{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T17:05:57Z","timestamp":1770743157809,"version":"3.49.0"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2023YFB3001900"],"award-info":[{"award-number":["2023YFB3001900"]}]},{"name":"Shenzhen Science and Technology Program","award":["KJZD20230923113901004"],"award-info":[{"award-number":["KJZD20230923113901004"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62572501"],"award-info":[{"award-number":["62572501"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Programs of Ningbo Municipal Natural Science Foundation","award":["2024J021"],"award-info":[{"award-number":["2024J021"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tsc.2025.3630641","type":"journal-article","created":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T18:10:37Z","timestamp":1762539037000},"page":"351-363","source":"Crossref","is-referenced-by-count":0,"title":["Fairness-Aware Federated Recommender Design With Heterogeneous Privacy Budgets"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1518-002X","authenticated-orcid":false,"given":"Miao","family":"Hu","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4289-4431","authenticated-orcid":false,"given":"Yang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5036-9899","authenticated-orcid":false,"given":"Pengshan","family":"Liao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1533-0865","authenticated-orcid":false,"given":"Yipeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computing, Faculty of Science and Engineering, Macquarie University, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9433-7725","authenticated-orcid":false,"given":"Di","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401444"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11010141"},{"key":"ref3","article-title":"The EU general data protection regulation: Toward a property regime for protecting data privacy","volume":"123","author":"Victor","year":"2013","journal-title":"Yale Law J."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.9785\/cr-2018-340908"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2839587"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3065035"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3197390"},{"key":"ref8","first-page":"374","article-title":"Towards federated learning at scale: System design","volume-title":"Proc. Mach. Learn. Syst.","volume":"1","author":"Bonawitz","year":"2019"},{"key":"ref9","article-title":"Federated collaborative filtering for privacy-preserving personalized recommendation system","author":"Ammad-ud-din","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512192"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-30714-9"},{"key":"ref12","article-title":"Local differential privacy: A tutorial","author":"Bebensee","year":"2019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v7i2.652"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006327"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488743"},{"key":"ref16","first-page":"19","article-title":"Oort: Efficient federated learning via guided participant selection","volume-title":"Proc. 15th USENIX Symp. Operating Syst. Des. Implementation","author":"Lai","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3044104"},{"key":"ref18","article-title":"Fair resource allocation in federated learning","volume-title":"Proc. 8th Int. Conf. Learn. Representations","author":"Li","year":"2020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.23919\/EUSIPCO54536.2021.9616052"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3523227.3546771"},{"key":"ref21","first-page":"1","article-title":"The unfairness of popularity bias in recommendation","volume-title":"Proc. RecSys Workshop Recommendation Multistakeholder Environments","author":"Abdollahpouri","year":"2019"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4310\/23-SII779"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3109910"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.06.021"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3014880"},{"key":"ref26","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Int. Workshop Artif. Intell. Statist.","author":"McMahan","year":"2017"},{"key":"ref27","article-title":"Client selection in federated learning: Convergence analysis and power-of-choice selection strategies","author":"Cho","year":"2020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3136611"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3128679"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512233"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/217"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/791"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i5.16546"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461911"},{"key":"ref36","volume-title":"Inequalities: Theory of Majorization and Its Applications","author":"Marshall","year":"1979"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833647"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2233213"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/BF01588971"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.14778\/3503585.3503592"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS60910.2024.00076"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080783"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"ref45","first-page":"912","article-title":"Multi-document summarization via budgeted maximization of submodular functions","volume-title":"Proc. Hum. Lang. Technol.: Conf. North Amer. Chapter Assoc. Comput. Linguistics","author":"Lin","year":"2010"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CAI59869.2024.00185"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC59896.2024.10556102"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2024.3354924"},{"key":"ref49","article-title":"A novel Pearson correlation-based merging algorithm for robust distributed machine learning with heterogeneous data","author":"Rahmat","year":"2025"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-020-00660-9"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s41060-023-00442-4"},{"key":"ref52","first-page":"26990","article-title":"Secure federated correlation test and entropy estimation","volume-title":"Proc. Int. Conf. Mach. Learn.","volume":"202","author":"Pang","year":"2023"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i4.25611"},{"key":"ref54","first-page":"1","article-title":"Balancing utility and fairness in submodular maximization","volume-title":"Proc. 27th Int. Conf. Extending Database Technol.","author":"Wang","year":"2024"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4629386\/11373221\/11235595.pdf?arnumber=11235595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T00:33:17Z","timestamp":1770683597000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11235595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":54,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2025.3630641","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]}}}