{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:21:40Z","timestamp":1775744500577,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T00:00:00Z","timestamp":1673136000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T00:00:00Z","timestamp":1673136000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Federal Ministry of Education and Research","doi-asserted-by":"publisher","award":["16KIS1283"],"award-info":[{"award-number":["16KIS1283"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,8]]},"DOI":"10.1109\/ccnc51644.2023.10060116","type":"proceedings-article","created":{"date-parts":[[2023,3,17]],"date-time":"2023-03-17T17:17:55Z","timestamp":1679073475000},"page":"1-6","source":"Crossref","is-referenced-by-count":25,"title":["Secure Federated Learning: An Evaluation of Homomorphic Encrypted Network Traffic Prediction"],"prefix":"10.1109","author":[{"given":"Sogo Pierre","family":"Sanon","sequence":"first","affiliation":[{"name":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence,Kaiserslautern,D-67663"}]},{"given":"Rekha","family":"Reddy","sequence":"additional","affiliation":[{"name":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence,Kaiserslautern,D-67663"}]},{"given":"Christoph","family":"Lipps","sequence":"additional","affiliation":[{"name":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence,Kaiserslautern,D-67663"}]},{"given":"Hans Dieter","family":"Schotten","sequence":"additional","affiliation":[{"name":"Intelligent Networks Research Group, German Research Center for Artificial Intelligence,Kaiserslautern,D-67663"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2020.3010270"},{"key":"ref2","first-page":"1","article-title":"Managing the Fifth Generation (5G) Wireless Mobile Communication: A Machine Learning Approach for Network Traffic Prediction","volume-title":"Mobile Communication - Technologies and Applications; 26th lTG-Symposium","author":"Baradie"},{"key":"ref3","article-title":"Federated learning: Strategies for improving communication efficiency","author":"Kone\u010dn\u00fd","year":"2016","journal-title":"arXiv preprint"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-021-01506-3"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/app112311191"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2945367"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3414045.3415949"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900461"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/app12020734"},{"key":"ref10","article-title":"Edge Computing and the Fifth Generation (5G) Mobile Communication: A Virtualized, Distributed System Towards a New Networking Concept","volume-title":"Proceedings of the Workshop on Next Generation Networks and Applications (NGNA)","author":"Reddy"},{"key":"ref11","first-page":"301","article-title":"The limitations of federated learning in sybil settings","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)","author":"Fung","year":"2020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3528580.3532845"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS190923022O"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3209811.3212701"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3387108"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1147\/jrd.2019.2913621"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3394658"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_38"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016909652"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2019.8762038"},{"issue":"11","key":"ref21","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest","year":"1978","journal-title":"Foundations of secure computation"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0046"},{"key":"ref25","volume-title":"TenSEAL: A Library for Encrypted Machine Learning Using Homomorphic Encryption","author":"Benaissa","year":"2020"},{"key":"ref26","volume-title":"Private Smart Contracts using Homomorphic Encryption","year":"2022"}],"event":{"name":"2023 IEEE 20th Consumer Communications & Networking Conference (CCNC)","location":"Las Vegas, NV, USA","start":{"date-parts":[[2023,1,8]]},"end":{"date-parts":[[2023,1,11]]}},"container-title":["2023 IEEE 20th Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10059462\/10059600\/10060116.pdf?arnumber=10060116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T01:58:59Z","timestamp":1709431139000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10060116\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/ccnc51644.2023.10060116","relation":{},"subject":[],"published":{"date-parts":[[2023,1,8]]}}}