{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T12:15:39Z","timestamp":1768911339792,"version":"3.49.0"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Natural Science Basic Research Program of Shaanxi","award":["2023-JC-YB-500"],"award-info":[{"award-number":["2023-JC-YB-500"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072351"],"award-info":[{"award-number":["62072351"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002273"],"award-info":[{"award-number":["62002273"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23A20300"],"award-info":[{"award-number":["U23A20300"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research Project of Shaanxi Natural Science Foundation","award":["2023-JC-ZD-35"],"award-info":[{"award-number":["2023-JC-ZD-35"]}]},{"DOI":"10.13039\/501100013314","name":"Higher Education Discipline Innovation Project","doi-asserted-by":"publisher","award":["B16037"],"award-info":[{"award-number":["B16037"]}],"id":[{"id":"10.13039\/501100013314","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tdsc.2025.3618852","type":"journal-article","created":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T17:55:17Z","timestamp":1759859717000},"page":"1560-1575","source":"Crossref","is-referenced-by-count":0,"title":["Octopus: A Robust and Privacy-Preserving Scheme for Compressed Gradients in Federated Learning"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8531-9226","authenticated-orcid":false,"given":"Wenxiu","family":"Ding","sequence":"first","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"given":"Yuxuan","family":"Xiao","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9697-2108","authenticated-orcid":false,"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"given":"Ciwei","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]},{"given":"Yuxuan","family":"Cai","sequence":"additional","affiliation":[{"name":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Xuyang","family":"Jing","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","author":"McMahan","year":"2017"},{"key":"ref2","article-title":"QSGD: Communication-efficient SGD via gradient quantization and encoding","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"30","author":"Alistarh","year":"2017"},{"key":"ref3","first-page":"2021","article-title":"FedPAQ: A communication-efficient federated learning method with periodic averaging and quantization","volume-title":"Proc. 23rd Int. Conf. Artif. Intell. Statist.","author":"Reisizadeh","year":"2020"},{"key":"ref4","first-page":"8253","article-title":"FetchSGD: Communication-efficient federated learning with sketching","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Rothchild","year":"2020"},{"key":"ref5","article-title":"Comfetch: Federated learning of large networks on constrained clients via sketching","author":"Rabbani","year":"2021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i10.29025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"ref8","article-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption","author":"Hardy","year":"2017"},{"key":"ref9","first-page":"493","article-title":"BatchCrypt: Efficient homomorphic encryption for cross-silo federated learning","volume-title":"Proc. USENIX Annu. Tech. Conf.","author":"Zhang","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/RDAAPS48126.2021.9452005"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3159694"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796833"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref14","article-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357371"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref18","first-page":"1","article-title":"SMPAI: Secure multi-party computation for federated learning","volume-title":"Proc. NeurIPS Workshop Robust AI Financial Serv.","volume":"21","author":"Mugunthan","year":"2019"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3336977"},{"key":"ref20","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. Mach. Learn. Syst.","volume":"2","author":"Li","year":"2020"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-29763-x"},{"key":"ref23","first-page":"954","article-title":"CMFL: Mitigating communication overhead for federated learning","volume-title":"Proc. IEEE 39th Int. Conf. Distrib. Comput. Syst.","author":"Luping","year":"2019"},{"key":"ref24","first-page":"5132","article-title":"SCAFFOLD: Stochastic controlled averaging for federated learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Karimireddy","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761315"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/app10082864"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.10.026"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2024.3378006"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2024.120481"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-024-05956-3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.02.024"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS51040.2020.00030"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45465-9_59"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3549993.3550007"},{"key":"ref36","first-page":"2366","article-title":"Deep gradient compression: Reducing the communication bandwidth for distributed training","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Lin","year":"2018"},{"key":"ref37","first-page":"3252","article-title":"Error feedback fixes signSGD and other gradient compression schemes","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Karimireddy","year":"2019"},{"key":"ref38","first-page":"11450","article-title":"Communication-efficient distributed blockwise momentum SGD with error-feedback","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Zheng","year":"2019"},{"key":"ref39","first-page":"13144","article-title":"Communication-efficient distributed SGD with sketching","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Ivkin","year":"2019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1137\/070704277"},{"key":"ref41","first-page":"8026","article-title":"PyTorch: An imperative style, high-performance deep learning library","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"32","author":"Paszke","year":"2019"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref43","article-title":"Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms","author":"Xiao","year":"2017"},{"key":"ref44","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3578245.3584935"},{"key":"ref47","article-title":"TenSEAL: A library for encrypted tensor operations using homomorphic encryption","author":"Benaissa","year":"2021"},{"key":"ref48","article-title":"Opacus: User-friendly differential privacy library in PyTorch","volume-title":"Proc. NeurIPS Workshop Privacy Mach. Learn., Virtual","author":"Yousefpour","year":"2021"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052348"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11354469\/11194741.pdf?arnumber=11194741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T20:57:50Z","timestamp":1768856270000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11194741\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":49,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3618852","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}