{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:50:52Z","timestamp":1743108652490,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030953904"},{"type":"electronic","value":"9783030953911"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95391-1_22","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T09:04:54Z","timestamp":1645520694000},"page":"346-361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Preserving and\u00a0Reliable Federated Learning"],"prefix":"10.1007","author":[{"given":"Yi","family":"Lu","sequence":"first","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lulu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuanyuan","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS\u201916, pp. 308\u2013318. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2976749.2978318","DOI":"10.1145\/2976749.2978318"},{"issue":"5","key":"22_CR2","first-page":"1333","volume":"13","author":"Y Aono","year":"2017","unstructured":"Aono, Y., Hayashi, T., Wang, L., Moriai, S., et al.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13(5), 1333\u20131345 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-030-88418-5_22","volume-title":"Computer Security \u2013 ESORICS 2021","author":"S Awan","year":"2021","unstructured":"Awan, S., Luo, B., Li, F.: CONTRA: defending against poisoning attacks in federated learning. In: Bertino, E., Shulman, H., Waidner, M. (eds.) ESORICS 2021. LNCS, vol. 12972, pp. 455\u2013475. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88418-5_22"},{"issue":"2","key":"22_CR4","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10994-010-5188-5","volume":"81","author":"M Barreno","year":"2010","unstructured":"Barreno, M., Nelson, B., Joseph, A.D., Tygar, J.D.: The security of machine learning. Mach. Learn. 81(2), 121\u2013148 (2010). https:\/\/doi.org\/10.1007\/s10994-010-5188-5","journal-title":"Mach. Learn."},{"issue":"9","key":"22_CR5","first-page":"17","volume":"105","author":"P Bholowalia","year":"2014","unstructured":"Bholowalia, P., Kumar, A.: EBK-means: a clustering technique based on elbow method and k-means in WSN. Int. J. Comput. Appl. 105(9), 17\u201324 (2014)","journal-title":"Int. J. Comput. Appl."},{"key":"22_CR6","doi-asserted-by":"publisher","unstructured":"Bonawitz, K., et al.: Practical secure aggregation for privacy-preserving machine learning, pp. 1175\u20131191. Association for Computing Machinery, New York (2017). https:\/\/doi.org\/10.1145\/3133956.3133982","DOI":"10.1145\/3133956.3133982"},{"issue":"13","key":"22_CR7","doi-asserted-by":"publisher","first-page":"10766","DOI":"10.1109\/JIOT.2021.3050562","volume":"8","author":"T Chen","year":"2021","unstructured":"Chen, T., Zhang, L., Choo, K.K.R., Zhang, R., Meng, X.: Blockchain-based key management scheme in fog-enabled IoT systems. IEEE Internet Things J. 8(13), 10766\u201310778 (2021)","journal-title":"IEEE Internet Things J."},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-70694-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"JH Cheon","year":"2017","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 409\u2013437. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15"},{"key":"22_CR9","doi-asserted-by":"publisher","unstructured":"Collobert, R., Weston, J.: A unified architecture for natural language processing: deep neural networks with multitask learning. In: Proceedings of the 25th International Conference on Machine Learning, ICML\u201908, pp. 160\u2013167. Association for Computing Machinery, New York (2008). https:\/\/doi.org\/10.1145\/1390156.1390177","DOI":"10.1145\/1390156.1390177"},{"key":"22_CR10","unstructured":"Duan, M., et al.: FedGroup: ternary cosine similarity-based clustered federated learning framework toward high accuracy in heterogeneity data. arXiv preprint arXiv:2010.06870 (2020)"},{"key":"22_CR11","unstructured":"Fang, M., Cao, X., Jia, J., Gong, N.: Local model poisoning attacks to byzantine-robust federated learning. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 1605\u20131622. USENIX Association (2020)"},{"issue":"1","key":"22_CR12","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1006\/jcss.1997.1504","volume":"55","author":"Y Freund","year":"1997","unstructured":"Freund, Y., Schapire, R.E.: A decision-theoretic generalization of on-line learning and an application to boosting. J. Comput. Syst. Sci. 55(1), 119\u2013139 (1997)","journal-title":"J. Comput. Syst. Sci."},{"key":"22_CR13","unstructured":"Fung, C., Yoon, C.J.M., Beschastnikh, I.: The limitations of federated learning in sybil settings. In: 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020), pp. 301\u2013316. USENIX Association, San Sebastian (2020)"},{"key":"22_CR14","unstructured":"Fung, C., Yoon, C.J., Beschastnikh, I.: Mitigating sybils in federated learning poisoning. arXiv preprint arXiv:1808.04866 (2018)"},{"key":"22_CR15","unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: Balcan, M.F., Weinberger, K.Q. (eds.) Proceedings of The 33rd International Conference on Machine Learning. Proceedings of Machine Learning Research, vol. 48, pp. 201\u2013210. PMLR, New York (2016)"},{"issue":"2","key":"22_CR16","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/s10044-017-0673-0","volume":"22","author":"R Jothi","year":"2019","unstructured":"Jothi, R., Mohanty, S.K., Ojha, A.: DK-means: a deterministic k-means clustering algorithm for gene expression analysis. Pattern Anal. Appl. 22(2), 649\u2013667 (2019). https:\/\/doi.org\/10.1007\/s10044-017-0673-0","journal-title":"Pattern Anal. Appl."},{"issue":"6","key":"22_CR17","doi-asserted-by":"publisher","first-page":"10700","DOI":"10.1109\/JIOT.2019.2940820","volume":"6","author":"J Kang","year":"2019","unstructured":"Kang, J., Xiong, Z., Niyato, D., Xie, S., Zhang, J.: Incentive mechanism for reliable federated learning: a joint optimization approach to combining reputation and contract theory. IEEE Internet Things J. 6(6), 10700\u201310714 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"22_CR18","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MWC.001.1900119","volume":"27","author":"J Kang","year":"2020","unstructured":"Kang, J., Xiong, Z., Niyato, D., Zou, Y., Zhang, Y., Guizani, M.: Reliable federated learning for mobile networks. IEEE Wirel. Commun. 27(2), 72\u201380 (2020)","journal-title":"IEEE Wirel. Commun."},{"key":"22_CR19","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1016\/j.future.2017.02.017","volume":"78","author":"J Liu","year":"2018","unstructured":"Liu, J., et al.: Secure intelligent traffic light control using fog computing. Futur. Gener. Comput. Syst. 78, 817\u2013824 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"22_CR20","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.Y.: Communication-efficient learning of deep networks from decentralized data. In: Singh, A., Zhu, J. (eds.) Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. Proceedings of Machine Learning Research, vol. 54, pp. 1273\u20131282. PMLR (2017)"},{"key":"22_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.3008795","author":"X Meng","year":"2020","unstructured":"Meng, X., Zhang, L., Kang, B.: Fast secure and anonymous key agreement against bad randomness for cloud computing. IEEE Trans. Cloud Comput. (2020). https:\/\/doi.org\/10.1109\/TCC.2020.3008795","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"12","key":"22_CR22","doi-asserted-by":"publisher","first-page":"8485","DOI":"10.1109\/TII.2021.3075706","volume":"17","author":"MHU Rehman","year":"2021","unstructured":"Rehman, M.H.U., Dirir, A.M., Salah, K., Damiani, E., Svetinovic, D.: TrustFed: a framework for fair and trustworthy cross-device federated learning in IIoT. IEEE Trans. Ind. Inform. 17(12), 8485\u20138494 (2021)","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"8","key":"22_CR23","doi-asserted-by":"publisher","first-page":"3710","DOI":"10.1109\/TNNLS.2020.3015958","volume":"32","author":"F Sattler","year":"2021","unstructured":"Sattler, F., M\u00fcller, K.R., Samek, W.: Clustered federated learning: model-agnostic distributed multitask optimization under privacy constraints. IEEE Trans. Neural Netw. Learn. Syst. 32(8), 3710\u20133722 (2021). https:\/\/doi.org\/10.1109\/TNNLS.2020.3015958","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"22_CR24","unstructured":"Shayan, M., Fung, C., Yoon, C.J., Beschastnikh, I.: Biscotti: a ledger for private and secure peer-to-peer machine learning. arXiv preprint arXiv:1811.09904 (2018)"},{"key":"22_CR25","doi-asserted-by":"publisher","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318 (2017). https:\/\/doi.org\/10.1109\/SP.2017.41","DOI":"10.1109\/SP.2017.41"},{"key":"22_CR26","doi-asserted-by":"publisher","unstructured":"Song, L., Shokri, R., Mittal, P.: Privacy risks of securing machine learning models against adversarial examples. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS\u201919, pp. 241\u2013257. Association for Computing Machinery, New York (2019) . https:\/\/doi.org\/10.1145\/3319535.3354211","DOI":"10.1145\/3319535.3354211"},{"key":"22_CR27","doi-asserted-by":"publisher","unstructured":"Tran, N.H., Bao, W., Zomaya, A., Nguyen, M.N.H., Hong, C.S.: Federated learning over wireless networks: optimization model design and analysis. In: IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, pp. 1387\u20131395 (2019). https:\/\/doi.org\/10.1109\/INFOCOM.2019.8737464","DOI":"10.1109\/INFOCOM.2019.8737464"},{"key":"22_CR28","doi-asserted-by":"publisher","unstructured":"Truex, S., et al.: A hybrid approach to privacy-preserving federated learning. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, AISec\u201919, pp. 1\u201311. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3338501.3357370","DOI":"10.1145\/3338501.3357370"},{"issue":"5","key":"22_CR29","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/MNET.2019.1800286","volume":"33","author":"X Wang","year":"2019","unstructured":"Wang, X., Han, Y., Wang, C., Zhao, Q., Chen, X., Chen, M.: In-edge AI: intelligentizing mobile edge computing, caching and communication by federated learning. IEEE Netw. 33(5), 156\u2013165 (2019)","journal-title":"IEEE Netw."},{"key":"22_CR30","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei, K., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454\u20133469 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"22_CR31","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MC.2018.2381131","volume":"51","author":"S Yao","year":"2018","unstructured":"Yao, S., et al.: Deep learning for the Internet of Things. Computer 51(5), 32\u201341 (2018)","journal-title":"Computer"},{"key":"22_CR32","doi-asserted-by":"publisher","unstructured":"Yeom, S., Giacomelli, I., Fredrikson, M., Jha, S.: Privacy risk in machine learning: analyzing the connection to overfitting. In: 2018 IEEE 31st Computer Security Foundations Symposium (CSF), pp. 268\u2013282 (2018). https:\/\/doi.org\/10.1109\/CSF.2018.00027","DOI":"10.1109\/CSF.2018.00027"},{"key":"22_CR33","unstructured":"Zhang, C., Li, S., Xia, J., Wang, W., Yan, F., Liu, Y.: BatchCrypt: efficient homomorphic encryption for cross-silo federated learning. In: 2020 USENIX Annual Technical Conference (USENIX ATC 20), pp. 493\u2013506. USENIX Association (2020)"},{"issue":"3","key":"22_CR34","doi-asserted-by":"publisher","first-page":"1117","DOI":"10.1109\/TCC.2019.2903254","volume":"9","author":"L Zhang","year":"2021","unstructured":"Zhang, L.: Key management scheme for secure channel establishment in fog computing. IEEE Trans. Cloud Comput. 9(3), 1117\u20131128 (2021)","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"3","key":"22_CR35","first-page":"634","volume":"17","author":"L Zhang","year":"2020","unstructured":"Zhang, L., Meng, X., Choo, K.K.R., Zhang, Y., Dai, F.: Privacy-preserving cloud establishment and data dissemination scheme for vehicular cloud. IEEE Trans. Dependable Secure Comput. 17(3), 634\u2013647 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95391-1_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T09:08:31Z","timestamp":1645520911000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95391-1_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030953904","9783030953911"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95391-1_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"403","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.12","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.27","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}