{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T04:16:41Z","timestamp":1775881001924,"version":"3.50.1"},"reference-count":142,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s10462-021-10098-w","type":"journal-article","created":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T04:14:27Z","timestamp":1636949667000},"page":"3569-3606","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Federated learning attack surface: taxonomy, cyber defences, challenges, and future directions"],"prefix":"10.1007","volume":"55","author":[{"given":"Attia","family":"Qammar","sequence":"first","affiliation":[]},{"given":"Jianguo","family":"Ding","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6413-193X","authenticated-orcid":false,"given":"Huansheng","family":"Ning","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"10098_CR1","doi-asserted-by":"publisher","unstructured":"Araki T, Furukawa J, Lindell Y, Nof A, Ohara K (2016) High-throughput semi-honest secure three-party computation with an honest majority. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, https:\/\/doi.org\/10.1145\/2976749.2978331","DOI":"10.1145\/2976749.2978331"},{"key":"10098_CR142","doi-asserted-by":"publisher","unstructured":"\u00c1cs G, Castelluccia C (2011) I have a DREAM! (DiffeRentially privatE smArt metering). In Information Hiding, pages 118\u2013132. Springer Berlin Heidelberg, https:\/\/doi.org\/10.1007\/978-3-642-24178-9_9","DOI":"10.1007\/978-3-642-24178-9_9"},{"key":"10098_CR2","unstructured":"Bagdasaryan E, Veit A, Hua Y, Estrin D, Shmatikov V (2020) How to backdoor federated learning. In International Conference on Artificial Intelligence and Statistics, pp 2938\u20132948. PMLR"},{"key":"10098_CR3","unstructured":"Baruch M, Baruch G, Goldberg Y (2019) A little is enough: Circumventing defenses for distributed learning. arXiv preprint arXiv:1902.06156"},{"key":"10098_CR4","doi-asserted-by":"publisher","unstructured":"Berlioz A, Friedman A, Kaafar MA, Boreli R, Berkovsky S (2015) Applying differential privacy to matrix factorization. In Proceedings of the 9th ACM Conference on Recommender Systems. ACM, https:\/\/doi.org\/10.1145\/2792838.2800173","DOI":"10.1145\/2792838.2800173"},{"issue":"1","key":"10098_CR5","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MSEC.2020.3037619","volume":"19","author":"E Bertino","year":"2021","unstructured":"Bertino E (2021) Attacks on artificial intelligence [last word]. IEEE Secur Privacy 19(1):103\u2013104","journal-title":"IEEE Secur Privacy"},{"key":"10098_CR6","unstructured":"Bhagoji AN, Chakraborty S, Mittal P, Calo S (2019) Analyzing federated learning through an adversarial lens. In International Conference on Machine Learning, pp 634\u2013643. PMLR"},{"key":"10098_CR7","unstructured":"Bhowmick A, Duchi J, Freudiger J, Kapoor G, Rogers R (2018) Protection against reconstruction and its applications in private federated learning. arXiv preprint arXiv:1812.00984"},{"key":"10098_CR8","unstructured":"Blanchard P, Mhamdi EM, Guerraoui R, Stainer J (2017) Machine learning with adversaries: Byzantine tolerant gradient descent. In Proceedings of the 31st International Conference on Neural Information Processing Systems, pp 118\u2013128"},{"key":"10098_CR9","unstructured":"Bommasani R, Hudson DA, Adeli E, Altman R, Arora S, von Arx S, Bernstein MS, Bohg J, Bosselut A, Brunskill E, Brynjolfsson E et\u00a0al. (2021) On the opportunities and risks of foundation models. arXiv preprint arXiv:2108.07258"},{"key":"10098_CR10","unstructured":"Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2016) Practical secure aggregation for federated learning on user-held data. arXiv preprint arXiv:1611.04482"},{"key":"10098_CR11","doi-asserted-by":"publisher","unstructured":"Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM.https:\/\/doi.org\/10.1145\/3133956.3133982","DOI":"10.1145\/3133956.3133982"},{"key":"10098_CR12","unstructured":"CPRA (2020) California privacy rights act, https:\/\/www.caprivacy.org\/"},{"key":"10098_CR13","unstructured":"Caldas S, Duddu Sai MK, Wu P, Li T, Kone\u010dn\u1ef3 J, McMahan HB, Smith V, Talwalkar A (2018) Leaf: A benchmark for federated settings. arXiv preprint arXiv:1812.01097"},{"key":"10098_CR14","doi-asserted-by":"crossref","unstructured":"Cao X, Fang M, Liu J, Gong NZ (2020) Fltrust: Byzantine-robust federated learning via trust bootstrapping. arXiv preprint arXiv:2012.13995","DOI":"10.14722\/ndss.2021.24434"},{"key":"10098_CR15","doi-asserted-by":"publisher","unstructured":"Chai D, Wang L, Chen K, Yang Q (2020) Secure federated matrix factorization. IEEE Intelligent Systems, https:\/\/doi.org\/10.1109\/mis.2020.3014880","DOI":"10.1109\/mis.2020.3014880"},{"key":"10098_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ins.2020.02.037","volume":"522","author":"Y Chen","year":"2020","unstructured":"Chen Y, Luo F, Li T, Xiang T, Liu Z, Li J (2020) A training-integrity privacy-preserving federated learning scheme with trusted execution environment. Inf Sci 522:69\u201379. https:\/\/doi.org\/10.1016\/j.ins.2020.02.037","journal-title":"Inf Sci"},{"issue":"4","key":"10098_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/mis.2020.2988604","volume":"35","author":"Y Chen","year":"2020","unstructured":"Chen Y, Qin X, Wang J, Chaohui Yu, Gao W (2020) FedHealth: A federated transfer learning framework for wearable healthcare. IEEE Intell Syst 35(4):83\u201393. https:\/\/doi.org\/10.1109\/mis.2020.2988604","journal-title":"IEEE Intell Syst"},{"key":"10098_CR18","doi-asserted-by":"publisher","unstructured":"Chen J, Zhang J, Zhao Y, Han H, Zhu K, Chen B (2020) Beyond model-level membership privacy leakage: an adversarial approach in federated learning. In 2020 29th International Conference on Computer Communications and Networks (ICCCN). IEEE, https:\/\/doi.org\/10.1109\/icccn49398.2020.9209744","DOI":"10.1109\/icccn49398.2020.9209744"},{"issue":"12","key":"10098_CR19","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/3387107","volume":"63","author":"Y Cheng","year":"2020","unstructured":"Cheng Y, Liu Y, Chen T, Yang Q (2020) Federated learning for privacy-preserving AI. Commun ACM 63(12):33\u201336. https:\/\/doi.org\/10.1145\/3387107","journal-title":"Commun ACM"},{"key":"10098_CR20","unstructured":"Cheng K, Fan T, Jin Y, Liu Y, Chen T, Papadopoulos D, Yang Q (2019) Secureboost: A lossless federated learning framework. arXiv preprint arXiv:1901.08755"},{"issue":"5","key":"10098_CR21","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1016\/j.clsr.2013.07.010","volume":"29","author":"WB Chik","year":"2013","unstructured":"Chik WB (2013) The singapore personal data protection act and an assessment of future trends in data privacy reform. Comput Law Secur Rev 29(5):554\u2013575. https:\/\/doi.org\/10.1016\/j.clsr.2013.07.010","journal-title":"Comput Law Secur Rev"},{"key":"10098_CR22","doi-asserted-by":"crossref","unstructured":"Cohen G, Afshar S, Tapson J, Van Schaik A (2017) Emnist: Extending mnist to handwritten letters. In 2017 International Joint Conference on Neural Networks (IJCNN), pages 2921\u20132926. IEEE","DOI":"10.1109\/IJCNN.2017.7966217"},{"key":"10098_CR23","doi-asserted-by":"publisher","unstructured":"Developers TensorFlow (2021) Tensorflow. https:\/\/doi.org\/10.5281\/ZENODO.4724125","DOI":"10.5281\/ZENODO.4724125"},{"key":"10098_CR24","unstructured":"Dua D, Graff C (2017) Machine learning repository, URL: http:\/\/archive.ics.uci.edu\/ml\/index.php"},{"key":"10098_CR25","unstructured":"El Mhamdi EM, Guerraoui R, Rouault SL (2018) The hidden vulnerability of distributed learning in byzantium. arXiv preprint arXiv:1802.07927"},{"key":"10098_CR26","unstructured":"FATE (2021) An industrial gradefederated learning framework, URL: https:\/\/fate.fedai.org\/"},{"key":"10098_CR27","unstructured":"Fang M, Cao J, Jia J, Gong N (2020) Local model poisoning attacks to byzantine-robust federated learning. In 29th USENIX Security Symposium (USENIX Security 20), pp 1605\u20131622"},{"key":"10098_CR28","unstructured":"FeatureCloud (2021) Transforming health care and medical research with federated learning, URL: https:\/\/featurecloud.eu\/about\/our-vision\/"},{"key":"10098_CR29","unstructured":"FedAI (2020) Webank and swiss re signed cooperation mou, URL: https:\/\/www.fedai.org\/news\/webank-and-swiss-re-signed-cooperation-mou\/"},{"issue":"5","key":"10098_CR30","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/jsac.2006.872882","volume":"24","author":"M Feldman","year":"2006","unstructured":"Feldman M, Papadimitriou C, Chuang J, Stoica I (2006) Free-riding and whitewashing in peer-to-peer systems. IEEE J Sel Areas Commun 24(5):1010\u20131019. https:\/\/doi.org\/10.1109\/jsac.2006.872882","journal-title":"IEEE J Sel Areas Commun"},{"key":"10098_CR31","doi-asserted-by":"publisher","unstructured":"Fernandes K, Vinagre P, Cortez P (2015) A proactive intelligent decision support system for predicting the popularity of online news. In Progress in Artificial Intelligence, pages 535\u2013546. Springer International Publishing, https:\/\/doi.org\/10.1007\/978-3-319-23485-4_53","DOI":"10.1007\/978-3-319-23485-4_53"},{"key":"10098_CR32","unstructured":"Fraboni Y, Vidal R, Lorenzi M (2021) Free-rider attacks on model aggregation in federated learning. In International Conference on Artificial Intelligence and Statistics, pp 1846\u20131854. PMLR"},{"key":"10098_CR33","doi-asserted-by":"publisher","unstructured":"Fredrikson M, Jha S, Ristenpart T (2015) Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM. https:\/\/doi.org\/10.1145\/2810103.2813677","DOI":"10.1145\/2810103.2813677"},{"key":"10098_CR34","unstructured":"Fu S, Xie C, Li B, Chen Q (2019) Attack-resistant federated learning with residual-based reweighting. arXiv preprint arXiv:1912.11464"},{"key":"10098_CR35","unstructured":"Fung C, Yoon CJM, Beschastnikh I (2020) The limitations of federated learning in sybil settings. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses ($$\\{$$RAID$$\\}$$2020), pp 301\u2013316"},{"key":"10098_CR36","unstructured":"Fung C, Yoon CJ, Beschastnikh I (2018) Mitigating sybils in federated learning poisoning. arXiv preprint arXiv:1808.04866"},{"key":"10098_CR37","unstructured":"Geyer Robin\u00a0C, Klein Tassilo, Nabi Moin (2017) Differentially private federated learning: A client level perspective. arxiv preprint arXiv:1712.07557"},{"key":"10098_CR38","doi-asserted-by":"crossref","unstructured":"Goodfellow IJ, Erhan D, Carrier PL, Courville A, Mirza M, Hamner B, Cukierski W, Tang Y, Thaler D, Lee DH, Zhou Y et\u00a0al. (2013) Challenges in representation learning: A report on three machine learning contests. In International conference on neural information processing, pp 117\u2013124. Springer","DOI":"10.1007\/978-3-642-42051-1_16"},{"key":"10098_CR39","unstructured":"Google BigQuery (2017) Reddit dataset, URL: https:\/\/www.reddit.com\/r\/bigquery\/wiki\/datasets"},{"key":"10098_CR40","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1109\/tifs.2019.2929409","volume":"15","author":"X Guowen","year":"2020","unstructured":"Guowen X, Li H, Liu S, Yang K, Lin X (2020) VerifyNet: Secure and verifiable federated learning. IEEE Trans Inf Forensics Secur 15:911\u2013926. https:\/\/doi.org\/10.1109\/tifs.2019.2929409","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10098_CR41","unstructured":"Hahn SJ, Lee J (2020) Graffl: Gradient-free federated learning of a bayesian generative model. arXiv preprint arXiv:2008.12925"},{"key":"10098_CR42","unstructured":"Hardy S, Henecka W, Ivey-Law H, Nock R, Patrini G, Smith G, Thorne B (2017) Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677"},{"key":"10098_CR43","doi-asserted-by":"crossref","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770\u2013778","DOI":"10.1109\/CVPR.2016.90"},{"key":"10098_CR44","doi-asserted-by":"publisher","unstructured":"He Z, Zhang T, Lee RB (2019) Model inversion attacks against collaborative inference. In Proceedings of the 35th Annual Computer Security Applications Conference. ACM, https:\/\/doi.org\/10.1145\/3359789.3359824","DOI":"10.1145\/3359789.3359824"},{"key":"10098_CR45","doi-asserted-by":"publisher","unstructured":"Hitaj B, Ateniese G, Perez-Cruz F (2017) Deep models under the GAN. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, https:\/\/doi.org\/10.1145\/3133956.3134012","DOI":"10.1145\/3133956.3134012"},{"key":"10098_CR46","first-page":"1","volume-title":"Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy","author":"W House","year":"2012","unstructured":"House W (2012) Consumer data privacy in a networked world: A framework for protecting privacy and promoting innovation in the global digital economy. White House, Washington, DC, pp 1\u201362"},{"key":"10098_CR47","unstructured":"Huang W, Li T, Wang D, Du S, Zhang J (2020) Fairness and accuracy in federated learning. arXiv preprint arXiv:2012.10069"},{"key":"10098_CR48","doi-asserted-by":"publisher","unstructured":"Huang L, Joseph AD, Nelson B, Rubinstein BIP, Tygar JD (2011) Adversarial machine learning. In Proceedings of the 4th ACM workshop on Security and artificial intelligence - AISec \u201911. ACM Press, https:\/\/doi.org\/10.1145\/2046684.2046692","DOI":"10.1145\/2046684.2046692"},{"issue":"1","key":"10098_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41666-020-00082-4","volume":"5","author":"X Jie","year":"2020","unstructured":"Jie X, Glicksberg BS, Chang S, Walker P, Bian J, Wang F (2020) Federated learning for healthcare informatics. J Healthcare Informatics Res 5(1):1\u201319. https:\/\/doi.org\/10.1007\/s41666-020-00082-4","journal-title":"J Healthcare Informatics Res"},{"key":"10098_CR50","unstructured":"Kaggle (2013) Acquire valued shoppers challenge, URL: https:\/\/www.kaggle.com\/c\/acquire-valued-shoppers-challenge\/data"},{"key":"10098_CR51","unstructured":"Kairouz P, McMahan HB, Avent B, Bellet A, Bennis M, Bhagoji AN, Bonawitz K, Charles Z, Cormode G, Cummings R et\u00a0al. (2019) Advances and open problems in federated learning. arXiv preprint arXiv:1912.04977"},{"key":"10098_CR52","doi-asserted-by":"publisher","unstructured":"Kang J, Xiong Z, Niyato D, Yu H, Liang YC, Kim DI (2019) Incentive design for efficient federated learning in mobile networks: A contract theory approach. In 2019 IEEE VTS Asia Pacific Wireless Communications Symposium (APWCS). IEEE, https:\/\/doi.org\/10.1109\/vts-apwcs.2019.8851649","DOI":"10.1109\/vts-apwcs.2019.8851649"},{"key":"10098_CR53","unstructured":"Kanwendy. Lending club loan data, 2019. URL: https:\/\/www.kaggle.com\/wendykan\/lending-club-loan-data"},{"key":"10098_CR54","unstructured":"Karimireddy SP, Jaggi M, Kale S, Mohri M, Reddi SJ, Stich SU, Suresh AT (2020) Mime: Mimicking centralized stochastic algorithms in federated learning. arXiv preprint arXiv:2008.03606"},{"key":"10098_CR55","doi-asserted-by":"publisher","unstructured":"Khazbak Y, Tan T, Cao G (2020) MLGuard: Mitigating poisoning attacks in privacy preserving distributed collaborative learning. In 2020 29th International Conference on Computer Communications and Networks (ICCCN). IEEE, https:\/\/doi.org\/10.1109\/icccn49398.2020.9209670","DOI":"10.1109\/icccn49398.2020.9209670"},{"key":"10098_CR56","doi-asserted-by":"publisher","unstructured":"Kim S, Kim J, Koo D, Kim Y, Yoon H, Shin J (2016) Efficient privacy-preserving matrix factorization via fully homomorphic encryption. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, https:\/\/doi.org\/10.1145\/2897845.2897875","DOI":"10.1145\/2897845.2897875"},{"issue":"8","key":"10098_CR57","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/mc.2009.263","volume":"42","author":"Y Koren","year":"2009","unstructured":"Koren Y, Bell R, Volinsky C (2009) Matrix factorization techniques for recommender systems. Computer 42(8):30\u201337. https:\/\/doi.org\/10.1109\/mc.2009.263","journal-title":"Computer"},{"key":"10098_CR58","unstructured":"Krizhevsky Alex, Hinton Geoffrey, et\u00a0al. (2009) Learning multiple layers of features from tiny images"},{"key":"10098_CR59","unstructured":"Kuchler H (2019) Pharma groups combine to promote drug discovery with ai, URL: https:\/\/www.ft.com\/content\/ef7be832-86d0-11e9-a028-86cea8523dc2"},{"issue":"11","key":"10098_CR60","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y Lecun","year":"1998","unstructured":"Lecun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324. https:\/\/doi.org\/10.1109\/5.726791","journal-title":"Proc IEEE"},{"issue":"1","key":"10098_CR61","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/mnet.2018.1700202","volume":"32","author":"H Li","year":"2018","unstructured":"Li H, Ota K, Dong M (2018) Learning IoT in edge: Deep learning for the internet of things with edge computing. IEEE Network 32(1):96\u2013101. https:\/\/doi.org\/10.1109\/mnet.2018.1700202","journal-title":"IEEE Network"},{"issue":"3","key":"10098_CR62","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/msp.2020.2975749","volume":"37","author":"T Li","year":"2020","unstructured":"Li T, Sahu AK, Talwalkar A, Smith V (2020) IEEE Signal Process Mag. Federated learning: challenges, methods, and future directions. 37(3):50\u201360. https:\/\/doi.org\/10.1109\/msp.2020.2975749","journal-title":"Federated learning: challenges, methods, and future directions."},{"issue":"3","key":"10098_CR63","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/mce.2019.2959108","volume":"9","author":"Z Li","year":"2020","unstructured":"Li Z, Sharma V, Mohanty SP (2020) Preserving data privacy via federated learning: Challenges and solutions. IEEE Consumer Electron Mag 9(3):8\u201316. https:\/\/doi.org\/10.1109\/mce.2019.2959108","journal-title":"IEEE Consumer Electron Mag"},{"key":"10098_CR64","doi-asserted-by":"publisher","first-page":"1544","DOI":"10.1609\/aaai.v33i01.33011544","volume":"33","author":"L Li","year":"2019","unstructured":"Li L, Wei X, Chen T, Giannakis GB, Ling Q (2019) RSA: Byzantine-robust stochastic aggregation methods for distributed learning from heterogeneous datasets. Proceed AAAI Conf Artif Intell 33:1544\u20131551. https:\/\/doi.org\/10.1609\/aaai.v33i01.33011544","journal-title":"Proceed AAAI Conf Artif Intell"},{"key":"10098_CR65","doi-asserted-by":"publisher","unstructured":"Li Q, Zhu W, Wu C, Pan X, Yang F, Zhou Y, Zhang Y (2020) InvisibleFL: Federated learning over non-informative intermediate updates against multimedia privacy leakages. In Proceedings of the 28th ACM International Conference on Multimedia. ACM, https:\/\/doi.org\/10.1145\/3394171.3413923","DOI":"10.1145\/3394171.3413923"},{"key":"10098_CR66","unstructured":"Li S, Cheng Y, Liu Y, Wang W, Chen T (2019) Abnormal client behavior detection in federated learning. arXiv preprint arXiv:1910.09933"},{"key":"10098_CR67","unstructured":"Li T, Sahu AK, Zaheer M, Sanjabi M, Talwalkar A, Smith V (2018) Federated optimization in heterogeneous networks. arXiv preprint arXiv:1812.06127"},{"key":"10098_CR68","doi-asserted-by":"publisher","unstructured":"Lim HK, Kim JB, Kim CM, Hwang GY, Choi HB, Han YH (2020) Federated reinforcement learning for controlling multiple rotary inverted pendulums in edge computing environments. In 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC). IEEE. https:\/\/doi.org\/10.1109\/icaiic48513.2020.9065233","DOI":"10.1109\/icaiic48513.2020.9065233"},{"key":"10098_CR69","unstructured":"Lin J, Du M, Liu J (2019) Free-riders in federated learning: Attacks and defenses. arXiv preprint arXiv:1911.12560"},{"key":"10098_CR70","unstructured":"Lin Y, Han S, Mao H, Wang Y, Dally WJ (2017) Deep gradient compression: Reducing the communication bandwidth for distributed training. arXiv preprint arXiv:1712.01887"},{"issue":"08","key":"10098_CR71","doi-asserted-by":"publisher","first-page":"13172","DOI":"10.1609\/aaai.v34i08.7021","volume":"34","author":"Y Liu","year":"2020","unstructured":"Liu Y, Huang A, Luo Y, Huang H, Liu Y, Chen Y, Feng L, Chen T, Han Yu, Yang Q (2020) FedVision: An online visual object detection platform powered by federated learning. Proceed AAAI Conf Artif Intell 34(08):13172\u201313179. https:\/\/doi.org\/10.1609\/aaai.v34i08.7021","journal-title":"Proceed AAAI Conf Artif Intell"},{"issue":"4","key":"10098_CR72","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/mis.2020.2988525","volume":"35","author":"Y Liu","year":"2020","unstructured":"Liu Y, Kang Y, Xing C, Chen T, Yang Q (2020) A secure federated transfer learning framework. IEEE Intell Syst 35(4):70\u201382. https:\/\/doi.org\/10.1109\/mis.2020.2988525","journal-title":"IEEE Intell Syst"},{"key":"10098_CR73","doi-asserted-by":"publisher","unstructured":"Long G, Tan Y, Jiang J, Zhang C (2020) Federated learning for open banking. In Lecture Notes in Computer Science, pages 240\u2013254. Springer International Publishing, https:\/\/doi.org\/10.1007\/978-3-030-63076-8_17","DOI":"10.1007\/978-3-030-63076-8_17"},{"key":"10098_CR74","doi-asserted-by":"crossref","unstructured":"Luo X, Wu Y, Xiao X, Ooi BC (2020) Feature inference attack on model predictions in vertical federated learning. arXiv preprint arXiv:2010.10152","DOI":"10.1109\/ICDE51399.2021.00023"},{"key":"10098_CR75","unstructured":"Luo X , Zhu X (2020) Exploiting defenses against gan-based feature inference attacks in federated learning. arXiv preprint arXiv:2004.12571"},{"key":"10098_CR76","doi-asserted-by":"publisher","unstructured":"Lyu L, Yu H, Ma X, Sun L, Zhao J, Yang Q, Yu PS (2020) Threats to federated learning. In Lecture Notes in Computer Science, pages 3\u201316. Springer International Publishing, https:\/\/doi.org\/10.1007\/978-3-030-63076-8_1","DOI":"10.1007\/978-3-030-63076-8_1"},{"issue":"4","key":"10098_CR77","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1109\/mnet.001.1900506","volume":"34","author":"C Ma","year":"2020","unstructured":"Ma C, Li J, Ding M, Yang HH, Shu F, Quek TQS, Vincent Poor H (2020) On safeguarding privacy and security in the framework of federated learning. IEEE Network 34(4):242\u2013248. https:\/\/doi.org\/10.1109\/mnet.001.1900506","journal-title":"IEEE Network"},{"key":"10098_CR78","doi-asserted-by":"crossref","unstructured":"Ma Y, Zhu X, Hsu J (2019) Data poisoning against differentially-private learners: Attacks and defenses. arXiv preprint arXiv:1903.09860","DOI":"10.24963\/ijcai.2019\/657"},{"key":"10098_CR79","unstructured":"Mallah RA, Lopez D, Farooq B (2021) Untargeted poisoning attack detection in federated learning via behavior attestation. arXiv preprint arXiv:2101.10904"},{"key":"10098_CR80","unstructured":"McMahan HB, Ramage D, Talwar K, Zhang L (2017) Learning differentially private recurrent language models. arXiv preprint arXiv:1710.06963"},{"key":"10098_CR81","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics, pages 1273\u20131282. PMLR"},{"key":"10098_CR82","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y Arcas BA (2016) Federated learning of deep networks using model averaging. arXiv preprint arXiv:1602.05629"},{"key":"10098_CR83","doi-asserted-by":"publisher","unstructured":"Melis L, Song C, De Cristofaro E, Shmatikov V (2019) Exploiting unintended feature leakage in collaborative learning. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, https:\/\/doi.org\/10.1109\/sp.2019.00029","DOI":"10.1109\/sp.2019.00029"},{"key":"10098_CR84","doi-asserted-by":"crossref","unstructured":"Mo F, Haddadi H, Katevas K, Marin E, Perino D, Kourtellis N (2021) Ppfl: Privacy-preserving federated learning with trusted execution environments. arXiv preprint arXiv:2104.14380","DOI":"10.1145\/3458864.3466628"},{"key":"10098_CR85","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.dss.2014.03.001","volume":"62","author":"S Moro","year":"2014","unstructured":"Moro S, Cortez P, Rita P (2014) A data-driven approach to predict the success of bank telemarketing. Decis Support Syst 62:22\u201331. https:\/\/doi.org\/10.1016\/j.dss.2014.03.001","journal-title":"Decis Support Syst"},{"key":"10098_CR86","unstructured":"Musketeer. Smart manufacturing and health care, 2020. URL: https:\/\/musketeer.eu\/project\/"},{"key":"10098_CR87","doi-asserted-by":"publisher","unstructured":"Nadiger C, Kumar A, Abdelhak S (2019) Federated reinforcement learning for fast personalization. In 2019 IEEE Second International Conference on Artificial Intelligence and Knowledge Engineering (AIKE). IEEE, https:\/\/doi.org\/10.1109\/aike.2019.00031","DOI":"10.1109\/aike.2019.00031"},{"key":"10098_CR88","unstructured":"Naseri M, Hayes J, Emiliano DC (2020) Toward robustness and privacy in federated learning: Experimenting with local and central differential privacy. arXiv preprint arXiv:2009.03561"},{"key":"10098_CR89","doi-asserted-by":"publisher","unstructured":"Nasr M, Shokri R, Houmansadr A (2019) Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE. https:\/\/doi.org\/10.1109\/sp.2019.00065","DOI":"10.1109\/sp.2019.00065"},{"key":"10098_CR90","unstructured":"Nguyen TD, Rieger P, Yalame H, Mollering H, Fereidooni H, Marchal S, Miettinen M, Mirhoseini A, Sadeghi AR, Schneider T et\u00a0al. (2021) Flguard: Secure and private federated learning. arXiv preprint arXiv:2101.02281"},{"key":"10098_CR91","doi-asserted-by":"publisher","unstructured":"Nilsson A, Smith S, Gustavsson E, Jirstrand M (2018) A performance evaluation of federated learning algorithms. In Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning. ACM, https:\/\/doi.org\/10.1145\/3286490.3286559","DOI":"10.1145\/3286490.3286559"},{"key":"10098_CR92","doi-asserted-by":"publisher","unstructured":"Nishio T, Yonetani R (2019) Client selection for federated learning with heterogeneous resources in mobile edge. In ICC 2019 - 2019 IEEE International Conference on Communications (ICC). IEEE, https:\/\/doi.org\/10.1109\/icc.2019.8761315","DOI":"10.1109\/icc.2019.8761315"},{"key":"10098_CR93","unstructured":"Nock R, Hardy S, Henecka W, Ivey-Law H, Patrini G, Smith G, Thorne B (2018) Entity resolution and federated learning get a federated resolution. arXiv preprint arXiv:1803.04035"},{"key":"10098_CR94","unstructured":"OpenMined (2021) Let\u2019s solve privacy, URL: https:\/\/www.openmined.org\/"},{"key":"10098_CR95","unstructured":"Owkin. Federated learning, 2021. URL: https:\/\/owkin.com\/federated-learning\/"},{"key":"10098_CR96","unstructured":"O\u2019Driscoll A (2021) 30+ data breach statistics and facts, https:\/\/www.comparitech.com\/blog\/vpn-privacy\/data-breach-statistics-facts\/"},{"key":"10098_CR97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7","volume-title":"The EU General data protection regulation (GDPR)","author":"V Paul","year":"2017","unstructured":"Paul V, von dem Axel B (2017) The EU General data protection regulation (GDPR). Springer International Publishing, Berlin. https:\/\/doi.org\/10.1007\/978-3-319-57959-7"},{"issue":"5","key":"10098_CR98","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/tifs.2017.2787987","volume":"13","author":"LT Phong","year":"2018","unstructured":"Phong LT, Aono Y, Hayashi T, Wang L, Moriai S (2018) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inf Forensics Secur 13(5):1333\u20131345. https:\/\/doi.org\/10.1109\/tifs.2017.2787987","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"10098_CR99","doi-asserted-by":"crossref","unstructured":"Pustozerova A, Mayer R (2020) Information leaks in federated learning. In Proceedings of the Network and Distributed System Security Symposium","DOI":"10.14722\/diss.2020.23004"},{"key":"10098_CR100","doi-asserted-by":"publisher","first-page":"109986","DOI":"10.1109\/ACCESS.2021.3101579","volume":"9","author":"P Radanliev","year":"2021","unstructured":"Radanliev P, De Roure D (2021) Review of algorithms for artificial intelligence on low memory devices. IEEE Access 9:109986\u2013109993","journal-title":"IEEE Access"},{"key":"10098_CR101","doi-asserted-by":"crossref","unstructured":"Radanliev P, De Roure D, Burnap P, Santos O (2021) Epistemological equation for analysing uncontrollable states in complex systems: Quantifying cyber risks from the internet of things. The Review of Socionetwork Strategies, pp 1\u201331","DOI":"10.1007\/s12626-021-00086-5"},{"key":"10098_CR102","unstructured":"Richardson A, Filos-Ratsikas A, Faltings B (2019) Rewarding high-quality data via influence functions. arXiv preprint arXiv:1908.11598"},{"issue":"2","key":"10098_CR103","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1109\/tcomm.2019.2956472","volume":"68","author":"S Samarakoon","year":"2020","unstructured":"Samarakoon S, Bennis M, Saad W, Debbah M (2020) Distributed federated learning for ultra-reliable low-latency vehicular communications. IEEE Trans Commun 68(2):1146\u20131159. https:\/\/doi.org\/10.1109\/tcomm.2019.2956472","journal-title":"IEEE Trans Commun"},{"key":"10098_CR104","doi-asserted-by":"publisher","unstructured":"Samaria FS, Harter AC (1994) Parameterisation of a stochastic model for human face identification. In Proceedings of 1994 IEEE Workshop on Applications of Computer Vision. IEEE Comput Soc Press https:\/\/doi.org\/10.1109\/acv.1994.341300","DOI":"10.1109\/acv.1994.341300"},{"key":"10098_CR105","unstructured":"Satariano A (2019) Google is fined 57 million under europe\u2019s data privacy law URL: https:\/\/www.nytimes.com\/2019\/01\/21\/technology\/google-europe-gdpr-fine.html"},{"key":"10098_CR106","unstructured":"Sherpa.ai. (2021) We research and build artificial intelligence technology and services, URL: https:\/\/sherpa.ai\/"},{"key":"10098_CR107","doi-asserted-by":"crossref","unstructured":"Shokri R, Stronati M, Song C, Shmatikov V (2017) Membership inference attacks against machine learning models. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE","DOI":"10.1109\/SP.2017.41"},{"key":"10098_CR108","unstructured":"Smith SL, Kindermans PJ, Ying C, Le QV (2017) Don\u2019t decay the learning rate, increase the batch size. arXiv preprint arXiv:1711.00489"},{"key":"10098_CR109","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2020.3041404","author":"J So","year":"2020","unstructured":"So J, Guler B, Avestimehr AS (2020) Byzantine-resilient secure federated learning. IEEE J Sel Areas Commun. https:\/\/doi.org\/10.1109\/jsac.2020.3041404","journal-title":"IEEE J Sel Areas Commun"},{"key":"10098_CR110","doi-asserted-by":"publisher","unstructured":"Song M, Wang Z, Zhang Z, Song Y, Wang Q, Ren J, Qi H (2019) Beyond inferring class representatives: User-level privacy leakage from federated learning. In IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. IEEE, https:\/\/doi.org\/10.1109\/infocom.2019.8737416","DOI":"10.1109\/infocom.2019.8737416"},{"key":"10098_CR111","unstructured":"Stich SU (2018) Local sgd converges fast and communicates little. arXiv preprint arXiv:1805.09767"},{"key":"10098_CR112","doi-asserted-by":"publisher","unstructured":"Subramanyan P, Sinha R, Lebedev I, Devadas S, Seshia SA (2017) A formal foundation for secure remote execution of enclaves. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, https:\/\/doi.org\/10.1145\/3133956.3134098","DOI":"10.1145\/3133956.3134098"},{"key":"10098_CR113","unstructured":"Sun Z, Kairouz P, Suresh AT, McMahan HB (2019) Can you really backdoor federated learning? arXiv preprint arXiv:1911.07963"},{"key":"10098_CR114","doi-asserted-by":"publisher","unstructured":"Tan K, Bremner D, Le Kernec J , Imran M (2020) Federated machine learning in vehicular networks: A summary of recent applications. In 2020 International Conference on UK-China Emerging Technologies (UCET). IEEE, https:\/\/doi.org\/10.1109\/ucet51115.2020.9205482","DOI":"10.1109\/ucet51115.2020.9205482"},{"key":"10098_CR115","doi-asserted-by":"publisher","unstructured":"Tolpegin V, Truex S, Gursoy ME, Liu L (2020) Data poisoning attacks against federated learning systems. In Computer Security \u2013 ESORICS 2020, pages 480\u2013501. Springer International Publishing. https:\/\/doi.org\/10.1007\/978-3-030-58951-6_24","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"10098_CR116","doi-asserted-by":"publisher","unstructured":"Truex S, Liu L, Chow K-H, Gursoy ME, Wei W (2020) LDP-fed. In Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking. ACM, https:\/\/doi.org\/10.1145\/3378679.3394533","DOI":"10.1145\/3378679.3394533"},{"key":"10098_CR117","doi-asserted-by":"publisher","unstructured":"Truex S, Liu L, Gursoy ME, Yu L, Wei W (2019) Demystifying membership inference attacks in machine learning as a service. IEEE Transactions on Services Computing, pages 1\u20131.https:\/\/doi.org\/10.1109\/tsc.2019.2897554","DOI":"10.1109\/tsc.2019.2897554"},{"issue":"1","key":"10098_CR118","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/sdata.2018.161","volume":"5","author":"P Tschandl","year":"2018","unstructured":"Tschandl P, Rosendahl C, Kittler H (2018) The ham10000 dataset, a large collection of multi-source dermatoscopic images of common pigmented skin lesions. Scientif Data 5(1):1\u20139","journal-title":"Scientif Data"},{"issue":"3","key":"10098_CR119","doi-asserted-by":"publisher","first-page":"2432","DOI":"10.1016\/j.eswa.2010.08.032","volume":"38","author":"Y-M Tseng","year":"2011","unstructured":"Tseng Y-M, Chen F-G (2011) A free-rider aware reputation system for peer-to-peer file-sharing networks. Expert Syst Appl 38(3):2432\u20132440. https:\/\/doi.org\/10.1016\/j.eswa.2010.08.032","journal-title":"Expert Syst Appl"},{"key":"10098_CR120","unstructured":"Wang H (2019) Baidu paddlepaddle releases 21 new capabilities to accelerate industry-grade model development, URL: http:\/\/research.baidu.com\/Blog\/index-view?id=126"},{"key":"10098_CR121","unstructured":"Wang H, Yurochkin M, Sun Y, Papailiopoulos D, Khazaeni Y (2020) Federated learning with matched averaging. arXiv preprint arXiv:2002.06440"},{"key":"10098_CR122","unstructured":"Wang L, Xu S, Wang X, Zhu Q (2019) Eavesdrop the composition proportion of training labels in federated learning. arXiv preprint arXiv:1910.06044"},{"issue":"3","key":"10098_CR123","doi-asserted-by":"publisher","first-page":"819","DOI":"10.2298\/csis190923022o","volume":"17","author":"O Wei","year":"2020","unstructured":"Wei O, Zeng J, Guo Z, Yan W, Liu D, Fuentes S (2020) A homomorphic-encryption-based vertical federated learning scheme for rick management. Comput Sci Inf Syst 17(3):819\u2013834. https:\/\/doi.org\/10.2298\/csis190923022o","journal-title":"Comput Sci Inf Syst"},{"key":"10098_CR124","doi-asserted-by":"publisher","unstructured":"Wu D, Pan M, Xu Z, Zhang Y, Han Z (2020) Towards efficient secure aggregation for model update in federated learning. In GLOBECOM 2020 - 2020 IEEE Global Communications Conference. IEEE, https:\/\/doi.org\/10.1109\/globecom42002.2020.9347960","DOI":"10.1109\/globecom42002.2020.9347960"},{"key":"10098_CR125","unstructured":"Xiao H, Rasul K, Vollgraf R (2017) Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747"},{"key":"10098_CR126","unstructured":"Xie C, Huang K, Chen PY, Li B (2019) Dba: Distributed backdoor attacks against federated learning. In International Conference on Learning Representations"},{"key":"10098_CR127","unstructured":"Xu X, Lyu L (2020) Towards building a robust and fair federated learning system. arXiv preprint arXiv:2011.10464"},{"key":"10098_CR128","doi-asserted-by":"publisher","unstructured":"Xu R, Baracaldo N, Zhou Y, Anwar A, Ludwig H (2019) HybridAlpha. In Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security - AISec\u201919. ACM Press, https:\/\/doi.org\/10.1145\/3338501.3357371","DOI":"10.1145\/3338501.3357371"},{"issue":"2","key":"10098_CR129","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning. ACM Trans Intell Syst Technol 10(2):1\u201319. https:\/\/doi.org\/10.1145\/3298981","journal-title":"ACM Trans Intell Syst Technol"},{"key":"10098_CR130","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.jnca.2015.05.010","volume":"55","author":"D Yang","year":"2015","unstructured":"Yang D, Zhang D, Chen L, Qu B (2015) NationTelescope: Monitoring and visualizing large-scale collective behavior in LBSNs. J Netw Comput Appl 55:170\u2013180. https:\/\/doi.org\/10.1016\/j.jnca.2015.05.010","journal-title":"J Netw Comput Appl"},{"key":"10098_CR131","unstructured":"Yang Z, Zhang J, Chang EC (2019) Adversarial neural network inversion via auxiliary knowledge alignment. arXiv preprint arXiv:1902.08552"},{"issue":"2","key":"10098_CR132","doi-asserted-by":"publisher","first-page":"2473","DOI":"10.1016\/j.eswa.2007.12.020","volume":"36","author":"I-C Yeh","year":"2009","unstructured":"Yeh I-C, Lien C (2009) The comparisons of data mining techniques for the predictive accuracy of probability of default of credit card clients. Expert Syst Appl 36(2):2473\u20132480. https:\/\/doi.org\/10.1016\/j.eswa.2007.12.020","journal-title":"Expert Syst Appl"},{"key":"10098_CR133","unstructured":"Yelp. Yelp open dataset, 2020. URL: https:\/\/www.yelp.com\/dataset"},{"key":"10098_CR134","unstructured":"Zhang C, Li S, Xia J, Wang W, Yan F, Liu Y (2020) Batchcrypt: Efficient homomorphic encryption for cross-silo federated learning. In 2020 USENIX Annual Technical Conference (USENIXATC 20), pp 493\u2013506"},{"key":"10098_CR135","unstructured":"Zhang W, Tople S, Ohrimenko O (2020) Dataset-level attribute leakage in collaborative learning. arXiv preprint arXiv:2006.07267"},{"key":"10098_CR136","doi-asserted-by":"publisher","unstructured":"Zhao Y, Chen J, Zhang J, Wu D, Teng J, Yu S (2020) PDGAN: A novel poisoning defense method in federated learning using generative adversarial network. In Algorithms and Architectures for Parallel Processing, pages 595\u2013609. Springer International Publishing, https:\/\/doi.org\/10.1007\/978-3-030-38991-8_39","DOI":"10.1007\/978-3-030-38991-8_39"},{"key":"10098_CR137","unstructured":"Zhao B, Mopuri KR, Bilen H (2020) idlg: Improved deep leakage from gradients. arXiv preprint arXiv:2001.02610"},{"key":"10098_CR138","unstructured":"Zheng Z, Zhou Y, Sun Y, Wang Z, Liu B, Li K (2021) Federated learning in smart cities: A comprehensive survey. arXiv e-prints, pages arXiv\u20132102"},{"issue":"3","key":"10098_CR139","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3390\/fi13030073","volume":"13","author":"X Zhou","year":"2021","unstructured":"Zhou X, Ming X, Yiming W, Zheng N (2021) Deep model poisoning attack on federated learning. Future Internet 13(3):73. https:\/\/doi.org\/10.3390\/fi13030073","journal-title":"Future Internet"},{"key":"10098_CR140","doi-asserted-by":"publisher","unstructured":"Zhu L, Han S (2020) Deep leakage from gradients. In Lecture Notes in Computer Science, pages 17\u201331. Springer International Publishing, https:\/\/doi.org\/10.1007\/978-3-030-63076-8_2","DOI":"10.1007\/978-3-030-63076-8_2"},{"key":"10098_CR141","unstructured":"Zong B, Song Q, Min MR, Cheng W, Lumezanu C, Cho D, Chen H (2018) Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In International Conference on Learning Representations"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-021-10098-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10462-021-10098-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-021-10098-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T20:04:10Z","timestamp":1652299450000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10462-021-10098-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":142,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["10098"],"URL":"https:\/\/doi.org\/10.1007\/s10462-021-10098-w","relation":{},"ISSN":["0269-2821","1573-7462"],"issn-type":[{"value":"0269-2821","type":"print"},{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"15 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}