{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:26:38Z","timestamp":1740173198237,"version":"3.37.3"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"22","license":[{"start":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T00:00:00Z","timestamp":1731628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T00:00:00Z","timestamp":1731628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T00:00:00Z","timestamp":1731628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20B2048","U21B2019","61972255"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"JSPS KAKENHI","doi-asserted-by":"publisher","award":["23K11072"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institutional Fund Projects","award":["IFPIP: 50-830-1443"]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,11,15]]},"DOI":"10.1109\/jiot.2024.3389656","type":"journal-article","created":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T17:29:28Z","timestamp":1714670968000},"page":"35902-35916","source":"Crossref","is-referenced-by-count":0,"title":["Personalized Privacy-Preserving Distributed Artificial Intelligence for Digital-Twin-Driven Vehicle Road Cooperation"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1027-5350","authenticated-orcid":false,"given":"Kangkang","family":"Sun","sequence":"first","affiliation":[{"name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2483-6980","authenticated-orcid":false,"given":"Jun","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2601-9327","authenticated-orcid":false,"given":"Ali Kashif","family":"Bashir","sequence":"additional","affiliation":[{"name":"Department of Computing and Mathematics, Manchester Metropolitan University, Manchester, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6831-3973","authenticated-orcid":false,"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6930-1624","authenticated-orcid":false,"given":"Hansong","family":"Xu","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8093-3377","authenticated-orcid":false,"given":"Qianqian","family":"Pan","sequence":"additional","affiliation":[{"name":"Graduate School of Engineering, The University of Tokyo, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1464-8401","authenticated-orcid":false,"given":"Yasser D.","family":"Al-Otaibi","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Computing and Information Technology in Rabigh, King Abdulaziz University, Jeddah, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2022.3173031"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.8493125"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3099597"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3297395"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3310081"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2023.3269766"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.201.2000768"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3389\/fbuil.2023.1176621"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3134002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2022.3217363"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IS.2018.8710526"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3017668"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015772"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3098692"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3223211"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.105.2100620"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3317320"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3310106"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3105492"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3149902"},{"key":"ref22","first-page":"5925","article-title":"On privacy and personalization in cross-silo federated learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Liu"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3003211"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2955503"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3555661.3560865"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1049\/iet-qtc.2020.0027"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2023.3243096"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3262484"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3310062"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220096"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3333243"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3086014"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000560"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2020.3003036"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3171817"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2945640"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2984369"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2973651"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3056341"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.784"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3279657"},{"key":"ref45","article-title":"Opacus: User-friendly differential privacy library in PyTorch","author":"Yousefpour","year":"2021","journal-title":"arXiv:2109.12298"},{"key":"ref46","first-page":"10752","article-title":"On convergence of fedprox: Local dissimilarity invariant bounds, non-smoothness and beyond","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Yuan"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS56603.2022.00107"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45374-9_21"},{"key":"ref49","first-page":"5201","article-title":"The distributed discrete gaussian mechanism for federated learning with secure aggregation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Kairouz"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10747044\/10517764.pdf?arnumber=10517764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:12:01Z","timestamp":1732666321000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10517764\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,15]]},"references-count":49,"journal-issue":{"issue":"22"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3389656","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2024,11,15]]}}}