{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T18:46:24Z","timestamp":1770144384527,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819751006","type":"print"},{"value":"9789819751013","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5101-3_9","type":"book-chapter","created":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T18:01:46Z","timestamp":1720980106000},"page":"158-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["R-PPDFL: A Robust and\u00a0Privacy-Preserving Decentralized Federated Learning System"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1986-8267","authenticated-orcid":false,"given":"Tao","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6744-4752","authenticated-orcid":false,"given":"Xiaofen","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6165-4196","authenticated-orcid":false,"given":"Hong-Ning","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,15]]},"reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/978-3-030-57990-6_26","volume-title":"Security and Cryptography for Networks","author":"M Abdalla","year":"2020","unstructured":"Abdalla, M., Bourse, F., Marival, H., Pointcheval, D., Soleimanian, A., Waldner, H.: Multi-client inner-product functional encryption in the random-oracle model. In: Galdi, C., Kolesnikov, V. (eds.) SCN 2020. LNCS, vol. 12238, pp. 525\u2013545. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57990-6_26"},{"key":"9_CR2","unstructured":"Agency, X.N.: Data security law of the people\u2019s republic of China. https:\/\/www.gov.cn\/xinwen\/2021-06\/11\/content_5616919.htm"},{"key":"9_CR3","unstructured":"Agency, X.N.: Personal information protection law of the people\u2019s republic of China. https:\/\/www.gov.cn\/xinwen\/2021-08\/20\/content_5632486.htm"},{"key":"9_CR4","unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V.: How to backdoor federated learning. In: International Conference on Artificial Intelligence and Statistics, pp. 2938\u20132948. PMLR (2020)"},{"key":"9_CR5","unstructured":"Blanchard, P., El\u00a0Mhamdi, E.M., Guerraoui, R., Stainer, J.: Machine learning with adversaries: Byzantine tolerant gradient descent. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"key":"9_CR6","unstructured":"Fang, M., Cao, X., Jia, J., Gong, N.: Local model poisoning attacks to $$\\{$$Byzantine-Robust$$\\}$$ federated learning. In: 29th USENIX Security Symposium (USENIX Security 20), pp. 1605\u20131622 (2020)"},{"key":"9_CR7","unstructured":"Guerraoui, R., Rouault, S., et\u00a0al.: The hidden vulnerability of distributed learning in Byzantium. In: International Conference on Machine Learning, pp. 3521\u20133530. PMLR (2018)"},{"key":"9_CR8","unstructured":"IBM: 2023 privacy breach report. https:\/\/www.ibm.com\/cn-zh\/reports\/data-breach"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Kim, J., Ha, H., Chun, B.G., Yoon, S., Cha, S.K.: Collaborative analytics for data silos. In: 2016 IEEE 32nd International Conference on Data Engineering (ICDE), pp. 743\u2013754. IEEE (2016)","DOI":"10.1109\/ICDE.2016.7498286"},{"key":"9_CR10","unstructured":"Kone\u010dn\u1ef3, J., McMahan, H.B., Yu, F.X., Richt\u00e1rik, P., Suresh, A.T., Bacon, D.: Federated learning: strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)"},{"issue":"9","key":"9_CR11","doi-asserted-by":"publisher","first-page":"4423","DOI":"10.1007\/s00500-021-06496-5","volume":"26","author":"D Li","year":"2022","unstructured":"Li, D., et al.: Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey. Soft. Comput. 26(9), 4423\u20134440 (2022)","journal-title":"Soft. Comput."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Lian, Z., Su, C.: Decentralized federated learning for internet of things anomaly detection. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, pp. 1249\u20131251 (2022)","DOI":"10.1145\/3488932.3527285"},{"key":"9_CR13","unstructured":"Lyu, L., et al.: Privacy and robustness in federated learning: Attacks and defenses. IEEE Trans. Neural Netw. Learn. Syst., 1\u201321 (2022)"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/TIFS.2022.3169918","volume":"17","author":"Z Ma","year":"2022","unstructured":"Ma, Z., Ma, J., Miao, Y., Li, Y., Deng, R.H.: ShieldFL: mitigating model poisoning attacks in privacy-preserving federated learning. IEEE Trans. Inf. Forensics Secur. 17, 1639\u20131654 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR15","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., y\u00a0Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, pp. 1273\u20131282. PMLR (2017)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Melis, L., Song, C., De\u00a0Cristofaro, E., Shmatikov, V.: Exploiting unintended feature leakage in collaborative learning. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 691\u2013706. IEEE (2019)","DOI":"10.1109\/SP.2019.00029"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Voigt, P., Von\u00a0dem Bussche, A.: The eu general data protection regulation (gdpr). In: A Practical Guide, (1st edn.). Springer International Publishing, Cham 10(3152676), 10\u20135555 (2017)","DOI":"10.1007\/978-3-319-57959-7_1"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Wang, B., et al.: Neural cleanse: identifying and mitigating backdoor attacks in neural networks. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 707\u2013723. IEEE (2019)","DOI":"10.1109\/SP.2019.00031"},{"key":"9_CR20","unstructured":"Zhao, B., Mopuri, K.R., Bilen, H.: iDLG: improved deep leakage from gradients. arXiv preprint arXiv:2001.02610 (2020)"},{"key":"9_CR21","unstructured":"Zhu, L., Liu, Z., Han, S.: Deep leakage from gradients. In: Advances in Neural Information Processing Systems, vol. 32 (2019)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5101-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T18:03:18Z","timestamp":1720980198000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5101-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819751006","9789819751013"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5101-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"15 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACISP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Conference on Information Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acisp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.acisp24.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}