{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:58:01Z","timestamp":1743073081811,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615247"},{"type":"electronic","value":"9789819615254"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1525-4_13","type":"book-chapter","created":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T09:28:57Z","timestamp":1739698137000},"page":"242-260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FedSV: A Privacy-Preserving Byzantine-Robust Federated Learning Scheme with\u00a0Self-validation"],"prefix":"10.1007","author":[{"given":"Wenhao","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Shaojing","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Yuchuan","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yongjun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"2168","DOI":"10.1109\/JSAC.2020.3041404","volume":"39","author":"J So","year":"2021","unstructured":"So, J., Guler, B., Avestimehr, A.S.: Byzantine-resilient secure federated learning. IEEE J. Sel. Areas Commun. 39, 2168\u20132181 (2021)","journal-title":"IEEE J. Sel. Areas Commun."},{"unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V.: How to backdoor federated learning. In: International Conference on Artificial Intelligence and Statistics, pp. 2938\u20132948. PMLR (2020)","key":"13_CR2"},{"unstructured":"Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H.B.: Practical secure aggregation for federated learning on user-held data. CoRR abs\/1611.04482 (2016). http:\/\/dblp.uni-trier.de\/db\/journals\/corr\/corr1611.html#BonawitzIKMMPRS16","key":"13_CR3"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1109\/TNSE.2020.3002796","volume":"8","author":"Z Chen","year":"2021","unstructured":"Chen, Z., Tian, P., Liao, W., Yu, W.: Zero knowledge clustering based adversarial mitigation in heterogeneous federated learning. IEEE Trans. Network Sci. Eng. 8, 1070\u20131083 (2021)","journal-title":"IEEE Trans. Network Sci. Eng."},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-70694-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"JH Cheon","year":"2017","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic encryption for arithmetic of approximate numbers. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 409\u2013437. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15"},{"unstructured":"Fang, M., Cao, X., Jia, J., Gong, N.: Local model poisoning attacks to byzantine-robust federated learning. In: 29th USENIX Security Symposium (USENIX Security 2020), pp. 1605\u20131622 (2020)","key":"13_CR6"},{"unstructured":"Geiping, J., Bauermeister, H., Dr\u00f6ge, H., Moeller, M.: Inverting gradients - how easy is it to break privacy in federated learning? In: Proceedings of the 34th International Conference on Neural Information Processing Systems, NIPS 2020, pp. 105\u2013121. Curran Associates Inc., Red Hook, NY, USA (2020)","key":"13_CR7"},{"doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, pp. 169\u2013178 (2009)","key":"13_CR8","DOI":"10.1145\/1536414.1536440"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-29011-4_28","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"C Gentry","year":"2012","unstructured":"Gentry, C., Halevi, S., Smart, N.P.: Fully homomorphic encryption with polylog overhead. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 465\u2013482. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29011-4_28"},{"doi-asserted-by":"crossref","unstructured":"Cao, X., Fang, M., Liu, J., Gong, N.Z.: FLTrust: byzantine-robust federated learning via trust bootstrapping (2022)","key":"13_CR10","DOI":"10.14722\/ndss.2021.24434"},{"issue":"2","key":"13_CR11","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSEC.2020.3039941","volume":"19","author":"MS Jere","year":"2020","unstructured":"Jere, M.S., Farnan, T., Koushanfar, F.: A taxonomy of attacks on federated learning. IEEE Secur. Priv. 19(2), 20\u201328 (2020)","journal-title":"IEEE Secur. Priv."},{"unstructured":"Jia, M.F.C.: Local model poisoning attacks to byzantine-robust federated learning. In: SEC 2020: Proceedings of the 29th USENIX Conference on Security Symposium (2020)","key":"13_CR12"},{"unstructured":"Kairouz, P., McMahan, H.B., Avent, B.: Advances and open problems in federated learning. Found. Trends\u00ae Mach. Learn., pp. 1\u2013210 (2021)","key":"13_CR13"},{"key":"13_CR14","first-page":"2031","volume":"25","author":"A Krizhevsky","year":"2012","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. Adv. Neural. Inf. Process. Syst. 25, 2031\u20132051 (2012)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"13_CR15","first-page":"2492","volume":"24","author":"X Ma","year":"2023","unstructured":"Ma, X., Jiang, Q., Shojafar, M., Alazab, M., Kumar, S., Kumari, S.: DisBezant: secure and robust federated learning against byzantine attack in IoT-enabled MTS. IEEE Trans. Intell. Transp. Syst. 24, 2492\u20132502 (2023)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"doi-asserted-by":"crossref","unstructured":"Li, H., Ditzler, G.: Targeted data poisoning attacks against continual learning neural networks. In: 2022 International Joint Conference on Neural Networks (IJCNN), pp. 312\u2013331 (2022)","key":"13_CR16","DOI":"10.1109\/IJCNN55064.2022.9892774"},{"unstructured":"Zhao, L., Jiang, J., Feng, B., Wang, Q., Shen, C., Li, Q.: SEAR: secure and efficient aggregation for byzantine-robust federated learning. IEEE Trans. Dependable Secure Comput., 1631\u20131654 (2021)","key":"13_CR17"},{"doi-asserted-by":"crossref","unstructured":"Lu, S., Li, R., Chen, X., Ma, Y.: Defense against local model poisoning attacks to byzantine-robust federated learning. Front. Comput. Sci., 163\u2013185 (2022)","key":"13_CR18","DOI":"10.1007\/s11704-021-1067-4"},{"doi-asserted-by":"crossref","unstructured":"Xia, G., Chen, J., Yu, C., Ma, J.: Poisoning attacks in federated learning: a survey. IEEE Access, 10708\u201310722 (2023)","key":"13_CR19","DOI":"10.1109\/ACCESS.2023.3238823"},{"unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y\u00a0Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp. 1273\u20131282. PMLR (2017)","key":"13_CR20"},{"doi-asserted-by":"publisher","unstructured":"Mo, F., Haddadi, H., Katevas, K., Marin, E., Perino, D., Kourtellis, N.: PPFL: privacy-preserving federated learning with trusted execution environments. In: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2021, pp. 94\u2013108. Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3458864.3466628","key":"13_CR21","DOI":"10.1145\/3458864.3466628"},{"doi-asserted-by":"crossref","unstructured":"Tan, J., Liang, Y.-C., Luong, N.C., Niyato, D.: Toward smart security enhancement of federated learning networks. IEEE Network, 340\u2013347 (2021)","key":"13_CR22","DOI":"10.1109\/MNET.011.2000379"},{"unstructured":"Ramachandran, P., Zoph, B., Le, Q.V.: Searching for activation functions. arXiv preprint arXiv:1710.05941 (2017)","key":"13_CR23"},{"doi-asserted-by":"publisher","unstructured":"Wang, Y., Zhu, T., Chang, W., Shen, S., Ren, W.: Model poisoning defense on federated learning: a validation based approach. In: Kuty\u0142owski, M., Zhang, J., Chen, C. (eds.) Network and System Security, NSS 2020. LNCS, vol. 12570, pp. 161\u2013182. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-65745-1_12","key":"13_CR24","DOI":"10.1007\/978-3-030-65745-1_12"},{"unstructured":"Shokri, R., Marco\u00a0Stronati, V.S.: Membership inference attacks against machine learning models. Statistics, 265\u2013279 (2016)","key":"13_CR25"},{"issue":"6088","key":"13_CR26","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-propagating errors. Nature 323(6088), 533\u2013536 (1986)","journal-title":"Nature"},{"unstructured":"Sav, S., et al.: POSEIDON: privacy-preserving federated neural network learning. CoRR abs\/2009.00349 (2020). https:\/\/arxiv.org\/abs\/2009.00349","key":"13_CR27"},{"doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning (conference paper). In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 1310\u20131321 (2015)","key":"13_CR28","DOI":"10.1145\/2810103.2813687"},{"unstructured":"Truex, S., Liu, L., Gursoy, M.E., Yu, L., Wei, W.: Demystifying membership inference attacks in machine learning as a service. IEEE Trans. Serv. Comput., 435\u2013452 (2019)","key":"13_CR29"},{"key":"13_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"M van Dijk","year":"2010","unstructured":"van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24\u201343. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_2"},{"unstructured":"Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: International Conference on Machine Learning, pp. 201\u2013223 (2016)","key":"13_CR31"},{"key":"13_CR32","doi-asserted-by":"publisher","first-page":"2608","DOI":"10.1109\/TII.2022.3172310","volume":"19","author":"X Xiao","year":"2023","unstructured":"Xiao, X., Tang, Z., Li, C., Xiao, B., Li, K.: SCA: Sybil-based collusion attacks of IIoT data poisoning in federated learning. IEEE Trans. Ind. Inform. 19, 2608\u20132618 (2023)","journal-title":"IEEE Trans. Ind. Inform."},{"unstructured":"Xie, C., Koyejo, S., Gupta, I.: Zeno: distributed stochastic gradient descent with suspicion-based fault-tolerance. In: International Conference on Machine Learning, pp. 6893\u20136901. PMLR (2019)","key":"13_CR33"},{"key":"13_CR34","doi-asserted-by":"publisher","first-page":"7116","DOI":"10.1109\/JIOT.2023.3314748","volume":"11","author":"G Hu","year":"2024","unstructured":"Hu, G., Li, H., Fan, W., Zhang, Y.: Efficient byzantine-robust and privacy-preserving federated learning on compressive domain. IEEE Internet Things J. 11, 7116\u20137127 (2024)","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"crossref","unstructured":"Zhou, C., et al.: PPA: preference profiling attack against federated learning. arXiv preprint arXiv:2202.04856 (2022)","key":"13_CR35","DOI":"10.14722\/ndss.2023.23171"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1525-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T09:29:23Z","timestamp":1739698163000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1525-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615247","9789819615254"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1525-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}