{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:07:45Z","timestamp":1766268465185,"version":"3.44.0"},"reference-count":82,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T00:00:00Z","timestamp":1693180800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100013804","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013804","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62122042","62202273","62302247"],"award-info":[{"award-number":["62122042","62202273","62302247"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2021QF044","ZR2022QF140","ZR2022ZD02"],"award-info":[{"award-number":["ZR2021QF044","ZR2022QF140","ZR2022ZD02"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2022JC016"],"award-info":[{"award-number":["2022JC016"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1016\/j.hcc.2023.100150","type":"journal-article","created":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T01:18:21Z","timestamp":1693790301000},"page":"100150","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"title":["Trustworthy decentralized collaborative learning for edge intelligence: A survey"],"prefix":"10.1016","volume":"3","author":[{"given":"Dongxiao","family":"Yu","sequence":"first","affiliation":[]},{"given":"Zhenzhen","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Shuzhen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Qiao","sequence":"additional","affiliation":[]},{"given":"Yangyang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4579-5380","authenticated-orcid":false,"given":"Yifei","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"11","key":"10.1016\/j.hcc.2023.100150_b1","doi-asserted-by":"crossref","first-page":"1778","DOI":"10.1109\/JPROC.2021.3119950","article-title":"Edge intelligence: Empowering intelligence to the edge of network","volume":"109","author":"Xu","year":"2021","journal-title":"Proc. IEEE"},{"issue":"8","key":"10.1016\/j.hcc.2023.100150_b2","doi-asserted-by":"crossref","first-page":"7457","DOI":"10.1109\/JIOT.2020.2984887","article-title":"Edge intelligence: The confluence of edge computing and artificial intelligence","volume":"7","author":"Deng","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"8","key":"10.1016\/j.hcc.2023.100150_b3","doi-asserted-by":"crossref","first-page":"1738","DOI":"10.1109\/JPROC.2019.2918951","article-title":"Edge intelligence: Paving the last mile of artificial intelligence with edge computing","volume":"107","author":"Zhou","year":"2019","journal-title":"Proc. IEEE"},{"year":"2022","series-title":"Decentralized federated learning: Fundamentals, state-of-the-art, frameworks, trends, and challenges","author":"Beltr\u00e1n","key":"10.1016\/j.hcc.2023.100150_b4"},{"issue":"6","key":"10.1016\/j.hcc.2023.100150_b5","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1109\/TAI.2021.3133819","article-title":"Decentralized deep learning for multi-access edge computing: A survey on communication efficiency and trustworthiness","volume":"3","author":"Sun","year":"2021","journal-title":"IEEE Trans. Artif. Intell."},{"year":"2022","series-title":"A survey of decentralized online learning","author":"Li","key":"10.1016\/j.hcc.2023.100150_b6"},{"key":"10.1016\/j.hcc.2023.100150_b7","first-page":"8054","article-title":"A scalable approach for privacy-preserving collaborative machine learning","volume":"33","author":"So","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"year":"2022","series-title":"Privacy-preserving decentralized deep learning with multiparty homomorphic encryption","author":"Xu","key":"10.1016\/j.hcc.2023.100150_b8"},{"issue":"2s","key":"10.1016\/j.hcc.2023.100150_b9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3426474","article-title":"Privacy-preserving decentralized learning framework for healthcare system","volume":"17","author":"Kasyap","year":"2021","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl. (TOMM)"},{"year":"2023","series-title":"Secure and private vickrey auction protocols: A secure multiparty computation approach","author":"Klinger","key":"10.1016\/j.hcc.2023.100150_b10"},{"key":"10.1016\/j.hcc.2023.100150_b11","doi-asserted-by":"crossref","DOI":"10.1109\/TCSVT.2023.3234278","article-title":"Secure decentralized image classification with multiparty homomorphic encryption","author":"Xu","year":"2023","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"year":"2021","series-title":"Secure linear aggregation using decentralized threshold additive homomorphic encryption for federated learning","author":"Tian","key":"10.1016\/j.hcc.2023.100150_b12"},{"issue":"4","key":"10.1016\/j.hcc.2023.100150_b13","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1109\/TETC.2020.2983007","article-title":"A blockchain-powered decentralized and secure computing paradigm","volume":"9","author":"Mendis","year":"2020","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"10.1016\/j.hcc.2023.100150_b14","series-title":"2022 31st Wireless and Optical Communications Conference (WOCC)","first-page":"85","article-title":"A three-layer security assurance model for a decentralized federated learning system","author":"Liu","year":"2022"},{"key":"10.1016\/j.hcc.2023.100150_b15","series-title":"2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)","first-page":"447","article-title":"TEE-based decentralized recommender systems: The raw data sharing redemption","author":"Dhasade","year":"2022"},{"year":"2023","series-title":"DECLOAK: Enable secure and cheap multi-party transactions on legacy blockchains by a minimally trusted TEE network","author":"Ren","key":"10.1016\/j.hcc.2023.100150_b16"},{"key":"10.1016\/j.hcc.2023.100150_b17","series-title":"23rd Annual Symposium on Foundations of Computer Science (Sfcs 1982)","first-page":"160","article-title":"Protocols for secure computations","author":"Yao","year":"1982"},{"issue":"11","key":"10.1016\/j.hcc.2023.100150_b18","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest","year":"1978","journal-title":"Found. Secure Comput."},{"key":"10.1016\/j.hcc.2023.100150_b19","series-title":"GLOBECOM 2022-2022 IEEE Global Communications Conference","first-page":"287","article-title":"Privacy-preserving and efficient decentralized federated learning-based energy theft detector","author":"Ibrahem","year":"2022"},{"issue":"3","key":"10.1016\/j.hcc.2023.100150_b20","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/3313109","article-title":"Trustworthy machine learning and artificial intelligence","volume":"25","author":"Varshney","year":"2019","journal-title":"XRDS: Crossroads ACM Mag. Students"},{"key":"10.1016\/j.hcc.2023.100150_b21","series-title":"2022 4th International Conference on Data Intelligence and Security (ICDIS)","first-page":"336","article-title":"Generative data augmentation for non-IID problem in decentralized clinical machine learning","author":"Wang","year":"2022"},{"year":"2019","series-title":"Decentralized learning of generative adversarial networks from non-iid data","author":"Yonetani","key":"10.1016\/j.hcc.2023.100150_b22"},{"year":"2021","series-title":"Decentralized federated learning of deep neural networks on non-iid data","author":"Onoszko","key":"10.1016\/j.hcc.2023.100150_b23"},{"key":"10.1016\/j.hcc.2023.100150_b24","series-title":"International Conference on Machine Learning","first-page":"4848","article-title":"D2: Decentralized training over decentralized data","author":"Tang","year":"2018"},{"year":"2021","series-title":"Quasi-global momentum: Accelerating decentralized deep learning on heterogeneous data","author":"Lin","key":"10.1016\/j.hcc.2023.100150_b25"},{"key":"10.1016\/j.hcc.2023.100150_b26","series-title":"International Conference on Machine Learning","first-page":"3036","article-title":"Cross-gradient aggregation for decentralized learning from non-iid data","author":"Esfandiari","year":"2021"},{"year":"2022","series-title":"Neighborhood gradient clustering: An efficient decentralized learning method for non-iid data distributions","author":"Aketi","key":"10.1016\/j.hcc.2023.100150_b27"},{"year":"2023","series-title":"Homogenizing non-IID datasets via in-distribution knowledge distillation for decentralized learning","author":"Ravikumar","key":"10.1016\/j.hcc.2023.100150_b28"},{"issue":"3","key":"10.1016\/j.hcc.2023.100150_b29","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1109\/TPAMI.2017.2682082","article-title":"Collaborative active visual recognition from crowds: A distributed ensemble approach","volume":"40","author":"Hua","year":"2017","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"3","key":"10.1016\/j.hcc.2023.100150_b30","first-page":"1","article-title":"Online and distributed robust regressions with extremely noisy labels","volume":"16","author":"Lei","year":"2021","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"issue":"5","key":"10.1016\/j.hcc.2023.100150_b31","doi-asserted-by":"crossref","first-page":"3700","DOI":"10.1109\/TSG.2022.3176246","article-title":"Decentralized moving target defense for microgrid protection against false-data injection attacks","volume":"13","author":"Giraldo","year":"2022","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.hcc.2023.100150_b32","series-title":"International Symposium on Foundations and Practice of Security","first-page":"322","article-title":"Decentralized vision-based byzantine agent detection in multi-robot systems with iota smart contracts","author":"Salimpour","year":"2022"},{"issue":"6","key":"10.1016\/j.hcc.2023.100150_b33","doi-asserted-by":"crossref","first-page":"4096","DOI":"10.1109\/TCSVT.2021.3116976","article-title":"Byzantine-resilient decentralized stochastic gradient descent","volume":"32","author":"Guo","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"10.1016\/j.hcc.2023.100150_b34","doi-asserted-by":"crossref","DOI":"10.1016\/j.sigpro.2021.108020","article-title":"Byzantine-robust decentralized stochastic optimization over static and time-varying networks","volume":"183","author":"Peng","year":"2021","journal-title":"Signal Process."},{"year":"2022","series-title":"Byzantine-resilient decentralized stochastic optimization with robust aggregation rules","author":"Wu","key":"10.1016\/j.hcc.2023.100150_b35"},{"key":"10.1016\/j.hcc.2023.100150_b36","series-title":"ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","first-page":"5223","article-title":"Byzantine-robust and communication-efficient distributed non-convex learning over non-iid data","author":"He","year":"2022"},{"year":"2023","series-title":"Labeling chaos to learning harmony: Federated learning with noisy labels","author":"Tsouvalas","key":"10.1016\/j.hcc.2023.100150_b37"},{"key":"10.1016\/j.hcc.2023.100150_b38","first-page":"1","article-title":"Robust bi-tempered logistic loss based on bregman divergences","volume":"32","author":"Amid","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.hcc.2023.100150_b39","first-page":"1","article-title":"When does label smoothing help?","volume":"32","author":"M\u00fcller","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.hcc.2023.100150_b40","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1613\/jair.1.12125","article-title":"Confident learning: Estimating uncertainty in dataset labels","volume":"70","author":"Northcutt","year":"2021","journal-title":"J. Artificial Intelligence Res."},{"key":"10.1016\/j.hcc.2023.100150_b41","article-title":"Robust decentralized H\u221e attack-tolerant observer-based team formation network control of large-scale quadrotor UAVs: HJIE-reinforcement learning-based deep neural network method","author":"Chen","year":"2023","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.hcc.2023.100150_b42","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/IOTM.006.2100216","article-title":"Toward scalable and robust AIoT via decentralized federated learning","volume":"5","author":"Pinyoanuntapong","year":"2022","journal-title":"IEEE Internet Things Mag."},{"issue":"2","key":"10.1016\/j.hcc.2023.100150_b43","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3298981","article-title":"Federated machine learning: Concept and applications","volume":"10","author":"Yang","year":"2019","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"10.1016\/j.hcc.2023.100150_b44","series-title":"Advances in Neural Information Processing Systems","first-page":"1098","article-title":"Distributed estimation, information loss and exponential families","author":"Liu","year":"2017"},{"issue":"6","key":"10.1016\/j.hcc.2023.100150_b45","doi-asserted-by":"crossref","first-page":"5211","DOI":"10.1109\/TVT.2021.3064877","article-title":"Decentralized parallel SGD with privacy preservation in vehicular networks","volume":"70","author":"Yu","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"9","key":"10.1016\/j.hcc.2023.100150_b46","doi-asserted-by":"crossref","first-page":"6273","DOI":"10.1109\/TII.2022.3145010","article-title":"Decentralized wireless federated learning with differential privacy","volume":"18","author":"Chen","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"year":"2022","series-title":"Towards private learning on decentralized graphs with local differential privacy","author":"Lin","key":"10.1016\/j.hcc.2023.100150_b47"},{"key":"10.1016\/j.hcc.2023.100150_b48","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103097","article-title":"2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT","author":"Friha","year":"2023","journal-title":"Comput. Secur."},{"key":"10.1016\/j.hcc.2023.100150_b49","series-title":"2020 IEEE International Conference on Big Data (Big Data)","first-page":"3215","article-title":"Broadening differential privacy for deep learning against model inversion attacks","author":"Zhang","year":"2020"},{"year":"2021","series-title":"CrypTen: Secure multi-party computation meets machine learning","author":"Knott","key":"10.1016\/j.hcc.2023.100150_b50"},{"key":"10.1016\/j.hcc.2023.100150_b51","series-title":"2021 IEEE\/ACM 21st International Symposium on Cluster, Cloud and Internet Computing (CCGrid)","first-page":"130","article-title":"Partially encrypted multi-party computation for federated learning","author":"Tran","year":"2021"},{"year":"2021","series-title":"Privacy-preserving machine learning with secure multi-party computation: A case study on membership inference attacks","author":"Liu","key":"10.1016\/j.hcc.2023.100150_b52"},{"key":"10.1016\/j.hcc.2023.100150_b53","series-title":"30th USENIX Security Symposium (USENIX Security 21)","first-page":"1","article-title":"Leakage of dataset properties in multi-party machine learning","author":"Zhang","year":"2021"},{"year":"2021","series-title":"Secure multi-party computation for privacy-preserving machine learning: A survey","author":"Liu","key":"10.1016\/j.hcc.2023.100150_b54"},{"issue":"8","key":"10.1016\/j.hcc.2023.100150_b55","doi-asserted-by":"crossref","first-page":"11633","DOI":"10.1109\/TITS.2021.3105682","article-title":"Privacy-preserving deep learning model for decentralized VANETs using fully homomorphic encryption and blockchain","volume":"23","author":"Liu","year":"2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.hcc.2023.100150_b56","series-title":"International Conference on Algorithms and Architectures for Parallel Processing","first-page":"509","article-title":"Privacy-preserving swarm learning based on homomorphic encryption","author":"Chen","year":"2021"},{"key":"10.1016\/j.hcc.2023.100150_b57","doi-asserted-by":"crossref","unstructured":"M. Fredrikson, S. Jha, T. Ristenpart, Model inversion attacks that exploit confidence information and basic countermeasures, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 1322\u20131333.","DOI":"10.1145\/2810103.2813677"},{"key":"10.1016\/j.hcc.2023.100150_b58","doi-asserted-by":"crossref","unstructured":"B. Hitaj, G. Ateniese, F. Perez-Cruz, Deep models under the gan: information leakage from collaborative deep learning, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 603\u2013618.","DOI":"10.1145\/3133956.3134012"},{"key":"10.1016\/j.hcc.2023.100150_b59","first-page":"2672","article-title":"Generative adversarial nets","author":"Goodfellow","year":"2014","journal-title":"Advances in Neural Information Processing Systems"},{"key":"10.1016\/j.hcc.2023.100150_b60","series-title":"2017 IEEE Symposium on Security and Privacy (SP)","first-page":"3","article-title":"Membership inference attacks against machine learning models","author":"Shokri","year":"2017"},{"key":"10.1016\/j.hcc.2023.100150_b61","series-title":"2018 IEEE Computer Security Foundations Symposium (CSF)","first-page":"268","article-title":"Privacy risk in machine learning: Analyzing the connection to overfitting","author":"Yeom","year":"2018"},{"key":"10.1016\/j.hcc.2023.100150_b62","series-title":"2019 IEEE Symposium on Security and Privacy (SP)","first-page":"691","article-title":"Exploiting unintended feature leakage in collaborative learning","author":"Melis","year":"2019"},{"key":"10.1016\/j.hcc.2023.100150_b63","series-title":"2023 IEEE Symposium on Security and Privacy (SP)","first-page":"400","article-title":"SNAP: Efficient extraction of private properties with poisoning","author":"Chaudhari","year":"2023"},{"key":"10.1016\/j.hcc.2023.100150_b64","doi-asserted-by":"crossref","unstructured":"K. Ganju, Q. Wang, W. Yang, C.A. Gunter, N. Borisov, Property inference attacks on fully connected neural networks using permutation invariant representations, in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, pp. 619\u2013633.","DOI":"10.1145\/3243734.3243834"},{"key":"10.1016\/j.hcc.2023.100150_b65","series-title":"International Colloquium on Automata, Languages, and Programming","first-page":"1","article-title":"Differential privacy","author":"Dwork","year":"2006"},{"key":"10.1016\/j.hcc.2023.100150_b66","doi-asserted-by":"crossref","unstructured":"M. Abadi, A. Chu, I. Goodfellow, H.B. McMahan, I. Mironov, K. Talwar, L. Zhang, Deep learning with differential privacy, in: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 308\u2013318.","DOI":"10.1145\/2976749.2978318"},{"key":"10.1016\/j.hcc.2023.100150_b67","unstructured":"R.C. Geyer, T. Klein, M. Nabi, Differentially private federated learning: A client level perspective, in: NIPS Workshop on Private Multi-Party Machine Learning, 2017."},{"key":"10.1016\/j.hcc.2023.100150_b68","series-title":"IEEE Trans. Inf. Forensics Secur.","first-page":"1333","article-title":"Privacy-preserving deep learning via additively homomorphic encryption","volume":"13","author":"Phong","year":"2018"},{"year":"2023","series-title":"Differentially private decentralized deep learning with consensus algorithms","author":"Bayrooti","key":"10.1016\/j.hcc.2023.100150_b69"},{"issue":"11","key":"10.1016\/j.hcc.2023.100150_b70","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"10.1016\/j.hcc.2023.100150_b71","first-page":"187","article-title":"How to exchange secrets with oblivious transfer","volume":"2005","author":"Rabin","year":"2005","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10.1016\/j.hcc.2023.100150_b72","doi-asserted-by":"crossref","unstructured":"K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H.B. McMahan, S. Patel, D. Ramage, A. Segal, K. Seth, Practical secure aggregation for privacy-preserving machine learning, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 1175\u20131191.","DOI":"10.1145\/3133956.3133982"},{"key":"10.1016\/j.hcc.2023.100150_b73","series-title":"2017 IEEE Symposium on Security and Privacy (SP)","first-page":"19","article-title":"Secureml: A system for scalable privacy-preserving machine learning","author":"Mohassel","year":"2017"},{"key":"10.1016\/j.hcc.2023.100150_b74","doi-asserted-by":"crossref","unstructured":"M.S. Riazi, C. Weinert, O. Tkachenko, E.M. Songhori, T. Schneider, F. Koushanfar, Chameleon: A hybrid secure computation framework for machine learning applications, in: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018, pp. 707\u2013721.","DOI":"10.1145\/3196494.3196522"},{"year":"2009","series-title":"A Fully Homomorphic Encryption Scheme","author":"Gentry","key":"10.1016\/j.hcc.2023.100150_b75"},{"key":"10.1016\/j.hcc.2023.100150_b76","series-title":"International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"223","article-title":"Public-key cryptosystems based on composite degree residuosity classes","author":"Paillier","year":"1999"},{"key":"10.1016\/j.hcc.2023.100150_b77","unstructured":"R. Gilad-Bachrach, N. Dowlin, K. Laine, K. Lauter, M. Naehrig, J. Wernsing, Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy, in: International Conference on Machine Learning, 2016, pp. 201\u2013210."},{"key":"10.1016\/j.hcc.2023.100150_b78","series-title":"Advances in Cryptology \u2013 CRYPTO 2021","first-page":"633","article-title":"The rise of paillier: Homomorphic secret sharing and public-key silent OT","author":"Orlandi","year":"2021"},{"year":"2021","series-title":"Practical defences against model inversion attacks for split neural networks","author":"Titcombe","key":"10.1016\/j.hcc.2023.100150_b79"},{"year":"2022","series-title":"Variational model inversion attacks","author":"Wang","key":"10.1016\/j.hcc.2023.100150_b80"},{"key":"10.1016\/j.hcc.2023.100150_b81","series-title":"Artificial Intelligence and Statistics","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017"},{"key":"10.1016\/j.hcc.2023.100150_b82","first-page":"106","article-title":"Helib\u2013an implementation of homomorphic encryption","volume":"2014","author":"Halevi","year":"2014","journal-title":"IACR Cryptol. ePrint Arch."}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S266729522300048X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S266729522300048X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T08:40:51Z","timestamp":1757407251000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S266729522300048X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":82,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["S266729522300048X"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100150","relation":{},"ISSN":["2667-2952"],"issn-type":[{"type":"print","value":"2667-2952"}],"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Trustworthy decentralized collaborative learning for edge intelligence: A survey","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100150","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100150"}}