{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:16:05Z","timestamp":1742987765708,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":47,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819635306"},{"type":"electronic","value":"9789819635313"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3531-3_5","type":"book-chapter","created":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:10:21Z","timestamp":1741867821000},"page":"82-106","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PPDL: Efficient Dropout-Resilient Aggregation for\u00a0Privacy-Preserving Decentralized Learning"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0874-3330","authenticated-orcid":false,"given":"Ali Reza","family":"Ghavamipour","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2774-2675","authenticated-orcid":false,"given":"Benjamin Zi","family":"Hao Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6262-4869","authenticated-orcid":false,"given":"Fatih","family":"Turkmen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,14]]},"reference":[{"issue":"5","key":"5_CR1","first-page":"1333","volume":"13","author":"Y Aono","year":"2017","unstructured":"Aono, Y., Hayashi, T., Wang, L., Moriai, S., et al.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13(5), 1333\u20131345 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Bell, J.H., Bonawitz, K.A., Gasc\u00f3n, A., Lepoint, T., Raykova, M.: Secure single-server aggregation with (poly) logarithmic overhead. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1253\u20131269 (2020)","DOI":"10.1145\/3372297.3417885"},{"key":"5_CR3","unstructured":"Bellet, A., Guerraoui, R., Taziki, M., Tommasi, M.: Personalized and private peer-to-peer machine learning. In: International Conference on Artificial Intelligence and Statistics, pp. 473\u2013481. PMLR (2018)"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"2983","DOI":"10.1109\/COMST.2023.3315746","volume":"25","author":"ETM Beltr\u00e1n","year":"2023","unstructured":"Beltr\u00e1n, E.T.M., et al.: Decentralized federated learning: fundamentals, state of the art, frameworks, trends, and challenges. IEEE Commun. Surv. Tutor. 25, 2983\u20133013 (2023)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"5_CR5","unstructured":"Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo random bits. In: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp. 227\u2013240 (2019)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Boenisch, F., Dziedzic, A., Schuster, R., Shamsabadi, A.S., Shumailov, I., Papernot, N.: When the curious abandon honesty: federated learning is not private. In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS &P), pp. 175\u2013199. IEEE (2023)","DOI":"10.1109\/EuroSP57164.2023.00020"},{"key":"5_CR7","first-page":"374","volume":"1","author":"K Bonawitz","year":"2019","unstructured":"Bonawitz, K., et al.: Towards federated learning at scale: system design. Proc. Mach. Learning Syst. 1, 374\u2013388 (2019)","journal-title":"Proc. Mach. Learning Syst."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Bonawitz, K., et al.: Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1175\u20131191 (2017)","DOI":"10.1145\/3133956.3133982"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/BFb0054851","volume-title":"Algorithmic Number Theory","author":"D Boneh","year":"1998","unstructured":"Boneh, D.: The decision Diffie-Hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48\u201363. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0054851"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 639\u2013648 (1996)","DOI":"10.1145\/237814.238015"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-030-23502-4_10","volume-title":"Cloud Computing \u2013 CLOUD 2019","author":"H-P Cheng","year":"2019","unstructured":"Cheng, H.-P., et al.: Towards decentralized deep learning with differential privacy. In: Da Silva, D., Wang, Q., Zhang, L.-J. (eds.) CLOUD 2019. LNCS, vol. 11513, pp. 130\u2013145. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23502-4_10"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Fereidooni, H., et\u00a0al.: SAFELearn: secure aggregation for private federated learning. In: 2021 IEEE Security and Privacy Workshops (SPW), pp. 56\u201362. IEEE (2021)","DOI":"10.1109\/SPW53761.2021.00017"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Franklin, M., Yung, M.: Communication complexity of secure computation. In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Theory of Computing, pp. 699\u2013710 (1992)","DOI":"10.1145\/129712.129780"},{"key":"5_CR15","unstructured":"Gentry, C.: A Fully Homomorphic Encryption Scheme. Stanford university (2009)"},{"key":"5_CR16","unstructured":"Geyer, R.C., Klein, T., Nabi, M.: Differentially private federated learning: a client level perspective. arXiv preprint arXiv:1712.07557 (2017)"},{"issue":"1","key":"5_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12911-022-01811-y","volume":"22","author":"AR Ghavamipour","year":"2022","unstructured":"Ghavamipour, A.R., Turkmen, F., Jiang, X.: Privacy-preserving logistic regression with secret sharing. BMC Med. Inform. Decis. Mak. 22(1), 1\u201311 (2022)","journal-title":"BMC Med. Inform. Decis. Mak."},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Ghavamipour, A.R., Turkmen, F., Wang, R., Liang, K.: Federated synthetic data generation with stronger security guarantees. In: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, pp. 31\u201342 (2023)","DOI":"10.1145\/3589608.3593835"},{"key":"5_CR19","unstructured":"Ghavamipour, A.R., Zhao, B.Z.H., Ersoy, O., Turkmen, F.: Privacy-preserving aggregation for decentralized learning with byzantine-robustness. arXiv preprint arXiv:2404.17970 (2024)"},{"issue":"6","key":"5_CR20","doi-asserted-by":"publisher","first-page":"4016","DOI":"10.1109\/TCSVT.2021.3105723","volume":"32","author":"S Guo","year":"2021","unstructured":"Guo, S., Zhang, T., Xu, G., Yu, H., Xiang, T., Liu, Y.: Topology-aware differential privacy for decentralized image classification. IEEE Trans. Circuits Syst. Video Technol. 32(6), 4016\u20134027 (2021)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-030-22496-7_5","volume-title":"Distributed Applications and Interoperable Systems","author":"I Heged\u0171s","year":"2019","unstructured":"Heged\u0171s, I., Danner, G., Jelasity, M.: Gossip learning as a decentralized alternative to federated learning. In: Pereira, J., Ricci, L. (eds.) DAIS 2019. LNCS, vol. 11534, pp. 74\u201390. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22496-7_5"},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.jpdc.2020.10.006","volume":"148","author":"I Heged\u0171s","year":"2021","unstructured":"Heged\u0171s, I., Danner, G., Jelasity, M.: Decentralized learning works: an empirical comparison of gossip learning and federated learning. J. Parallel Distrib. Comput. 148, 109\u2013124 (2021)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"6","key":"5_CR23","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"M Hellman","year":"1976","unstructured":"Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"5_CR24","unstructured":"Koloskova, A., Stich, S., Jaggi, M.: Decentralized stochastic optimization and gossip algorithms with compressed communication. In: International Conference on Machine Learning, pp. 3478\u20133487. PMLR (2019)"},{"key":"5_CR25","unstructured":"Krizhevsky, A., Hinton, G., et\u00a0al.: Learning multiple layers of features from tiny images (2009)"},{"key":"5_CR26","unstructured":"LeCun, Y.: The MNIST database of handwritten digits (1998). http:\/\/yann.lecun.com\/exdb\/mnist\/"},{"issue":"3","key":"5_CR27","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2020.2975749","volume":"37","author":"T Li","year":"2020","unstructured":"Li, T., Sahu, A.K., Talwalkar, A., Smith, V.: Federated learning: challenges, methods, and future directions. IEEE Signal Process. Mag. 37(3), 50\u201360 (2020)","journal-title":"IEEE Signal Process. Mag."},{"key":"5_CR28","unstructured":"Lian, X., Zhang, C., Zhang, H., Hsieh, C.J., Zhang, W., Liu, J.: Can decentralized algorithms outperform centralized algorithms? A case study for decentralized parallel stochastic gradient descent. Adv. Neural Inf. Process. Syst. 30 (2017)"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Luo, X., Wu, Y., Xiao, X., Ooi, B.C.: Feature inference attack on model predictions in vertical federated learning. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), pp. 181\u2013192. IEEE (2021)","DOI":"10.1109\/ICDE51399.2021.00023"},{"key":"5_CR30","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y\u00a0Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: AISTATS, pp. 1273\u20131282 (2017)"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 2008 IEEE Symposium on Security and Privacy (SP 2008), pp. 111\u2013125. IEEE (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"5_CR32","unstructured":"Netzer, Y., Wang, T., Coates, A., Bissacco, A., Wu, B., Ng, A.Y.: Reading digits in natural images with unsupervised feature learning (2011)"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Pasquini, D., Raynal, M., Troncoso, C.: On the (in) security of peer-to-peer decentralized machine learning. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 418\u2013436. IEEE Computer Society (2023)","DOI":"10.1109\/SP46215.2023.10179291"},{"key":"5_CR34","unstructured":"Paszke, A., et\u00a0al.: PyTorch: an imperative style, high-performance deep learning library. Adv. Neural Inf. Process. Syst. 32 (2019)"},{"issue":"11","key":"5_CR35","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"5_CR37","unstructured":"So, J., et al.: LightSecAgg: a lightweight and versatile design for secure aggregation in federated learning. Proc. Mach. Learn. Syst. 4, 694\u2013720 (2022)"},{"key":"5_CR38","unstructured":"Stevens, T., Skalka, C., Vincent, C., Ring, J., Clark, S., Near, J.: Efficient differentially private secure aggregation for federated learning via hardness of learning with errors. In: 31st USENIX Security Symposium (USENIX Security 2022), pp. 1379\u20131395 (2022)"},{"key":"5_CR39","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-031-18067-5_20","volume-title":"CSS 2022","author":"H Tian","year":"2022","unstructured":"Tian, H., Wen, Y., Zhang, F., Shao, Y., Li, B.: A distributed threshold additive homomorphic encryption for federated learning with dropout resiliency based on lattice. In: Chen, X., Shen, J., Susilo, W. (eds.) CSS 2022. LNCS, vol. 13547, pp. 277\u2013292. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-18067-5_20"},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Truex, S., et al.: A hybrid approach to privacy-preserving federated learning. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence And Security, pp. 1\u201311 (2019)","DOI":"10.1145\/3338501.3357370"},{"key":"5_CR41","unstructured":"Wen, Y., Geiping, J., Fowl, L., Goldblum, M., Goldstein, T.: Fishing for user data in large-batch federated learning via gradient magnification. arXiv preprint arXiv:2202.00580 (2022)"},{"key":"5_CR42","unstructured":"Xiao, H., Rasul, K., Vollgraf, R.: Fashion-MNIST: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747 (2017)"},{"key":"5_CR43","unstructured":"Xu, G., Li, G., Guo, S., Zhang, T., Li, H.: Privacy-preserving decentralized deep learning with multiparty homomorphic encryption. arXiv preprint arXiv:2207.04604 (2022)"},{"key":"5_CR44","doi-asserted-by":"publisher","first-page":"3185","DOI":"10.1109\/TCSVT.2023.3234278","volume":"33","author":"G Xu","year":"2023","unstructured":"Xu, G., Li, G., Guo, S., Zhang, T., Li, H.: Secure decentralized image classification with multiparty homomorphic encryption. IEEE Trans. Circuits Syst. Video Technol. 33, 3185\u20133198 (2023)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"5_CR45","unstructured":"Zhang, C., Li, S., Xia, J., Wang, W., Yan, F., Liu, Y.: $$\\{$$BatchCrypt$$\\}$$: efficient homomorphic encryption for $$\\{$$Cross-Silo$$\\}$$ federated learning. In: 2020 USENIX Annual Technical Conference (USENIX ATC 2020), pp. 493\u2013506 (2020)"},{"key":"5_CR46","doi-asserted-by":"publisher","first-page":"2864","DOI":"10.1109\/TNSE.2022.3185327","volume":"10","author":"L Zhang","year":"2022","unstructured":"Zhang, L., Xu, J., Vijayakumar, P., Sharma, P.K., Ghosh, U.: Homomorphic encryption-based privacy-preserving federated learning in IoT-enabled healthcare system. IEEE Trans. Netw. Sci. Eng. 10, 2864\u20132880 (2022)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"5_CR47","doi-asserted-by":"crossref","unstructured":"Zhao, B.Z.H., et al.: On the (in) feasibility of attribute inference attacks on machine learning models. In: 2021 IEEE European Symposium on Security and Privacy (EuroS &P). IEEE (2021)","DOI":"10.1109\/EuroSP51992.2021.00025"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3531-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T12:10:40Z","timestamp":1741867840000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3531-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819635306","9789819635313"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3531-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Network and System Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nss2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/nss-socialsec2024\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}