceedings of AISTATS","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"issue":"2","key":"10.1016\/j.dcan.2021.11.006_bib23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3298981","article-title":"Federated machine learning: concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans. Intell. Syst. Technol."},{"issue":"3","key":"10.1016\/j.dcan.2021.11.006_bib24","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","article-title":"Federated learning: challenges, methods, and future directions","volume":"37","author":"Li","year":"2020","journal-title":"IEEE Signal Process. Mag."},{"issue":"8","key":"10.1016\/j.dcan.2021.11.006_bib25","doi-asserted-by":"crossref","first-page":"1738","DOI":"10.1109\/JPROC.2019.2918951","article-title":"Edge intelligence: paving the last mile of artificial intelligence with edge computing","volume":"107","author":"Zhou","year":"2019","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.dcan.2021.11.006_bib26","unstructured":"A. Hard, K. Rao, R. Mathews, S. Ramaswamy, F. Beaufays, S. Augenstein, H. Eichner, C. Kiddon, D. Ramage, Federated Learning for Mobile Keyboard Prediction, CoRR, arXiv: 1811.03604."},{"key":"10.1016\/j.dcan.2021.11.006_bib27","series-title":"Towards Federated Learning at Scale: System Design","author":"Bonawitz","year":"1902"},{"key":"10.1016\/j.dcan.2021.11.006_bib28","unstructured":"T. Yang, G. Andrew, H. Eichner, H. Sun, W. Li, N. Kong, D. Ramage, F. Beaufays, Applied Federated Learning: Improving Google Keyboard Query Suggestions, CoRR, arXiv: 1812.02903."},{"key":"10.1016\/j.dcan.2021.11.006_bib29","unstructured":"E. b. P. Kairouz, H. B. McMahan, Advances and open problems in federated learning, Found. Trends Mach. Learn. 14 (1)."},{"key":"10.1016\/j.dcan.2021.11.006_bib30","series-title":"Proceedings of USENIX ATC","first-page":"493","article-title":"Batchcrypt: efficient homomorphic encryption for cross-silo federated learning","author":"Zhang","year":"2020"},{"key":"10.1016\/j.dcan.2021.11.006_bib31","series-title":"Differentially Private Cross-Silo Federated Learning","author":"Heikkil\u00e4","year":"2007"},{"key":"10.1016\/j.dcan.2021.11.006_bib32","series-title":"Proceedings of International Conference on Big Data","first-page":"18","article-title":"FFD: a federated learning based method for credit card fraud detection","author":"Yang","year":"2019"},{"issue":"10","key":"10.1016\/j.dcan.2021.11.006_bib33","doi-asserted-by":"crossref","first-page":"1519","DOI":"10.1038\/s41591-019-0583-3","article-title":"Deep learning-based classification of mesothelioma improves prediction of patient outcome","volume":"25","author":"Courtiol","year":"2019","journal-title":"Nat. Med."},{"key":"10.1016\/j.dcan.2021.11.006_bib34","series-title":"Proceedings of ACM CCS","first-page":"603","article-title":"Deep models under the GAN: information leakage from collaborative deep learning","author":"Hitaj","year":"2017"},{"key":"10.1016\/j.dcan.2021.11.006_bib35","series-title":"Proceedings of IEEE S&P","first-page":"739","article-title":"Comprehensive privacy analysis of deep learning: stand-alone and federated learning under passive and active white-box inference attacks","author":"Nasr","year":"2019"},{"key":"10.1016\/j.dcan.2021.11.006_bib36","series-title":"Proceedings of IEEE S&P","first-page":"691","article-title":"Exploiting unintended feature leakage in collaborative learning","author":"Melis","year":"2019"},{"key":"10.1016\/j.dcan.2021.11.006_bib37","series-title":"Proceedings of IEEE INFOCOM","first-page":"2512","article-title":"Beyond inferring class representatives: user-level privacy leakage from federated learning","author":"Wang","year":"2019"},{"key":"10.1016\/j.dcan.2021.11.006_bib38","series-title":"Proceedings of NeurIPS","first-page":"2879","article-title":"Extremal mechanisms for local differential privacy","author":"KaiProceedings ofrouz","year":"2014"},{"key":"10.1016\/j.dcan.2021.11.006_bib39","series-title":"Proceedings of COMPSTAT","first-page":"177","article-title":"Large-scale machine learning with stochastic gradient descent","author":"Bottou","year":"2010"},{"key":"10.1016\/j.dcan.2021.11.006_bib40","series-title":"International Colloquium on Automata","first-page":"1","article-title":"Differential privacy","author":"Dwork","year":"2006"},{"key":"10.1016\/j.dcan.2021.11.006_bib41","series-title":"Proceedings of International Conference on Advances in Cryptology-eurocrypt","article-title":"Our data, ourselves: privacy via distributed noise generation","author":"Dwork","year":"2006"},{"key":"10.1016\/j.dcan.2021.11.006_bib42","series-title":"Proceedings of USENIX Security","first-page":"1895","article-title":"Evaluating differentially private machine learning in practice","author":"Jayaraman","year":"2019"},{"key":"10.1016\/j.dcan.2021.11.006_bib43","series-title":"Proceedings of NeurIPS","first-page":"2652","article-title":"A\u00a0stability-based validation procedure for differentially private machine learning","author":"Chaudhuri","year":"2013"},{"key":"10.1016\/j.dcan.2021.11.006_bib44","unstructured":"K. Chaudhuri, C. Monteleoni, A. D. Sarwate, Differentially private empirical risk minimization., J. Mach. Learn. Res. 12 (3)."},{"key":"10.1016\/j.dcan.2021.11.006_bib45","unstructured":"X. Wu, M. Fredrikson, W. Wu, S. Jha, J. F. Naughton, Revisiting Differentially Private Regression: Lessons from Learning Theory and Their Consequences, CoRR, arXiv: 1512.06388."},{"key":"10.1016\/j.dcan.2021.11.006_bib46","series-title":"Proceedings of IEEE FOCS","first-page":"429","article-title":"Local privacy and statistical minimax rates","author":"Duchi","year":"2013"},{"key":"10.1016\/j.dcan.2021.11.006_bib47","series-title":"Proceedings of ACM CCS","first-page":"1054","article-title":"RAPPOR: randomized aggregatable privacy-preserving ordinal response","author":"Erlingsson","year":"2014"},{"issue":"9","key":"10.1016\/j.dcan.2021.11.006_bib48","doi-asserted-by":"crossref","first-page":"2151","DOI":"10.1109\/TIFS.2018.2812146","article-title":"LoPub: high-dimensional crowdsourced data publication with local differential privacy","volume":"13","author":"Ren","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.dcan.2021.11.006_bib49","volume":"vol. 382","author":"McLachlan","year":"2007"},{"key":"10.1016\/j.dcan.2021.11.006_bib50","series-title":"Computation-efficient Deep Model Training for Ciphertext-Based Cross-Silo Federated Learning","author":"Yang","year":"2002"},{"key":"10.1016\/j.dcan.2021.11.006_bib51","series-title":"Proceedings of NDSS","article-title":"Model and data independent membership inference attacks and defenses on machine learning models","author":"Salem","year":"2019"},{"key":"10.1016\/j.dcan.2021.11.006_bib52","series-title":"Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"316","article-title":"General secure multi-party computation from any linear secret-sharing scheme","author":"Cramer","year":"2000"},{"key":"10.1016\/j.dcan.2021.11.006_bib53","series-title":"Proceedings of ACM CCS","first-page":"35","article-title":"Aby3: a mixed protocol framework for machine learning","author":"Mohassel","year":"2018"},{"key":"10.1016\/j.dcan.2021.11.006_bib54","series-title":"Proceedings of IEEE S&P","first-page":"19","article-title":"Secureml: a system for scalable privacy-preserving machine learning","author":"Mohassel","year":"2017"},{"key":"10.1016\/j.dcan.2021.11.006_bib55","series-title":"Proceedings of ACM CCS","first-page":"1175","article-title":"Practical secure aggregation for privacy-preserving machine learning","author":"Bonawitz","year":"2017"},{"issue":"2","key":"10.1016\/j.dcan.2021.11.006_bib56","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/TIFS.2018.2850299","article-title":"Secure key agreement and key protection for mobile device user authentication","volume":"14","author":"Wu","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"2","key":"10.1016\/j.dcan.2021.11.006_bib57","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3298988","article-title":"A\u00a0context-aware user-item representation learning for item recommendation","volume":"37","author":"Wu","year":"2019","journal-title":"ACM Trans. Inf. Syst."},{"issue":"3","key":"10.1016\/j.dcan.2021.11.006_bib58","doi-asserted-by":"crossref","first-page":"2134","DOI":"10.1109\/TII.2019.2942179","article-title":"Differentially private asynchronous federated learning for mobile edge computing in urban informatics","volume":"16","author":"Lu","year":"2019","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.dcan.2021.11.006_bib59","series-title":"Federated Learning","first-page":"17","article-title":"Deep leakage from gradients","author":"Zhu","year":"2020"},{"key":"10.1016\/j.dcan.2021.11.006_bib60","unstructured":"R. C. Geyer, T. Klein, M. Nabi, Differentially Private Federated Learning: A Client Level Perspective, CoRR, arXiv: 1712.07557."},{"key":"10.1016\/j.dcan.2021.11.006_bib61","doi-asserted-by":"crossref","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","article-title":"Federated learning with differential privacy: algorithms and performance analysis","volume":"15","author":"Wei","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.dcan.2021.11.006_bib62","series-title":"Proceedings of IEEE ISIT","first-page":"2604","article-title":"Wireless federated learning with local differential privacy","author":"Seif","year":"2020"},{"issue":"5","key":"10.1016\/j.dcan.2021.11.006_bib63","first-page":"1333","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"Aono","year":"2017","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Digital Communications and Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S2352864821000961?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S2352864821000961?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T05:05:43Z","timestamp":1762491943000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S2352864821000961"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8]]},"references-count":63,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["S2352864821000961"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.dcan.2021.11.006","relation":{},"ISSN":["2352-8648"],"issn-type":[{"value":"2352-8648","type":"print"}],"subject":[],"published":{"date-parts":[[2022,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Safeguarding cross-silo federated learning with local differential privacy","name":"articletitle","label":"Article Title"},{"value":"Digital Communications and Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.dcan.2021.11.006","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Chongqing University of Posts and Telecommunications. Publishing Services by Elsevier B.V. on behalf of KeAi Communications Co. Ltd.","name":"copyright","label":"Copyright"}]}}