{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T08:30:04Z","timestamp":1773217804916,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030953904","type":"print"},{"value":"9783030953911","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-95391-1_32","type":"book-chapter","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T09:04:54Z","timestamp":1645520694000},"page":"509-523","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Privacy-Preserving Swarm Learning Based on\u00a0Homomorphic Encryption"],"prefix":"10.1007","author":[{"given":"Lijie","family":"Chen","sequence":"first","affiliation":[]},{"given":"Shaojing","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Liu","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yuchuan","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Wentao","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,23]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Chu, A., Goodfellow, I., Mcmahan, H.B., Zhang, L.: Deep learning with differential privacy. In: The 2016 ACM SIGSAC Conference (2016)","DOI":"10.1145\/2976749.2978318"},{"issue":"10","key":"32_CR2","doi-asserted-by":"publisher","first-page":"1554","DOI":"10.1109\/TNN.2009.2026902","volume":"20","author":"T Chen","year":"2009","unstructured":"Chen, T., Zhong, S.: Privacy-preserving backpropagation neural network learning. IEEE Trans. Neural Networks 20(10), 1554\u20131564 (2009)","journal-title":"IEEE Trans. Neural Networks"},{"key":"32_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-44586-2_9","volume-title":"Public Key Cryptography","author":"I Damg\u00e5rd","year":"2001","unstructured":"Damg\u00e5rd, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier\u2019s probabilistic public-key system. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119\u2013136. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44586-2_9"},{"issue":"6","key":"32_CR4","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/MSP.2012.2211477","volume":"29","author":"L Deng","year":"2012","unstructured":"Deng, L.: The mnist database of handwritten digit images for machine learning research [best of the web]. IEEE Signal Process. Mag. 29(6), 141\u2013142 (2012)","journal-title":"IEEE Signal Process. Mag."},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Ding, Y., et al.: Blockchain-based access control mechanism of federated data sharing system. In: 2020 IEEE International Conference on Parallel Distributed Processing with Applications, Big Data Cloud Computing, Sustainable Computing Communications, Social Computing Networking (ISPA\/BDCloud\/SocialCom\/SustainCom), pp. 277\u2013284 (2020)","DOI":"10.1109\/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00060"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Fereidooni, H., et al.: SAFELearn: secure aggregation for private federated learning. In: 2021 IEEE Security and Privacy Workshops (SPW), pp. 56\u201362 (2021)","DOI":"10.1109\/SPW53761.2021.00017"},{"key":"32_CR7","unstructured":"Geyer, R.C., Klein, T., Nabi, M.: Differentially private federated learning: a client level perspective. CoRR abs\/1712.07557 (2017)"},{"key":"32_CR8","unstructured":"Kone\u010dn\u00fd, J., McMahan, H.B., Yu, F.X., Richt\u00e1rik, P., Suresh, A.T., Bacon, D.: Federated learning: strategies for improving communication efficiency. CoRR abs\/1610.05492 (2016)"},{"key":"32_CR9","unstructured":"Melis, L., Song, C., De Cristofaro, E., Shmatikov, V.: Inference attacks against collaborative learning (2018)"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"103561","DOI":"10.1016\/j.csi.2021.103561","volume":"80","author":"X Ma","year":"2022","unstructured":"Ma, X., Zhou, Y., Wang, L., Miao, M.: Privacy-preserving byzantine-robust federated learning. Comput. Stand. Interfaces 80, 103561 (2022)","journal-title":"Comput. Stand. Interfaces"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Mei, Q., Xiong, H., Zhao, Y., Yeh, K.H.: Toward blockchain-enabled IOV with edge computing: efficient and privacy-preserving vehicular communication and dynamic updating. In: 2021 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1\u20138 (2021)","DOI":"10.1109\/DSC49826.2021.9346240"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Miao, C., et al.: Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. In: Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, SenSys 2015, pp. 183\u2013196. Association for Computing Machinery (2015)","DOI":"10.1145\/2809695.2809719"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19\u201338 (2017)","DOI":"10.1109\/SP.2017.12"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning (2018)","DOI":"10.1109\/SP.2019.00065"},{"issue":"5","key":"32_CR15","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","volume":"13","author":"LT Phong","year":"2018","unstructured":"Phong, L.T., Aono, Y., Hayashi, T., Wang, L., Moriai, S.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13(5), 1333\u20131345 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Salem, A., Zhang, Y., Humbert, M., Fritz, M., Backes, M.: ML-leaks: model and data independent membership inference attacks and defenses on machine learning models. CoRR abs\/1806.01246 (2018)","DOI":"10.14722\/ndss.2019.23119"},{"issue":"7","key":"32_CR17","doi-asserted-by":"publisher","first-page":"1513","DOI":"10.1109\/TPDS.2020.3044223","volume":"32","author":"M Shayan","year":"2021","unstructured":"Shayan, M., Fung, C., Yoon, C.J.M., Beschastnikh, I.: Biscotti: a blockchain system for private and secure federated learning. IEEE Trans. Parallel Distrib. Syst. 32(7), 1513\u20131525 (2021)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP) (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015, pp. 1310\u20131321. Association for Computing Machinery (2015)","DOI":"10.1145\/2810103.2813687"},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Shuvo, M.S.R., Alhadidi, D.: Membership inference attacks: analysis and mitigation. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1410\u20131419 (2020)","DOI":"10.1109\/TrustCom50675.2020.00190"},{"key":"32_CR21","unstructured":"Wang, L., Xu, S., Wang, X., Zhu, Q.: Eavesdrop the composition proportion of training labels in federated learning. CoRR abs\/1910.06044 (2019)"},{"issue":"7862","key":"32_CR22","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1038\/s41586-021-03583-3","volume":"594","author":"S Warnat-Herresthal","year":"2021","unstructured":"Warnat-Herresthal, S., Schultze, H., Shastry, K.L., Manamohan, S., Thirumalaisamy, V.P.: Swarm learning for decentralized and confidential clinical machine learning. Nature 594(7862), 265\u2013270 (2021)","journal-title":"Nature"},{"issue":"12","key":"32_CR23","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/s10916-016-0609-z","volume":"40","author":"Y Wu","year":"2016","unstructured":"Wu, Y., Lu, X., Su, J., Chen, P.: An efficient searchable encryption against keyword guessing attacks for sharable electronic medical records in cloud-based system. J. Med. Syst. 40(12), 258 (2016)","journal-title":"J. Med. Syst."},{"key":"32_CR24","doi-asserted-by":"publisher","first-page":"73963","DOI":"10.1109\/ACCESS.2021.3079625","volume":"9","author":"D Xenakis","year":"2021","unstructured":"Xenakis, D., Tsiota, A., Koulis, C.T., Xenakis, C., Passas, N.: Contract-less mobile data access beyond 5G: fully-decentralized, high-throughput and anonymous asset trading over the blockchain. IEEE Access 9, 73963\u201374016 (2021)","journal-title":"IEEE Access"},{"key":"32_CR25","unstructured":"Yang, C.S., So, J., He, C., Li, S., Yu, Q., Avestimehr, S.: LightSecAgg: rethinking secure aggregation in federated learning (2021)"},{"issue":"1","key":"32_CR26","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/TPDS.2013.18","volume":"25","author":"J Yuan","year":"2014","unstructured":"Yuan, J., Yu, S.: Privacy preserving back-propagation neural network learning made practical with cloud computing. IEEE Trans. Parallel Distrib. Syst. 25(1), 212\u2013221 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"32_CR27","doi-asserted-by":"publisher","first-page":"1351","DOI":"10.1109\/TC.2015.2470255","volume":"65","author":"Q Zhang","year":"2016","unstructured":"Zhang, Q., Yang, L.T., Chen, Z.: Privacy preserving deep computation model on cloud for big data feature learning. IEEE Trans. Comput. 65(5), 1351\u20131362 (2016)","journal-title":"IEEE Trans. Comput."},{"issue":"3","key":"32_CR28","doi-asserted-by":"publisher","first-page":"1817","DOI":"10.1109\/JIOT.2020.3017377","volume":"8","author":"Y Zhao","year":"2021","unstructured":"Zhao, Y., et al.: Privacy-preserving blockchain-based federated learning for IoT devices. IEEE Internet Things J. 8(3), 1817\u20131829 (2021)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-95391-1_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T09:09:53Z","timestamp":1645520993000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-95391-1_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030953904","9783030953911"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-95391-1_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"23 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"403","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.12","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.27","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}