{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T16:00:14Z","timestamp":1757779214346,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031477508"},{"type":"electronic","value":"9783031477515"}],"license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-47751-5_12","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T17:02:23Z","timestamp":1701363743000},"page":"200-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Defending Against Free-Riders Attacks in\u00a0Distributed Generative Adversarial Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6549-3414","authenticated-orcid":false,"given":"Zilong","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9646-8721","authenticated-orcid":false,"given":"Jiyue","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4228-6735","authenticated-orcid":false,"given":"Lydia Y.","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Stefanie","family":"Roos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"12_CR1","unstructured":"Arjovsky, M., Bottou, L.: Towards principled methods for training generative adversarial networks. In: 5th International Conference on Learning Representations, ICLR 2017, Toulon, France, April 24\u201326, 2017, Conference Track Proceedings (2017)"},{"key":"12_CR2","doi-asserted-by":"publisher","unstructured":"Baumol, W.J.: Welfare economics and the theory of the state. In: The encyclopedia of public choice, pp. 937\u2013940. Springer, Boston (2004). https:\/\/doi.org\/10.1007\/978-0-306-47828-4_214","DOI":"10.1007\/978-0-306-47828-4_214"},{"key":"12_CR3","unstructured":"Brock, A., Donahue, J., Simonyan, K.: Large scale GAN training for high fidelity natural image synthesis. In: 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6\u20139, 2019 (2019)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Chang, Q., et al.: Synthetic learning: learn from distributed asynchronized discriminator GAN without sharing medical image data. In: 2020 IEEE\/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2020, Seattle, WA, USA, June 13\u201319, 2020, pp. 13853\u201313863. Computer Vision Foundation\/IEEE (2020)","DOI":"10.1109\/CVPR42600.2020.01387"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Correia, C., Correia, M., Rodrigues, L.: Omega: a secure event ordering service for the edge. In: 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2020, Valencia, Spain, June 29\u2013July 2, 2020, pp. 489\u2013501. IEEE (2020)","DOI":"10.1109\/DSN48063.2020.00062"},{"issue":"5","key":"12_CR6","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/JSAC.2006.872882","volume":"24","author":"M Feldman","year":"2006","unstructured":"Feldman, M., Papadimitriou, C.H., Chuang, J., Stoica, I.: Free-riding and whitewashing in peer-to-peer systems. IEEE J. Sel. Areas Commun. 24(5), 1010\u20131019 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"12_CR7","unstructured":"Fraboni, Y., Vidal, R., Lorenzi, M.: Free-rider attacks on model aggregation in federated learning. In: Banerjee, A., Fukumizu, K. (eds.) The 24th International Conference on Artificial Intelligence and Statistics, AISTATS 2021, April 13\u201315, 2021, Virtual Event. Proceedings of Machine Learning Research, vol. 130, pp. 1846\u20131854. PMLR (2021)"},{"key":"12_CR8","unstructured":"Glorot, X., Bengio, Y.: Understanding the difficulty of training deep feedforward neural networks. In: Teh, Y.W., Titterington, D.M. (eds.) Proceedings of the Thirteenth International Conference on Artificial Intelligence and Statistics, AISTATS 2010, Chia Laguna Resort, Sardinia, Italy, May 13\u201315, 2010. JMLR Proceedings, vol. 9, pp. 249\u2013256. JMLR.org (2010)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Guerraoui, R., Guirguis, A., Kermarrec, A., Merrer, E.L.: FeGAN: scaling distributed GANs. In: Silva, D.D., Kapitza, R. (eds.) Middleware \u201920: 21st International Middleware Conference, Delft, The Netherlands, December 7\u201311, 2020, pp. 193\u2013206. ACM (2020)","DOI":"10.1145\/3423211.3425688"},{"key":"12_CR10","unstructured":"Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.: Improved training of wasserstein GANs. arXiv preprint arXiv:1704.00028 (2017)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Hardy, C., Merrer, E.L., Sericola, B.: MD-GAN: multi-discriminator generative adversarial networks for distributed datasets. In: 2019 IEEE International Parallel and Distributed Processing Symposium, IPDPS 2019, Rio de Janeiro, Brazil, May 20\u201324, 2019, pp. 866\u2013877. IEEE (2019)","DOI":"10.1109\/IPDPS.2019.00095"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Delving deep into rectifiers: surpassing human-level performance on imagenet classification. In: Proceedings of the IEEE International Conference on Computer Vision, pp. 1026\u20131034 (2015)","DOI":"10.1109\/ICCV.2015.123"},{"key":"12_CR13","unstructured":"Heusel, M., Ramsauer, H., Unterthiner, T., Nessler, B., Hochreiter, S.: GANs trained by a two time-scale update rule converge to a local nash equilibrium. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems, vol. 30. Curran Associates, Inc. (2017)"},{"key":"12_CR14","unstructured":"Krizhevsky, A., Hinton, G., et al.: Learning multiple layers of features from tiny images (2009)"},{"issue":"11","key":"12_CR15","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"12_CR16","unstructured":"Li, C., Alvarez-Melis, D., Xu, K., Jegelka, S., Sra, S.: Distributional adversarial networks. In: 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30\u2013May 3, 2018, Workshop Track Proceedings (2018)"},{"key":"12_CR17","unstructured":"Lin, J., Du, M., Liu, J.: Free-riders in federated learning: attacks and defenses. CoRR abs\/1911.12560 (2019)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Liu, G., Khalil, I., Khreishah, A.: ZK-GanDef: a GAN based zero knowledge adversarial training defense for neural networks. In: 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2019, Portland, OR, USA, June 24\u201327, 2019, pp. 64\u201375. IEEE (2019)","DOI":"10.1109\/DSN.2019.00021"},{"key":"12_CR19","unstructured":"Locher, T., Moor, P., Schmid, S., Wattenhofer, R.: Free riding in bittorrent is cheap. In: Kohler, E., Minshall, G. (eds.) 5th ACM Workshop on Hot Topics in Networks - HotNets-V, Irvine, California, USA, November 29\u201330, 2006. ACM SIGCOMM (2006)"},{"key":"12_CR20","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Singh, A., Zhu, X.J. (eds.) Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS 2017, 20\u201322 April 2017, Fort Lauderdale, FL, USA. Proceedings of Machine Learning Research, vol. 54, pp. 1273\u20131282. PMLR (2017)"},{"issue":"7","key":"12_CR21","doi-asserted-by":"publisher","first-page":"3086","DOI":"10.3390\/app11073086","volume":"11","author":"RS Peres","year":"2021","unstructured":"Peres, R.S., Azevedo, M., Ara\u00fajo, S.O., Guedes, M., Miranda, F., Barata, J.: Generative adversarial networks for data augmentation in structural adhesive inspection. Appl. Sci. 11(7), 3086 (2021)","journal-title":"Appl. Sci."},{"key":"12_CR22","unstructured":"Powers, D.M.W.: Evaluation: from precision, recall and f-measure to roc, informedness, markedness and correlation. CoRR abs\/2010.16061 (2020)"},{"key":"12_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-030-58583-9_11","volume-title":"Computer Vision \u2013 ECCV 2020","author":"H Qu","year":"2020","unstructured":"Qu, H., Zhang, Y., Chang, Q., Yan, Z., Chen, C., Metaxas, D.: Learn distributed GAN with temporary discriminators. In: Vedaldi, A., Bischof, H., Brox, T., Frahm, J.-M. (eds.) ECCV 2020. LNCS, vol. 12372, pp. 175\u2013192. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58583-9_11"},{"key":"12_CR24","unstructured":"Rasouli, M., Sun, T., Rajagopal, R.: FedGAN: federated generative adversarial networks for distributed data. CoRR abs\/2006.07228 (2020)"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Robbins, H., Monro, S.: A stochastic approximation method. Ann. Math. Stat. 22(3), 400\u2013407 (1951)","DOI":"10.1214\/aoms\/1177729586"},{"key":"12_CR26","unstructured":"Union, E.: Regulation (eu) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (general data protection regulation). Official Journal L110 59, 1\u201388 (2016)"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Wang, Z., Xu, H., Liu, J., Huang, H., Qiao, C., Zhao, Y.: Resource-efficient federated learning with hierarchical aggregation in edge computing. In: 40th IEEE Conference on Computer Communications, INFOCOM 2021, Vancouver, BC, Canada, May 10\u201313, 2021, pp. 1\u201310. IEEE (2021)","DOI":"10.1109\/INFOCOM42981.2021.9488756"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. 10(2), 12:1\u201312:19 (2019)","DOI":"10.1145\/3298981"},{"key":"12_CR29","unstructured":"Zhao, Z., Birke, R., Kunar, A., Chen, L.Y.: Fed-TGAN: federated learning framework for synthesizing tabular data. arXiv preprint arXiv:2108.07927 (2021)"},{"key":"12_CR30","unstructured":"Zhao, Z., Kunar, A., Birke, R., Chen, L.Y.: CTAB-GAN: effective table data synthesizing. In: Balasubramanian, V.N., Tsang, I. (eds.) Proceedings of The 13th Asian Conference on Machine Learning. Proceedings of Machine Learning Research, vol. 157, pp. 97\u2013112. PMLR (2021)"},{"key":"12_CR31","unstructured":"Zhao, Z., Kunar, A., Birke, R., Chen, L.Y.: CTAB-GAN+: enhancing tabular data synthesis. arXiv preprint arXiv:2204.00401 (2022)"},{"key":"12_CR32","unstructured":"Zhao, Z., Wu, H., van Moorsel, A., Chen, L.Y.: GTV: generating tabular data via vertical federated learning. arXiv preprint arXiv:2302.01706 (2023)"},{"key":"12_CR33","unstructured":"Zong, B., et al.: Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In: 6th International Conference on Learning Representations, ICLR 2018, Vancouver, BC, Canada, April 30\u2013May 3, 2018, Conference Track Proceedings (2018)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47751-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T17:03:34Z","timestamp":1701363814000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47751-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,1]]},"ISBN":["9783031477508","9783031477515"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47751-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023,12,1]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bol, Bra\u010d","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Croatia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc23.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"182","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the workshops 7 full papers have been accepted from 18 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}