{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T11:41:19Z","timestamp":1777290079929,"version":"3.51.4"},"reference-count":193,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T00:00:00Z","timestamp":1734652800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T00:00:00Z","timestamp":1734652800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100010783","name":"Slovak Academy of Sciences","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100010783","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Artif Intell Rev"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Machine learning is one of the most widely used technologies in the field of Artificial Intelligence. As machine learning applications become increasingly ubiquitous, concerns about data privacy and security have also grown. The work in this paper presents a broad theoretical landscape concerning the evolution of machine learning and deep learning from centralized to distributed learning, first in relation to privacy-preserving machine learning and secondly in the area of privacy-enhancing technologies. It provides a comprehensive landscape of the synergy between distributed machine learning and privacy-enhancing technologies, with federated learning being one of the most prominent architectures. Various distributed learning approaches to privacy-aware techniques are structured in a review, followed by an in-depth description of relevant frameworks and libraries, more particularly in the context of federated learning. The paper also highlights the need for data protection and privacy addressed from different approaches, key findings in the field concerning AI applications, and advances in the development of related tools and techniques.<\/jats:p>","DOI":"10.1007\/s10462-024-11036-2","type":"journal-article","created":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T04:15:20Z","timestamp":1734668120000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Landscape of machine learning evolution: privacy-preserving federated learning frameworks and tools"],"prefix":"10.1007","volume":"58","author":[{"given":"Giang","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Judith","family":"S\u00e1inz-Pardo D\u00edaz","sequence":"additional","affiliation":[]},{"given":"Amanda","family":"Calatrava","sequence":"additional","affiliation":[]},{"given":"Lisana","family":"Berberi","sequence":"additional","affiliation":[]},{"given":"Oleksandr","family":"Lytvyn","sequence":"additional","affiliation":[]},{"given":"Valentin","family":"Kozlov","sequence":"additional","affiliation":[]},{"given":"Viet","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Germ\u00e1n","family":"Molt\u00f3","sequence":"additional","affiliation":[]},{"given":"\u00c1lvaro","family":"L\u00f3pez Garc\u00eda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,20]]},"reference":[{"key":"11036_CR1","doi-asserted-by":"publisher","unstructured":"Abadi M, Chu A, Goodfellow I, et\u00a0al (2016) Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp 308\u2013318, https:\/\/doi.org\/10.1145\/2976749.2978318","DOI":"10.1145\/2976749.2978318"},{"issue":"7","key":"11036_CR2","doi-asserted-by":"publisher","first-page":"5476","DOI":"10.1109\/JIOT.2020.3030072","volume":"8","author":"S AbdulRahman","year":"2020","unstructured":"AbdulRahman S, Tout H, Ould-Slimane H et al (2020) A survey on federated learning: The journey from centralized to distributed on-site learning and beyond. IEEE Internet of Things Journal 8(7):5476\u20135497. https:\/\/doi.org\/10.1109\/JIOT.2020.3030072","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"11036_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar A, Aksu H, Uluagac AS et al (2018) A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys (Csur) 51(4):1\u201335. https:\/\/doi.org\/10.1145\/3214303","journal-title":"ACM Computing Surveys (Csur)"},{"key":"11036_CR4","doi-asserted-by":"publisher","unstructured":"Aditya K, Grzonkowski S, Lekhac NA (2018) Enabling trust in deep learning models: A digital forensics case study. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), IEEE, pp 1250\u20131255, https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00172","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00172"},{"issue":"7","key":"11036_CR5","doi-asserted-by":"publisher","first-page":"220","DOI":"10.3390\/fi16070220","volume":"16","author":"M Ahmadzai","year":"2024","unstructured":"Ahmadzai M, Nguyen G (2024) Differential private federated learning in geographically distributed public administration processes. Future Internet 16(7):220. https:\/\/doi.org\/10.3390\/fi16070220","journal-title":"Future Internet"},{"key":"11036_CR6","unstructured":"Ahmadzai M, Nguyen G (2023) Data partitioning effects in federated learning. Proceedings http:\/\/ceur-wsorg ISSN 1613:0073. https:\/\/ceur-ws.org\/Vol-3588\/p13.pdf"},{"key":"11036_CR7","unstructured":"AI-Act (2024) European Artificial Intelligence Act comes into force. https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/ip_24_4123, Accessed on 01.08.2024, European Commission"},{"key":"11036_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03606-z","author":"RRN Al Ogaili","year":"2023","unstructured":"Al Ogaili RRN, Alomari ES, Alkorani MBM et al (2023) Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm. Wireless Networks. https:\/\/doi.org\/10.1007\/s11276-023-03606-z","journal-title":"Wireless Networks"},{"key":"11036_CR9","doi-asserted-by":"publisher","unstructured":"Alazab M, RM SP, Parimala M, et al (2021) Federated learning for cybersecurity: Concepts, challenges, and future directions. IEEE Transactions on Industrial Informatics 18:3501\u20133509. https:\/\/doi.org\/10.1109\/TII.2021.3119038","DOI":"10.1109\/TII.2021.3119038"},{"key":"11036_CR10","doi-asserted-by":"publisher","unstructured":"Ali AM, Mohammed MA (2024) A comprehensive review of artificial intelligence approaches in omics data processing Evaluating progress and challenges. International Journal of Mathematics, Statistics, and Computer Science. https:\/\/doi.org\/10.59543\/ijmscs.v2i.8703","DOI":"10.59543\/ijmscs.v2i.8703"},{"key":"11036_CR11","unstructured":"APPI (2019) Japan\u2019s data protection law, the Act on the Protection of Personal Information. https:\/\/www.ppc.go.jp\/files\/pdf\/Act_on_the_Protection_of_Personal_Information.pdf, Accessed on 04.12.2023, Personal Information Protection Commission, Japan"},{"key":"11036_CR12","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.inffus.2019.12.012","volume":"58","author":"AB Arrieta","year":"2020","unstructured":"Arrieta AB, D\u00edaz-Rodr\u00edguez N, Del Ser J et al (2020) Explainable artificial intelligence (xai): Concepts, taxonomies, opportunities and challenges toward responsible ai. Information Fusion 58:82\u2013115. https:\/\/doi.org\/10.1016\/j.inffus.2019.12.012","journal-title":"Information Fusion"},{"key":"11036_CR13","unstructured":"ARX (2024) ARX data anonymization tool. https:\/\/arx.deidentifier.org\/, Accessed on 11.01.2024"},{"issue":"10","key":"11036_CR14","doi-asserted-by":"publisher","first-page":"6201","DOI":"10.3390\/app13106201","volume":"13","author":"M Asad","year":"2023","unstructured":"Asad M, Shaukat S, Javanmardi E et al (2023) A comprehensive survey on privacy-preserving techniques in federated recommendation systems. Applied Science 13(10):6201. https:\/\/doi.org\/10.3390\/app13106201","journal-title":"Applied Science"},{"key":"11036_CR15","doi-asserted-by":"publisher","unstructured":"Bauer LA, Bindschaedler V (2020) Towards realistic membership inferences: The case of survey data. In: Annual Computer Security Applications Conference, pp 116\u2013128, https:\/\/doi.org\/10.1145\/3427228.3427282","DOI":"10.1145\/3427228.3427282"},{"key":"11036_CR16","doi-asserted-by":"publisher","unstructured":"Bell JH, Bonawitz KA, Gasc\u00f3n A, et\u00a0al (2020) Secure single-server aggregation with (poly) logarithmic overhead. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp 1253\u20131269, https:\/\/doi.org\/10.1145\/3372297.3417885","DOI":"10.1145\/3372297.3417885"},{"key":"11036_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2023.3315746","author":"ETM Beltr\u00e1n","year":"2023","unstructured":"Beltr\u00e1n ETM, P\u00e9rez MQ, S\u00e1nchez PMS et al (2023) Decentralized federated learning: fundamentals, state of the art, frameworks, trends, and challenges. IEEE Communications Surveys and Tutorials. https:\/\/doi.org\/10.1109\/COMST.2023.3315746","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"11036_CR18","doi-asserted-by":"publisher","unstructured":"Bertino E (2016) Data security and privacy: Concepts, approaches, and research directions. In: 2016 IEEE 40th Annual computer Software and Applications conference (cOMPSAc), IEEE, pp 400\u2013407, https:\/\/doi.org\/10.1109\/COMPSAC.2016.89","DOI":"10.1109\/COMPSAC.2016.89"},{"key":"11036_CR19","unstructured":"Beutel DJ, Topal T, Mathur A, et\u00a0al (2022) Flower: A friendly federated learning research framework. arXiv:2007.14390"},{"key":"11036_CR20","unstructured":"Blot M, Picard D, Cord M, et\u00a0al (2016) Gossip training for deep learning. CoRR abs\/1611.09726. arxiv:1611.09726,"},{"key":"11036_CR21","doi-asserted-by":"publisher","unstructured":"Bonawitz K, Ivanov V, Kreuter B, et\u00a0al (2017) Practical secure aggregation for privacy-preserving machine learning. In: proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp 1175\u20131191, https:\/\/doi.org\/10.1145\/3133956.3133982","DOI":"10.1145\/3133956.3133982"},{"key":"11036_CR22","unstructured":"Brown T, Mann B, Ryder N, et\u00a0al (2020) Language models are few-shot learners. Advances in neural information processing systems 33:1877\u20131901. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2020\/file\/1457c0d6bfcb4967418bfb8ac142f64a-Paper.pdf"},{"key":"11036_CR23","doi-asserted-by":"publisher","first-page":"116869","DOI":"10.1109\/ACCESS.2021.3105929","volume":"9","author":"A Budrionis","year":"2021","unstructured":"Budrionis A, Miara M, Miara P et al (2021) Benchmarking pysyft federated learning framework on mimic-iii dataset. IEEE Access 9:116869\u2013116878. https:\/\/doi.org\/10.1109\/ACCESS.2021.3105929","journal-title":"IEEE Access"},{"key":"11036_CR24","unstructured":"Caffe2 (2023) Caffe2 is a lightweight, modular, and scalable deep learning framework. https:\/\/github.com\/facebookarchive\/caffe2, source code now lives in the PyTorch repository https:\/\/github.com\/pytorch\/pytorch\/, Accessed on 12.12.2023"},{"key":"11036_CR25","unstructured":"CCPA (2020) California Consumer Privacy Act. https:\/\/oag.ca.gov\/privacy\/ccpa, Accessed on 04.12.2023, State of California Department of Justice"},{"key":"11036_CR26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3325822","author":"A Chaddad","year":"2023","unstructured":"Chaddad A, Wu Y, Desrosiers C (2023) Federated learning for healthcare applications. IEEE Internet Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2023.3325822","journal-title":"IEEE Internet Things Journal"},{"key":"11036_CR27","unstructured":"Chainer (2023) Chainer - A flexible framework of neural networks for deep learning. https:\/\/github.com\/chainer\/chainer, Accessed on 12.12.2023"},{"issue":"1","key":"11036_CR28","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1504\/IJITCA.2022.124372","volume":"2","author":"S Chatterjee","year":"2022","unstructured":"Chatterjee S, Hanawal MK (2022) Federated learning for intrusion detection in iot security: a hybrid ensemble approach. International Journal of Internet of Things Cyber-Assurance 2(1):62\u201386. https:\/\/doi.org\/10.1504\/IJITCA.2022.124372","journal-title":"International Journal of Internet of Things Cyber-Assurance"},{"key":"11036_CR29","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-030-34621-8_16","volume-title":"Advances in Cryptology - ASIACRYPT 2019","author":"H Chen","year":"2019","unstructured":"Chen H, Chillotti I, Song Y (2019) Multi-key homomorphic encryption from tfhe. In: Galbraith SD, Moriai S (eds) Advances in Cryptology - ASIACRYPT 2019. Springer International Publishing, Cham, pp 446\u2013472"},{"key":"11036_CR30","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ins.2020.02.037","volume":"522","author":"Y Chen","year":"2020","unstructured":"Chen Y, Luo F, Li T et al (2020) A training-integrity privacy-preserving federated learning scheme with trusted execution environment. Information Science 522:69\u201379. https:\/\/doi.org\/10.1016\/j.ins.2020.02.037","journal-title":"Information Science"},{"issue":"12","key":"11036_CR31","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/3387107","volume":"63","author":"Y Cheng","year":"2020","unstructured":"Cheng Y, Liu Y, Chen T et al (2020) Federated learning for privacy-preserving ai. Communications of the ACM 63(12):33\u201336. https:\/\/doi.org\/10.1145\/3387107","journal-title":"Communications of the ACM"},{"key":"11036_CR32","unstructured":"Chollet F (2023) Keras - Deep Learning for humans. https:\/\/github.com\/keras-team\/keras, Accessed on 12.12.2023"},{"issue":"5","key":"11036_CR33","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13173","volume":"40","author":"D Chowdhury","year":"2023","unstructured":"Chowdhury D, Banerjee S, Sannigrahi M et al (2023) Federated learning based covid-19 detection. Expert Systems 40(5):e13173","journal-title":"Expert Systems"},{"issue":"4","key":"11036_CR34","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.clsr.2019.04.007","volume":"35","author":"R Clarke","year":"2019","unstructured":"Clarke R (2019) Principles and business processes for responsible ai. Computer Law and Security Review 35(4):410\u2013422. https:\/\/doi.org\/10.1016\/j.clsr.2019.04.007","journal-title":"Computer Law and Security Review"},{"key":"11036_CR35","unstructured":"CNTK (2023) CNTK - Microsoft Cognitive Toolkit (CNTK), an open source deep-learning toolkit. https:\/\/github.com\/microsoft\/CNTK, Accessed on 12.12.2023"},{"key":"11036_CR36","unstructured":"Cournapeau D (2023) scikit-learn: machine learning in Python. https:\/\/github.com\/scikit-learn\/scikit-learn, Accessed on 12.12.2023"},{"key":"11036_CR37","unstructured":"Dahl M, Mancuso J, Dupis Y, et\u00a0al (2018) Private machine learning in tensorflow using secure computation. arXiv:1810.08130"},{"key":"11036_CR38","doi-asserted-by":"crossref","unstructured":"Dasari S, Kaluri R (2024) 2p3fl: A novel approach for privacy preserving in financial sectors using flower federated learning. CMES-Computer Modeling in Engineering and Sciences 140(2), 2035\u20132051.https:\/\/doi.org\/10.32604\/cmes.2024.049152","DOI":"10.32604\/cmes.2024.049152"},{"key":"11036_CR39","unstructured":"DL4J (2023) deeplearning4j (DL4J) Suite of tools for deploying and training deep learning models using the JVM. https:\/\/github.com\/deeplearning4j\/deeplearning4j, Accessed on 12.12.2023"},{"key":"11036_CR40","doi-asserted-by":"publisher","DOI":"10.1201\/b10867","volume-title":"Data mining and machine learning in cybersecurity","author":"S Dua","year":"2016","unstructured":"Dua S, Du X (2016) Data mining and machine learning in cybersecurity. CRC Press"},{"key":"11036_CR41","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1561\/0400000042","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork C, Roth A et al (2014) The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9:211\u2013407. https:\/\/doi.org\/10.1561\/0400000042","journal-title":"Foundations and Trends\u00ae in Theoretical Computer Science"},{"key":"11036_CR42","doi-asserted-by":"publisher","first-page":"22359","DOI":"10.1109\/ACCESS.2022.3151670","volume":"10","author":"A El Ouadrhiri","year":"2022","unstructured":"El Ouadrhiri A, Abdelhadi A (2022) Differential privacy for deep and federated learning: A survey. IEEE Access 10:22359\u201322380. https:\/\/doi.org\/10.1109\/ACCESS.2022.3151670","journal-title":"IEEE Access"},{"key":"11036_CR43","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1561\/3300000019","volume":"2","author":"D Evans","year":"2018","unstructured":"Evans D, Kolesnikov V, Rosulek M et al (2018) A pragmatic introduction to secure multi-party computation. Foundations and Trends\u00ae in Privacy and Security 2:70\u2013246. https:\/\/doi.org\/10.1561\/3300000019","journal-title":"Foundations and Trends\u00ae in Privacy and Security"},{"key":"11036_CR44","doi-asserted-by":"publisher","unstructured":"Faridoon A, Kechadi MT (2020) Data privacy in its three forms\u2013a systematic review. In: Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications: 7th International Conference, FDSE 2020, Springer, pp 425\u2013433, https:\/\/doi.org\/10.1007\/978-981-33-4370-2_30","DOI":"10.1007\/978-981-33-4370-2_30"},{"key":"11036_CR45","unstructured":"fast.ai (2023) The fastai deep learning library. https:\/\/github.com\/fastai\/fastai, Accessed on 12.12.2023"},{"key":"11036_CR46","unstructured":"Fate (2023) FATE (Federated AI Technology Enabler). https:\/\/github.com\/FederatedAI\/FATE, Accessed on 12.12.2023"},{"key":"11036_CR47","unstructured":"FedJAX (2023) FedJAX is a JAX-based open source library for Federated Learning simulations that emphasizes ease-of-use in research. https:\/\/github.com\/google\/fedjax, Accessed on 12.12.2023"},{"key":"11036_CR48","unstructured":"FedLab (2023) FedLab - A flexible Federated Learning Framework based on PyTorch, simplifying your Federated Learning research. https:\/\/github.com\/SMILELab-FL\/FedLab, Accessed on 12.12.2023"},{"key":"11036_CR49","unstructured":"FedML (2023) FedML, Federated Learning\/Analytics and Edge AI Platform. https:\/\/fedml.ai\/, Accessed on 12.12.2023"},{"key":"11036_CR50","unstructured":"FedML-Nexus-AI (2023) FEDML Nexus AI: Next-Gen Cloud Services for LLMs and Generative AI. https:\/\/nexus.fedml.ai\/, Accessed on 12.12.2023"},{"key":"11036_CR51","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.procs.2021.03.053","volume":"184","author":"R Firouzi","year":"2021","unstructured":"Firouzi R, Rahmani R, Kanter T (2021) Federated learning for distributed reasoning on edge computing. Procedia Computer Science 184:419\u2013427. https:\/\/doi.org\/10.1016\/j.procs.2021.03.053","journal-title":"Procedia Computer Science"},{"key":"11036_CR52","unstructured":"FLARE N (2024a) NVIDIA Federated Learning Application Runtime Environment. https:\/\/github.com\/NVIDIA\/NVFlare, Accessed on 04.01.2024"},{"key":"11036_CR53","unstructured":"FLARE N (2024b) NVIDIA FLARE - Data Privacy Protection. https:\/\/nvflare.readthedocs.io\/en\/main\/user_guide\/security\/data_privacy_protection.html, Accessed on 02.02.2024"},{"key":"11036_CR54","unstructured":"Flower (2023) Flower - A Friendly Federated Learning Framework. https:\/\/github.com\/adap\/flower, Accessed on 12.12.2023"},{"key":"11036_CR55","unstructured":"Flower (2024) Flower - Differential privacy wrapper classes. https:\/\/flower.dev\/docs\/framework\/explanation-differential-privacy.html, Accessed on 02.02.2024"},{"key":"11036_CR56","unstructured":"Flute (2023) FLUTE, Federated Learning Utilities and Tools for Experimentation. https:\/\/github.com\/microsoft\/msrflute, Accessed on 12.12.2023"},{"key":"11036_CR57","unstructured":"Gadekallu TR, Pham QV, Huynh-The T, et\u00a0al (2021) Federated learning for big data: A survey on opportunities, applications, and future directions. arXiv:2110.04160"},{"key":"11036_CR58","unstructured":"GDPR (2018) General Data Protection Regulation. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj, Accessed on 04.12.2023, European Union"},{"key":"11036_CR59","unstructured":"Gentry C (2009) A fully homomorphic encryption scheme. https:\/\/www.proquest.com\/docview\/305003863?pq-origsite=gscholar&fromopenview=true, proQuest Dissertations Publishing, 3382729. Stanford University. Accessed on 12.12.2023"},{"key":"11036_CR60","doi-asserted-by":"publisher","unstructured":"Giaretta L, Girdzijauskas \u0160 (2019) Gossip learning: Off the beaten path. In: 2019 IEEE International Conference on Big Data (Big Data), IEEE, pp 1117\u20131124, https:\/\/doi.org\/10.1109\/BigData47090.2019.9006216","DOI":"10.1109\/BigData47090.2019.9006216"},{"key":"11036_CR61","doi-asserted-by":"crossref","unstructured":"Gong X, Sharma A, Karanam S, et\u00a0al (2022) Preserving privacy in federated learning with ensemble cross-domain knowledge distillation. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp 11891\u201311899, https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/download\/21446\/21195","DOI":"10.1609\/aaai.v36i11.21446"},{"key":"11036_CR62","unstructured":"GoogleDP (2023) Google\u2019s differential privacy libraries.. https:\/\/github.com\/google\/differential-privacy, Accessed on 12.12.2023"},{"key":"11036_CR63","unstructured":"GoogleJAX (2023) JAX - Composable transformations of Python+NumPy programs: differentiate, vectorize, JIT to GPU\/TPU, and more. https:\/\/github.com\/google\/jax, Accessed on 11.01.2024"},{"key":"11036_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2018.05.003","volume":"116","author":"O Gupta","year":"2018","unstructured":"Gupta O, Raskar R (2018) Distributed learning of deep neural network over multiple agents. Journal of Network and Computer Applications 116:1\u20138. https:\/\/doi.org\/10.1016\/j.jnca.2018.05.003","journal-title":"Journal of Network and Computer Applications"},{"key":"11036_CR65","unstructured":"H2O (2023) H2O is an Open Source, Distributed, Fast and Scalable Machine Learning Platform. https:\/\/github.com\/h2oai\/h2o-3, Accessed on 12.12.2023"},{"key":"11036_CR66","unstructured":"Hari S (2023) Best Machine Learning Frameworks(ML) for Experts in 2023. https:\/\/hackr.io\/blog\/machine-learning-frameworks, accessed on 12.12.2023"},{"key":"11036_CR67","unstructured":"HarvardUniversity (2023) Open Differential Privacy. https:\/\/github.com\/opendp\/opendp, Accessed on 04.02.2024"},{"key":"11036_CR68","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.jpdc.2020.10.006","volume":"148","author":"I Heged\u0171s","year":"2021","unstructured":"Heged\u0171s I, Danner G, Jelasity M (2021) Decentralized learning works: An empirical comparison of gossip learning and federated learning. Journal of Parallel and Distributed Computing 148:109\u2013124. https:\/\/doi.org\/10.1016\/j.jpdc.2020.10.006","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"11036_CR69","doi-asserted-by":"publisher","unstructured":"Heged\u0171s I, Danner G, Jelasity M (2019) Gossip learning as a decentralized alternative to federated learning. In: Distributed Applications and Interoperable Systems: 19th IFIP WG 6.1 International Conference, DAIS 2019, Springer, pp 74\u201390, https:\/\/doi.org\/10.1007\/978-3-030-22496-7_5","DOI":"10.1007\/978-3-030-22496-7_5"},{"key":"11036_CR70","unstructured":"HElib (2023) Open-source software library that implements homomorphic encryption (HE). https:\/\/github.com\/homenc\/HElib, Accessed on 12.12.2023"},{"key":"11036_CR71","unstructured":"Hergenrother L, Park S (2021) Fully Homomorphic Encryption on IBM Cloud Hyper Protect Virtual Servers. https:\/\/www.proquest.com\/docview\/305003863?pq-origsite=gscholar&fromopenview=true, Accessed on 12.12.2023"},{"key":"11036_CR72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2015.05.002","volume":"53","author":"J Heurix","year":"2015","unstructured":"Heurix J, Zimmermann P, Neubauer T et al (2015) A taxonomy for privacy enhancing technologies. Computers & Security 53:1\u201317. https:\/\/doi.org\/10.1016\/j.cose.2015.05.002","journal-title":"Computers & Security"},{"key":"11036_CR73","unstructured":"HIPS-Autograd (2023) Autograd - Efficiently computes derivatives of numpy code. https:\/\/github.com\/hips\/autograd, Accessed on 12.01.2024"},{"key":"11036_CR74","doi-asserted-by":"publisher","unstructured":"Hong C, Huang Z, Lu Wj, et\u00a0al (2020) Privacy-preserving collaborative machine learning on genomic data using tensorflow. In: Proceedings of the ACM Turing Celebration Conference-China, pp 39\u201344, https:\/\/doi.org\/10.1145\/3393527.3393535","DOI":"10.1145\/3393527.3393535"},{"key":"11036_CR75","unstructured":"IBM (2015) The IBM Analytics Solutions Unified Method for Data Mining\/Predictive Ana- lytics (ASUM-DM). ftp:\/\/ftp.software.ibm.com\/software\/data\/sw-library\/services\/ASUM.pdf, Accessed on 12.12.2023"},{"key":"11036_CR76","unstructured":"IBM-Diffprivlib (2023) Diffprivlib is a general-purpose library for experimenting with, investigating and developing applications in, differential privacy. https:\/\/github.com\/IBM\/differential-privacy-library, Accessed on 12.12.2023"},{"key":"11036_CR77","unstructured":"IBM-FL (2023) IBM Federated Learning. https:\/\/github.com\/IBM\/federated-learning-lib, Accessed on 12.12.2023"},{"key":"11036_CR78","unstructured":"Intel (2023) Intel Software Guard Extensions (Intel SGX). https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/software-guard-extensions.html, Accessed on 21.12.2023"},{"key":"11036_CR79","doi-asserted-by":"publisher","first-page":"183488","DOI":"10.1109\/ACCESS.2020.3028367","volume":"8","author":"Y Jiang","year":"2020","unstructured":"Jiang Y, Gu H, Lu Y et al (2020) 2d-hra: Two-dimensional hierarchical ring-based all-reduce algorithm in large-scale distributed machine learning. IEEE Access 8:183488\u2013183494. https:\/\/doi.org\/10.1109\/ACCESS.2020.3028367","journal-title":"IEEE Access"},{"key":"11036_CR80","doi-asserted-by":"publisher","unstructured":"Kadhe S, Rajaraman N, Koyluoglu OO, et\u00a0al (2020) Fastsecagg: Scalable secure aggregation for privacy-preserving federated learning. arXiv preprint arXiv:2009.11248https:\/\/doi.org\/10.48550\/arXiv.2009.11248","DOI":"10.48550\/arXiv.2009.11248"},{"issue":"1\u20132","key":"11036_CR81","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000083","volume":"14","author":"P Kairouz","year":"2021","unstructured":"Kairouz P, McMahan HB, Avent B et al (2021) Advances and open problems in federated learning. Foundations and Trends\u00ae in Machine Learning 14(1\u20132):1\u2013210. https:\/\/doi.org\/10.1561\/2200000083","journal-title":"Foundations and Trends\u00ae in Machine Learning"},{"issue":"6","key":"11036_CR82","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1038\/s42256-020-0186-1","volume":"2","author":"GA Kaissis","year":"2020","unstructured":"Kaissis GA, Makowski MR, R\u00fcckert D et al (2020) Secure, privacy-preserving and federated machine learning in medical imaging. Nature Machine Intelligence 2(6):305\u2013311. https:\/\/doi.org\/10.1038\/s42256-020-0186-1","journal-title":"Nature Machine Intelligence"},{"key":"11036_CR83","unstructured":"Keras3 (2023) Introducing Keras 3.0. https:\/\/keras.io\/keras_3\/, Accessed on 12.12.2023"},{"key":"11036_CR84","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.bdr.2018.11.001","volume":"15","author":"S Khalifa","year":"2019","unstructured":"Khalifa S, Martin P, Young R (2019) Label-aware distributed ensemble learning: A simplified distributed classifier training model for big data. Big Data Research 15:1\u201311. https:\/\/doi.org\/10.1016\/j.bdr.2018.11.001","journal-title":"Big Data Research"},{"key":"11036_CR85","unstructured":"KotlinSyft (2023) OpenMined\/KotlinSyft - The official Syft worker for secure on-device machine learning. https:\/\/github.com\/OpenMined\/KotlinSyft, accessed on 12.12.2023"},{"key":"11036_CR86","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.758","author":"A Lakhan","year":"2021","unstructured":"Lakhan A, Mohammed MA, Kadry S et al (2021) Federated learning enables intelligent reflecting surface in fog-cloud enabled cellular network. PeerJ Computer Science. https:\/\/doi.org\/10.7717\/peerj-cs.758","journal-title":"PeerJ Computer Science"},{"key":"11036_CR87","doi-asserted-by":"publisher","first-page":"107539","DOI":"10.1016\/j.compbiomed.2023.107539","volume":"166","author":"A Lakhan","year":"2023","unstructured":"Lakhan A, Mohammed MA, Abdulkareem KH et al (2023) Autism spectrum disorder detection framework for children based on federated learning integrated cnn-lstm. Computers in Biology and Medicine 166:107539. https:\/\/doi.org\/10.1016\/j.compbiomed.2023.107539","journal-title":"Computers in Biology and Medicine"},{"key":"11036_CR88","doi-asserted-by":"publisher","first-page":"107845","DOI":"10.1016\/j.compbiomed.2023.107845","volume":"169","author":"A Lakhan","year":"2024","unstructured":"Lakhan A, Hamouda H, Abdulkareem KH et al (2024) Digital healthcare framework for patients with disabilities based on deep federated learning schemes. Computers in Biology and Medicine 169:107845. https:\/\/doi.org\/10.1016\/j.compbiomed.2023.107845","journal-title":"Computers in Biology and Medicine"},{"key":"11036_CR89","doi-asserted-by":"publisher","unstructured":"Lambert M, Schuster T, Kessel M, et\u00a0al (2023) Robustness analysis of machine learning models using domain-specific test data perturbation. In: EPIA Conference on Artificial Intelligence, Springer, pp 158\u2013170, https:\/\/doi.org\/10.1007\/978-3-031-49008-8_13","DOI":"10.1007\/978-3-031-49008-8_13"},{"key":"11036_CR90","doi-asserted-by":"publisher","first-page":"509","DOI":"10.3390\/ai4030028","volume":"4","author":"R Lazzarini","year":"2023","unstructured":"Lazzarini R, Tianfield H, Charissis V (2023) Federated learning for iot intrusion detection. Ai 4:509\u2013530. https:\/\/doi.org\/10.3390\/ai4030028","journal-title":"Ai"},{"key":"11036_CR91","unstructured":"LF-AI-Data-Landscape (2023) LF AI & Data Foundation Interactive Landscape. https:\/\/landscape.lfai.foundation\/, Accessed on 12.12.2023"},{"key":"11036_CR92","doi-asserted-by":"publisher","first-page":"106854","DOI":"10.1016\/j.cie.2020.106854","volume":"149","author":"L Li","year":"2020","unstructured":"Li L, Fan Y, Tse M et al (2020) A review of applications in federated learning. Computers and Industrial Engineering 149:106854. https:\/\/doi.org\/10.1016\/j.cie.2020.106854","journal-title":"Computers and Industrial Engineering"},{"key":"11036_CR93","first-page":"429","volume":"2","author":"T Li","year":"2020","unstructured":"Li T, Sahu AK, Zaheer M et al (2020) Federated optimization in heterogeneous networks. Proceedings of Machine learning and systems 2:429\u2013450","journal-title":"Proceedings of Machine learning and systems"},{"issue":"4","key":"11036_CR94","doi-asserted-by":"publisher","first-page":"3347","DOI":"10.1109\/TKDE.2021.3124599","volume":"35","author":"Q Li","year":"2021","unstructured":"Li Q, Wen Z, Wu Z et al (2021) A survey on federated learning systems: Vision, hype and reality for data privacy and protection. IEEE Transactions on Knowledge and Data Engineering 35(4):3347\u20133366. https:\/\/doi.org\/10.1109\/TKDE.2021.3124599","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"11036_CR95","doi-asserted-by":"publisher","unstructured":"Li S, Liu H, Bian Z, et\u00a0al (2023) Colossal-ai: A unified deep learning system for large-scale parallel training. In: Proceedings of the 52nd International Conference on Parallel Processing. Association for Computing Machinery, New York, NY, USA, ICPP \u201923, p 766\u2013775, https:\/\/doi.org\/10.1145\/3605573.3605613","DOI":"10.1145\/3605573.3605613"},{"key":"11036_CR96","doi-asserted-by":"publisher","unstructured":"Li N, Li T, Venkatasubramanian S (2006) t-closeness: Privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd international conference on data engineering, IEEE, pp 106\u2013115, https:\/\/doi.org\/10.1109\/ICDE.2007.367856","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"1","key":"11036_CR97","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/3387108","volume":"64","author":"Y Lindell","year":"2020","unstructured":"Lindell Y (2020) Secure multiparty computation. Communications of the ACM 64(1):86\u201396. https:\/\/doi.org\/10.1145\/3387108","journal-title":"Communications of the ACM"},{"key":"11036_CR98","doi-asserted-by":"crossref","unstructured":"L\u00f3pez-Alt A, Tromer E, Vaikuntanathan V (2012) On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the forty-fourth annual ACM symposium on Theory of computing, pp 1219\u20131234","DOI":"10.1145\/2213977.2214086"},{"key":"11036_CR99","doi-asserted-by":"publisher","unstructured":"Luo X, Wu Y, Xiao X, et\u00a0al (2021) Feature inference attack on model predictions in vertical federated learning. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), IEEE, pp 181\u2013192, https:\/\/doi.org\/10.1109\/ICDE51399.2021.00023","DOI":"10.1109\/ICDE51399.2021.00023"},{"key":"11036_CR100","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1016\/j.procs.2023.10.051","volume":"225","author":"O Lytvyn","year":"2023","unstructured":"Lytvyn O, Nguyen G (2023) Efficiency and security trade-offs of secure multi-party computation for machine learning. Procedia Computer Science 225:655\u2013664. https:\/\/doi.org\/10.1016\/j.procs.2023.10.051","journal-title":"Procedia Computer Science"},{"key":"11036_CR101","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.procs.2023.03.006","volume":"220","author":"O Lytvyn","year":"2023","unstructured":"Lytvyn O, Nguyen G (2023) Secure multi-party computation for magnetic resonance imaging classification. Procedia Computer Science 220:24\u201331. https:\/\/doi.org\/10.1016\/j.procs.2023.03.006","journal-title":"Procedia Computer Science"},{"key":"11036_CR102","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J et al (2007) l-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data (TKDD). https:\/\/doi.org\/10.1145\/1217299.1217302","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"},{"issue":"8","key":"11036_CR103","doi-asserted-by":"publisher","first-page":"5124","DOI":"10.1080\/03772063.2021.1965918","volume":"69","author":"GK Mahato","year":"2023","unstructured":"Mahato GK, Chakraborty SK (2023) A comparative review on homomorphic encryption for cloud security. IETE Journal of Research 69(8):5124\u20135133. https:\/\/doi.org\/10.1080\/03772063.2021.1965918","journal-title":"IETE Journal of Research"},{"key":"11036_CR104","doi-asserted-by":"publisher","first-page":"8512","DOI":"10.1109\/ACCESS.2020.3045700","volume":"9","author":"A Majeed","year":"2020","unstructured":"Majeed A, Lee S (2020) Anonymization techniques for privacy preserving data publishing: A comprehensive survey. IEEE Access 9:8512\u20138545. https:\/\/doi.org\/10.1109\/ACCESS.2020.3045700","journal-title":"IEEE Access"},{"issue":"2","key":"11036_CR105","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1080\/17538157.2021.1983578","volume":"47","author":"R May","year":"2022","unstructured":"May R, Denecke K (2022) Security, privacy, and healthcare-related conversational agents: a scoping review. Informatics for Health and Social Care 47(2):194\u2013210. https:\/\/doi.org\/10.1080\/17538157.2021.1983578","journal-title":"Informatics for Health and Social Care"},{"key":"11036_CR106","unstructured":"McMahan B, Moore E, Ramage D, et\u00a0al (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, PMLR, pp 1273\u20131282, http:\/\/proceedings.mlr.press\/v54\/mcmahan17a\/mcmahan17a.pdf"},{"key":"11036_CR107","unstructured":"MetaPlatforms (2023) Opacus a library that enables training PyTorch models with differential privacy. https:\/\/github.com\/pytorch\/opacus, Accessed on 12.12.2023"},{"key":"11036_CR108","unstructured":"Microsoft (2016) the Microsoft Team Data Science Process (TDSP). https:\/\/learn.microsoft.com\/en-us\/azure\/architecture\/data-science-process\/overview, accessed on 12.12.2023"},{"key":"11036_CR109","unstructured":"MindSpore (2023) MindSpore is a new open source deep learning training\/inference framework that could be used for mobile, edge and cloud scenarios. https:\/\/github.com\/mindspore-ai\/mindspore, Accessed on 12.12.2023"},{"key":"11036_CR110","unstructured":"Mironov I, Talwar K, Zhang L (2019) R\u00e9nyi differential privacy of the sampled gaussian mechanism. arXiv:1908.10530"},{"key":"11036_CR111","unstructured":"MIT (2023) MIT Media Lab\u2019s Split Learning: Distributed and collaborative learning - Distributed deep learning and inference without sharing raw data. https:\/\/ai-infrastructure.org\/ai-infrastructure-landscape\/, Accessed on 04.12.2023"},{"key":"11036_CR112","doi-asserted-by":"publisher","unstructured":"Mo F, Haddadi H, Katevas K, et\u00a0al (2021) Ppfl: privacy-preserving federated learning with trusted execution environments. In: Proceedings of the 19th annual international conference on mobile systems, applications, and services, pp 94\u2013108, https:\/\/doi.org\/10.1145\/3458864.3466628","DOI":"10.1145\/3458864.3466628"},{"key":"11036_CR113","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e21639","author":"MA Mohammed","year":"2023","unstructured":"Mohammed MA, Lakhan A, Abdulkareem KH et al (2023) Multi-objectives reinforcement federated learning blockchain enabled internet of things and fog-cloud infrastructure for transport data. Heliyon. https:\/\/doi.org\/10.1016\/j.heliyon.2023.e21639","journal-title":"Heliyon"},{"key":"11036_CR114","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1016\/j.future.2020.10.007","volume":"115","author":"V Mothukuri","year":"2021","unstructured":"Mothukuri V, Parizi RM, Pouriyeh S et al (2021) A survey on security and privacy of federated learning. Future Generation Computer Systems 115:619\u2013640. https:\/\/doi.org\/10.1016\/j.future.2020.10.007","journal-title":"Future Generation Computer Systems"},{"key":"11036_CR115","doi-asserted-by":"publisher","first-page":"291","DOI":"10.2478\/popets-2021-0071","volume":"2021","author":"C Mouchet","year":"2021","unstructured":"Mouchet C, Troncoso-Pastoriza J, Bossuat JP et al (2021) Multiparty homomorphic encryption from ring-learning-with-errors. Proceedings on Privacy Enhancing Technologies 2021:291\u2013311","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"4","key":"11036_CR116","doi-asserted-by":"publisher","first-page":"3759","DOI":"10.1007\/s40747-022-00756-z","volume":"9","author":"K Munjal","year":"2023","unstructured":"Munjal K, Bhatia R (2023) A systematic review of homomorphic encryption and its contributions in healthcare industry. Complex and Intelligent Systems 9(4):3759\u20133786. https:\/\/doi.org\/10.1007\/s40747-022-00756-z","journal-title":"Complex and Intelligent Systems"},{"key":"11036_CR117","unstructured":"MXNet (2023a) MXNet - Lightweight, Portable, Flexible Distributed\/Mobile Deep Learning with Dynamic, Mutation-aware Dataflow Dep Scheduler; for Python, R, Julia, Scala, Go, Javascript and more. https:\/\/github.com\/keras-team\/keras, Accessed on 12.01.2024"},{"key":"11036_CR118","unstructured":"MXNet (2023b) MXNet - This project has retired. For details please refer to its Attic page. https:\/\/mxnet.apache.org\/versions\/1.9.1\/, Accessed on 12.01.2024"},{"key":"11036_CR119","unstructured":"Narra KG, Lin Z, Wang Y, et\u00a0al (2019) Privacy-preserving inference in machine learning services using trusted execution environments. arXiv:1912.03485"},{"key":"11036_CR120","doi-asserted-by":"publisher","unstructured":"Nasr M, Shokri R, Houmansadr A (2019) Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. In: 2019 IEEE symposium on security and privacy (SP), IEEE, pp 739\u2013753, https:\/\/doi.org\/10.1109\/SP.2019.00065","DOI":"10.1109\/SP.2019.00065"},{"key":"11036_CR121","unstructured":"Nguyen G (2022) Introduction to Data Science. Spektrum STU Publishing, https:\/\/elvira.fiit.stuba.sk, the Edition of University Textbooks on Informatics and Information Technologies"},{"issue":"1","key":"11036_CR122","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10462-018-09679-z","volume":"52","author":"G Nguyen","year":"2019","unstructured":"Nguyen G, Dlugolinsky S, Bob\u00e1k M et al (2019) Machine learning and deep learning frameworks and libraries for large-scale data mining: a survey. Artificial Intelligence Review 52(1):77\u2013124. https:\/\/doi.org\/10.1007\/s10462-018-09679-z","journal-title":"Artificial Intelligence Review"},{"key":"11036_CR123","doi-asserted-by":"publisher","first-page":"19696","DOI":"10.1109\/ACCESS.2020.2968718","volume":"8","author":"G Nguyen","year":"2020","unstructured":"Nguyen G, Dlugolinsky S, Tran V et al (2020) Deep learning for proactive network monitoring and security protection. IEEE Access 8:19696\u201319716. https:\/\/doi.org\/10.1109\/ACCESS.2020.2968718","journal-title":"IEEE Access"},{"key":"11036_CR124","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-024-09863-z","author":"G Nguyen","year":"2024","unstructured":"Nguyen G, Dlugolinsky S, Tran V et al (2024) Network security aiops for online stream data monitoring. Neural Computing and Applications. https:\/\/doi.org\/10.1007\/s00521-024-09863-z","journal-title":"Neural Computing and Applications"},{"issue":"4","key":"11036_CR125","doi-asserted-by":"publisher","first-page":"104","DOI":"10.3390\/a15040104","volume":"15","author":"E Novikova","year":"2022","unstructured":"Novikova E, Doynikova E, Golubev S (2022) Federated learning for intrusion detection in the critical infrastructures: Vertically partitioned data use case. Algorithms 15(4):104. https:\/\/doi.org\/10.3390\/a15040104","journal-title":"Algorithms"},{"key":"11036_CR126","unstructured":"OpenFHE (2023) Open-Source Fully Homomorphic Encryption Library. https:\/\/github.com\/openfheorg\/openfhe-development, Accessed on 12.12.2023"},{"key":"11036_CR127","unstructured":"OpenFL (2023) Open Federated Learning (OpenFL) - An Open-Source Framework For Federated Learning. https:\/\/github.com\/intel\/openfl, Accessed on 12.12.2023"},{"key":"11036_CR128","unstructured":"OpenMined (2023a) A survey of differential privacy framework. https:\/\/blog.openmined.org\/a-survey-of-differential-privacy-frameworks\/, Accessed on 12.12.2023"},{"key":"11036_CR129","unstructured":"OpenMined (2023b) OpenMined - A world where every good question is answered. https:\/\/www.openmined.org\/, Accessed on 12.12.2023"},{"key":"11036_CR130","unstructured":"OpenMinedDP (2023) Open Mined - Use Cases of Differential Privacy. https:\/\/blog.openmined.org\/use-cases-of-differential-privacy\/, Accessed on 12.12.2023"},{"key":"11036_CR131","unstructured":"PaddlePaddle (2023) PArallel Distributed Deep LEarning: Machine Learning Framework from Industrial Practice. https:\/\/github.com\/PaddlePaddle\/Paddle, Accessed on 12.12.2023"},{"key":"11036_CR132","unstructured":"Paillier (2023) Paillier - A library for Partially Homomorphic Encryption in Python. https:\/\/github.com\/data61\/python-paillier, Accessed on 12.12.2023"},{"key":"11036_CR133","unstructured":"PapersWithCode (2023) Papers with code. Trends on the paper implementations grouped by framework. . https:\/\/paperswithcode.com\/trends, Accessed on 11.12.2023"},{"issue":"2","key":"11036_CR134","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.jpdc.2008.09.002","volume":"69","author":"P Patarasuk","year":"2009","unstructured":"Patarasuk P, Yuan X (2009) Bandwidth optimal all-reduce algorithms for clusters of workstations. Journal of Parallel and Distributed Computing 69(2):117\u2013124. https:\/\/doi.org\/10.1016\/j.jpdc.2008.09.002","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"11036_CR135","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1613\/jair.1.14649","volume":"77","author":"N Ponomareva","year":"2023","unstructured":"Ponomareva N, Hazimeh H, Kurakin A et al (2023) How to dp-fy ml: A practical guide to machine learning with differential privacy. Journal of Artificial Intelligence Research 77:1113\u20131201. https:\/\/doi.org\/10.1613\/jair.1.14649","journal-title":"Journal of Artificial Intelligence Research"},{"key":"11036_CR136","unstructured":"PyDP (2023) PyDP The Python Differential Privacy Library. https:\/\/github.com\/OpenMined\/PyDP, accessed on 12.12.2023"},{"key":"11036_CR137","unstructured":"PySyft (2023) OpenMined\/PySyft - Data science on data without acquiring a copy. https:\/\/github.com\/OpenMined\/PySyft, Accessed on 12.12.2023"},{"key":"11036_CR138","unstructured":"PySyftTF (2023) PySyft - Tensorflow. https:\/\/github.com\/OpenMined\/PySyft-TensorFlow, Accessed on 12.12.2023"},{"key":"11036_CR139","unstructured":"PyTorch (2023) PyTorch - Tensors and Dynamic neural networks in Python with strong GPU acceleration. https:\/\/github.com\/pytorch\/pytorch, Accessed on 12.12.2023"},{"key":"11036_CR140","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3329061","author":"A Rauniyar","year":"2023","unstructured":"Rauniyar A, Hagos DH, Jha D et al (2023) Federated learning for medical applications: A taxonomy, current trends, challenges, and future research directions. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2023.3329061","journal-title":"IEEE Internet of Things Journal"},{"key":"11036_CR141","unstructured":"Reddi S, Charles Z, Zaheer M, et\u00a0al (2021) Adaptive federated optimization. arXiv:2003.00295"},{"key":"11036_CR142","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-024-02234-z","author":"P Riedel","year":"2024","unstructured":"Riedel P, Schick L, von Schwerin R et al (2024) Comparative analysis of open-source federated learning frameworks-a literature-based survey and review. International Journal of Machine Learning and Cybernetics. https:\/\/doi.org\/10.1007\/s13042-024-02234-z","journal-title":"International Journal of Machine Learning and Cybernetics"},{"key":"11036_CR143","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/j.inffus.2020.07.009","volume":"64","author":"N Rodr\u00edguez-Barroso","year":"2020","unstructured":"Rodr\u00edguez-Barroso N, Stipcich G, Jim\u00e9nez-L\u00f3pez D et al (2020) Federated learning and differential privacy: Software tools analysis, the sherpa. ai fl framework and methodological guidelines for preserving data privacy. Information Fusion 64:270\u2013292. https:\/\/doi.org\/10.1016\/j.inffus.2020.07.009","journal-title":"Information Fusion"},{"key":"11036_CR144","doi-asserted-by":"publisher","unstructured":"Rodr\u00edguez N, Stipcich G, Jim\u00e9nez D, et\u00a0al (2020) Federated learning and differential privacy: Software tools analysis, the sherpa.ai fl framework and methodological guidelines for preserving data privacy. Information Fusion 64. https:\/\/doi.org\/10.1016\/j.inffus.2020.07.009","DOI":"10.1016\/j.inffus.2020.07.009"},{"issue":"1","key":"11036_CR145","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1038\/s41597-022-01894-2","volume":"9","author":"J S\u00e1inz-Pardo D\u00edaz","year":"2022","unstructured":"S\u00e1inz-Pardo D\u00edaz J, L\u00f3pez Garc\u00eda \u00c1 (2022) A python library to check the level of anonymity of a dataset. Scientific Data 9(1):785. https:\/\/doi.org\/10.1038\/s41597-022-01894-2","journal-title":"Scientific Data"},{"key":"11036_CR146","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.neucom.2022.11.011","volume":"518","author":"J S\u00e1inz-Pardo D\u00edaz","year":"2023","unstructured":"S\u00e1inz-Pardo D\u00edaz J, L\u00f3pez Garc\u00eda \u00c1 (2023) Study of the performance and scalability of federated learning for medical imaging with intermittent clients. Neurocomputing 518:142\u2013154. https:\/\/doi.org\/10.1016\/j.neucom.2022.11.011","journal-title":"Neurocomputing"},{"key":"11036_CR147","doi-asserted-by":"publisher","unstructured":"S\u00e1inz-Pardo\u00a0D\u00edaz J, L\u00f3pez\u00a0Garc\u00eda \u00c1 (2023a) Comparison of machine learning models applied on anonymized data with different techniques. In: 2023 IEEE International Conference on Cyber Security and Resilience (CSR), pp 618\u2013623, https:\/\/doi.org\/10.1109\/CSR57506.2023.10224917","DOI":"10.1109\/CSR57506.2023.10224917"},{"issue":"1","key":"11036_CR148","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-023-00144-1","volume":"6","author":"MU Sardar","year":"2023","unstructured":"Sardar MU, Fetzer C (2023) Confidential computing and related technologies: a critical review. Cybersecurity 6(1):1\u20137. https:\/\/doi.org\/10.1186\/s42400-023-00144-1","journal-title":"Cybersecurity"},{"key":"11036_CR149","unstructured":"Scontain (2023) SCONE Confidential Computing - Protect your data, code & secrets. https:\/\/sconedocs.github.io\/, accessed on 21.12.2023"},{"key":"11036_CR150","unstructured":"SEAL (2023) Microsoft SEAL is an easy-to-use and powerful homomorphic encryption library. https:\/\/github.com\/microsoft\/SEAL, Accessed on 12.12.2023"},{"key":"11036_CR151","unstructured":"SecretFlow (2023) SecretFlow - A unified framework for privacy-preserving data analysis and machine learning. https:\/\/github.com\/secretflow\/secretflow, Accessed on 12.12.2023"},{"issue":"4","key":"11036_CR152","first-page":"13","volume":"5","author":"C Shearer","year":"2000","unstructured":"Shearer C (2000) The crisp-dm model: the new blueprint for data mining. Journal of Data Warehousing 5(4):13\u201322","journal-title":"Journal of Data Warehousing"},{"key":"11036_CR153","doi-asserted-by":"publisher","unstructured":"Shi Y, Gao H, Avestimehr S, et\u00a0al (2022) Experimenting fedml and nvflare for federated tumor segmentation challenge. In: International MICCAI Brainlesion Workshop, Springer, pp 228\u2013240, https:\/\/doi.org\/10.1007\/978-3-031-44153-0_22","DOI":"10.1007\/978-3-031-44153-0_22"},{"key":"11036_CR154","unstructured":"Shoham N, Avidor T, Keren A, et\u00a0al (2019) Overcoming forgetting in federated learning on non-iid data. arXiv:1910.07796"},{"key":"11036_CR155","doi-asserted-by":"publisher","unstructured":"Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 1310\u20131321,https:\/\/doi.org\/10.1145\/2810103.2813687","DOI":"10.1145\/2810103.2813687"},{"issue":"2","key":"11036_CR156","doi-asserted-by":"publisher","first-page":"e1486","DOI":"10.1002\/widm.1486","volume":"13","author":"PR Silva","year":"2023","unstructured":"Silva PR, Vinagre J, Gama J (2023) Towards federated learning: An overview of methods and applications. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 13(2):e1486. https:\/\/doi.org\/10.1002\/widm.1486","journal-title":"Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"},{"key":"11036_CR157","doi-asserted-by":"publisher","first-page":"102488","DOI":"10.1016\/j.cose.2021.102488","volume":"111","author":"D Slijep\u010devi\u0107","year":"2021","unstructured":"Slijep\u010devi\u0107 D, Henzl M, Klausner LD et al (2021) k-anonymity in practice: How generalisation and suppression affect machine learning classifiers. Computers and Security 111:102488. https:\/\/doi.org\/10.1016\/j.cose.2021.102488","journal-title":"Computers and Security"},{"key":"11036_CR158","first-page":"694","volume":"4","author":"J So","year":"2022","unstructured":"So J, He C, Yang CS et al (2022) Lightsecagg: a lightweight and versatile design for secure aggregation in federated learning. Proceedings of Machine Learning and Systems 4:694\u2013720","journal-title":"Proceedings of Machine Learning and Systems"},{"key":"11036_CR159","doi-asserted-by":"publisher","first-page":"97495","DOI":"10.1109\/ACCESS.2022.3204037","volume":"10","author":"EU Soykan","year":"2022","unstructured":"Soykan EU, Kara\u00e7ay L, Karako\u00e7 F et al (2022) A survey and guideline on privacy enhancing technologies for collaborative machine learning. IEEE Access 10:97495\u201397519. https:\/\/doi.org\/10.1109\/ACCESS.2022.3204037","journal-title":"IEEE Access"},{"key":"11036_CR160","unstructured":"StanfordVisionLab (2020) ImageNet - image database organized according to the WordNet hierarchy. https:\/\/www.image-net.org\/, Accessed on 12.01.2024"},{"issue":"8","key":"11036_CR161","doi-asserted-by":"publisher","first-page":"6125","DOI":"10.1007\/s10462-022-10141-4","volume":"55","author":"W Su","year":"2022","unstructured":"Su W, Li L, Liu F et al (2022) Ai on the edge: a comprehensive review. Artificial Intelligence Review 55(8):6125\u20136183. https:\/\/doi.org\/10.1007\/s10462-022-10141-4","journal-title":"Artificial Intelligence Review"},{"issue":"05","key":"11036_CR162","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(05):557\u2013570. https:\/\/doi.org\/10.1142\/S0218488502001648","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"11036_CR163","unstructured":"SwiftSyft (2023) OpenMined\/SwiftSyft - The official Syft worker for iOS, built in Swift. https:\/\/github.com\/OpenMined\/SwiftSyft, Accessed on 12.12.2023"},{"key":"11036_CR164","unstructured":"Syft.js (2023) OpenMined\/Syft.js - The official Syft worker for Web and Node, built in Javascript. https:\/\/github.com\/OpenMined\/syft.js\/, Accessed on 12.12.2023"},{"key":"11036_CR165","unstructured":"SyMPC (2023) A SMPC companion library for Syft. https:\/\/github.com\/OpenMined\/SyMPC , Accessed on 12.12.2023"},{"key":"11036_CR166","doi-asserted-by":"publisher","unstructured":"Ta\u00efk A, Cherkaoui S (2020) Electrical load forecasting using edge computing and federated learning. In: ICC 2020-2020 IEEE international conference on communications (ICC), IEEE, pp 1\u20136, https:\/\/doi.org\/10.1109\/ICC40277.2020.9148937","DOI":"10.1109\/ICC40277.2020.9148937"},{"key":"11036_CR167","unstructured":"Taylor R, Kardas M, Cucurull G, et\u00a0al (2022) Galactica: A large language model for science. arXiv:2211.09085"},{"key":"11036_CR168","unstructured":"TenSEAL (2023) A library for doing homomorphic encryption operations on tensors. https:\/\/github.com\/OpenMined\/TenSEAL, Accessed on 12.12.2023"},{"key":"11036_CR169","unstructured":"Tensorflow (2023a) Tensorflow - An Open Source Machine Learning Framework for Everyone. https:\/\/github.com\/tensorflow\/tensorflow, Accessed on 12.12.2023"},{"key":"11036_CR170","unstructured":"Tensorflow (2023b) Tensorflow - An Open Source Machine Learning Framework for Everyone. https:\/\/www.tensorflow.org\/, Accessed on 27.11.2023"},{"key":"11036_CR171","unstructured":"TensorFlow-XLA (2024) XLA (Accelerated Linear Algebra) open-source compiler for machine learning. https:\/\/www.tensorflow.org\/xla, Accessed on 12.01.2024"},{"key":"11036_CR172","unstructured":"TF-Encrypted (2023) Encrypted Deep Learning in Tensorflow. https:\/\/tf-encrypted.io\/, Accessed on 27.11.2023"},{"key":"11036_CR173","unstructured":"TF-Federated (2023) Tensorflow Federated: Machine Learning on Decentralized Data. https:\/\/www.tensorflow.org\/federated, Accessed on 27.11.2023"},{"key":"11036_CR174","unstructured":"TF-Federated (2024) Differential Privacy in TensorFlow Federated. https:\/\/www.tensorflow.org\/federated\/tutorials\/federated_learning_with_differential_privacy, Accessed on 02.02.2024"},{"key":"11036_CR175","unstructured":"TF-Federated-doc (2024) Federated Core. https:\/\/www.tensorflow.org\/federated\/federated_core, Accessed on 04.02.2024"},{"key":"11036_CR176","unstructured":"TF-Privacy (2023) Library for training machine learning models with privacy for training data. https:\/\/github.com\/tensorflow\/privacy, Accessed on 27.11.2023"},{"key":"11036_CR177","doi-asserted-by":"crossref","unstructured":"Thapa C, Arachchige PCM, Camtepe S, et\u00a0al (2022) Splitfed: When federated learning meets split learning. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp 8485\u20138493, https:\/\/ojs.aaai.org\/index.php\/AAAI\/article\/download\/20825\/20584","DOI":"10.1609\/aaai.v36i8.20825"},{"key":"11036_CR178","doi-asserted-by":"publisher","first-page":"102402","DOI":"10.1016\/j.cose.2021.102402","volume":"110","author":"N Truong","year":"2021","unstructured":"Truong N, Sun K, Wang S et al (2021) Privacy preservation in federated learning: An insightful survey from the gdpr perspective. Computers and Security 110:102402. https:\/\/doi.org\/10.1016\/j.cose.2021.102402","journal-title":"Computers and Security"},{"key":"11036_CR179","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2024.3408921","author":"O Urmonov","year":"2024","unstructured":"Urmonov O, Sajid S, Aziz Z et al (2024) Federated object detection scenarios for intelligent vehicles: Review, case studies, experiments and discussions. IEEE Transactions on Intelligent Vehicles. https:\/\/doi.org\/10.1109\/TIV.2024.3408921","journal-title":"IEEE Transactions on Intelligent Vehicles"},{"key":"11036_CR180","unstructured":"Vepakomma P, Gupta O, Swedish T, et\u00a0al (2018) Split learning for health: Distributed deep learning without sharing raw patient data. arXiv:1812.00564"},{"issue":"2","key":"11036_CR181","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3377454","volume":"53","author":"J Verbraeken","year":"2020","unstructured":"Verbraeken J, Wolting M, Katzy J et al (2020) A survey on distributed machine learning. ACM Computing Surveys (csur) 53(2):1\u201333. https:\/\/doi.org\/10.1145\/3377454","journal-title":"ACM Computing Surveys (csur)"},{"key":"11036_CR182","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei K, Li J, Ding M et al (2020) Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Information Forensics and Security 15:3454\u20133469. https:\/\/doi.org\/10.1109\/TIFS.2020.2988575","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"11036_CR183","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s13042-022-01647-y","volume":"14","author":"J Wen","year":"2023","unstructured":"Wen J, Zhang Z, Lan Y et al (2023) A survey on federated learning: challenges and applications. International Journal of Machine Learning and Cybernetics 14(2):513\u2013535. https:\/\/doi.org\/10.1007\/s13042-022-01647-y","journal-title":"International Journal of Machine Learning and Cybernetics"},{"key":"11036_CR184","unstructured":"XGBoost (2023) XGBoost - Scalable, Portable and Distributed Gradient Boosting (GBDT, GBRT or GBM) Library, for Python, R, Java, Scala, C++ and more. Runs on single machine, Hadoop, Spark, Dask, Flink and DataFlow. https:\/\/github.com\/apache\/mxnet, Accessed on 12.12.2023"},{"key":"11036_CR185","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41666-020-00082-4","volume":"5","author":"J Xu","year":"2021","unstructured":"Xu J, Glicksberg BS, Su C et al (2021) Federated learning for healthcare informatics. Journal of Healthcare Informatics Research 5:1\u201319. https:\/\/doi.org\/10.1007\/s41666-020-00082-4","journal-title":"Journal of Healthcare Informatics Research"},{"key":"11036_CR186","doi-asserted-by":"crossref","unstructured":"Yang X (2023) A historical review of collaborative learning and cooperative learning. TechTrends pp 1\u201311. https:\/\/doi.org\/0.1007\/s11528-022-00823-9","DOI":"10.1007\/s11528-022-00823-9"},{"issue":"2","key":"11036_CR187","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang Q, Liu Y, Chen T et al (2019) Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) 10(2):1\u201319. https:\/\/doi.org\/10.1145\/3298981","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"11036_CR188","doi-asserted-by":"publisher","unstructured":"Yang Y, Shen W, Ruan B, et\u00a0al (2021) Security challenges in the container cloud. In: 2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), IEEE, pp 137\u2013145, https:\/\/doi.org\/10.1109\/TPSISA52974.2021.00016","DOI":"10.1109\/TPSISA52974.2021.00016"},{"key":"11036_CR189","doi-asserted-by":"publisher","unstructured":"Yi X, Paulet R, Bertino E (2014) Homomorphic encryption. In: Homomorphic Encryption and Applications. Springer, p 27\u201346, https:\/\/doi.org\/10.1007\/978-3-319-12229-8_2","DOI":"10.1007\/978-3-319-12229-8_2"},{"key":"11036_CR190","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3407584","author":"L Yuan","year":"2024","unstructured":"Yuan L, Wang Z, Sun L et al (2024) Decentralized federated learning: A survey and perspective. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2024.3407584","journal-title":"IEEE Internet of Things Journal"},{"key":"11036_CR191","doi-asserted-by":"publisher","unstructured":"Yu M, Tian Y, Ji B, et\u00a0al (2022) Gadget: Online resource optimization for scheduling ring-all-reduce learning jobs. In: IEEE INFOCOM 2022-IEEE Conference on Computer Communications, IEEE, pp 1569\u20131578,https:\/\/doi.org\/10.1109\/INFOCOM48880.2022.9796785","DOI":"10.1109\/INFOCOM48880.2022.9796785"},{"key":"11036_CR192","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.ins.2018.10.024","volume":"476","author":"C Zhao","year":"2019","unstructured":"Zhao C, Zhao S, Zhao M et al (2019) Secure multi-party computation: theory, practice and applications. Information Sciences 476:357\u2013372. https:\/\/doi.org\/10.1016\/j.ins.2018.10.024","journal-title":"Information Sciences"},{"key":"11036_CR193","doi-asserted-by":"publisher","unstructured":"Ziller A, Trask A, Lopardo A, et\u00a0al (2021) PySyft: A Library for Easy Federated Learning, Springer International Publishing, Cham, pp 111\u2013139. https:\/\/doi.org\/10.1007\/978-3-030-70604-3_5,","DOI":"10.1007\/978-3-030-70604-3_5"}],"container-title":["Artificial Intelligence Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-024-11036-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10462-024-11036-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10462-024-11036-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T04:07:47Z","timestamp":1747973267000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10462-024-11036-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,20]]},"references-count":193,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["11036"],"URL":"https:\/\/doi.org\/10.1007\/s10462-024-11036-2","relation":{},"ISSN":["1573-7462"],"issn-type":[{"value":"1573-7462","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,20]]},"assertion":[{"value":"17 November 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2025","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"minor space in body of the text has been corrected","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"51"}}