{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:00:09Z","timestamp":1774022409476,"version":"3.50.1"},"reference-count":346,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation of USA","doi-asserted-by":"publisher","award":["2210252"],"award-info":[{"award-number":["2210252"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012389","name":"National Institute of Information and Communications Technology, Japan","doi-asserted-by":"publisher","award":["22403"],"award-info":[{"award-number":["22403"]}],"id":[{"id":"10.13039\/501100012389","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2020-06260"],"award-info":[{"award-number":["RGPIN-2020-06260"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1109\/comst.2024.3486690","type":"journal-article","created":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T13:47:13Z","timestamp":1730123233000},"page":"2505-2542","source":"Crossref","is-referenced-by-count":59,"title":["Privacy-Preserving Data-Driven Learning Models for Emerging Communication Networks: A Comprehensive Survey"],"prefix":"10.1109","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1790-8640","authenticated-orcid":false,"given":"Mostafa M.","family":"Fouda","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, College of Science and Engineering, Idaho State University, Pocatello, ID, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4785-2425","authenticated-orcid":false,"given":"Zubair Md","family":"Fadlullah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Western University, London, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8000-4161","authenticated-orcid":false,"given":"Mohamed I.","family":"Ibrahem","sequence":"additional","affiliation":[{"name":"School of Computer and Cyber Sciences, Augusta University, Augusta, GA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8769-302X","authenticated-orcid":false,"given":"Nei","family":"Kato","sequence":"additional","affiliation":[{"name":"Graduate School of Information Sciences, Tohoku University, Sendai, Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2021.3123267"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2841996"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2444095"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2944748"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2022.3205665"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2949782"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3460427"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IoTaIS56727.2022.9976007"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IoTaIS56727.2022.9975908"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108672"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/icc45041.2023.10278987"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2023.3274145"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2023.3240969"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/jsait.2020.2987203"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.001.2200587"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3073009"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2019.2954595"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2019.2943405"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3200740"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3044966"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2021.3130901"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2021.3089688"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/tai.2021.3111139"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2970550"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3023084"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3219049"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/mci.2022.3180883"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3159694"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3058638"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.3011561"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2021.3108618"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3151670"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2909559"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.2100256"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2021.3139777"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/dsaa49011.2020.00077"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2021.3124476"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.117.2100730"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2021.3131332"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2988293"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3204037"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2020.3034895"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2021.3083597"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2021.3059896"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.131.2200409"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2846401"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2021.3055205"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3197900"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-023-02249-0"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICCONS.2018.8662957"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.34190\/iccws.18.1.983"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.02.080"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.011.2000301"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3000764"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2017.12"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/aina.2015.229"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2962700"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3362246"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/radioelektronika52220.2021.9420191"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2942368"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2020.2976939"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/isvlsi54635.2022.00055"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/sm57895.2023.10112275"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/cis.2015.27"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/snpd.2017.8022711"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/cse-euc.2017.118"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/iccbb.2018.8756496"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ijcnn55064.2022.9892321"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom53373.2021.00172"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2939891"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/phm-yantai55411.2022.9942133"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1600317WC"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/iccc49849.2020.9238931"},{"key":"ref74","article-title":"Efficient UAV physical layer security based on deep learning and artificial noise","author":"Khadem","year":"2020","journal-title":"arXiv:2004.01343"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/icassp43922.2022.9747068"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_16"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/isncc49221.2020.9297246"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3230586"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/globecom48099.2022.10000881"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/southeastcon48659.2022.9764093"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3077897"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3026692"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-x_16"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ccem.2014.7015496"},{"key":"ref85","volume-title":"Analysis of Partially and Fully Homomorphic Encryption","author":"Morris","year":"2013"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref87","volume-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_20"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/focs.2011.12"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31517-1_16"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/isesd53023.2021.9501717"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0071"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata47090.2019.9006231"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/I-SMAC55078.2022.9987407"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/platcon.2016.7456817"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2017.2787987"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2015inp0020"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/mis.2020.2988604"},{"key":"ref103","first-page":"1","article-title":"BatchCrypt: Efficient homomorphic encryption for cross-silo federated learning","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC)","author":"Zhang"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.3390\/fi13040094"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-021-00519-2"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.3390\/app12020734"},{"key":"ref107","article-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption","author":"Hardy","year":"2017","journal-title":"arXiv:1711.10677"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/tpsisa52974.2021.00003"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2024.3426486"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/rait.2018.8389084"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/cc.2015.7122471"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53015-3_12"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_33"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_3"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2925322"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/sfcs.1986.25"},{"key":"ref118","volume-title":"How to exchange secrets with oblivious transfer","author":"Rabin","year":"2005"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335755"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354255"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0053"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161393"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/3195970.3196023"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.21"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330920"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/icccn49398.2020.9209670"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_20"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/3450569.3463572"},{"key":"ref134","first-page":"1","article-title":"FLAME: Taming backdoors in federated learning","volume-title":"Proc. 31st USENIX Security Symp.","author":"Nguyen"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/spw53761.2021.00017"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104468"},{"key":"ref137","first-page":"1","article-title":"Privacy-preserving aggregation of time-series data","volume-title":"Proc. Annu. Netw. Distrib. Syst. Security Symp. (NDSS)","author":"Shi"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/icnp.2012.6459985"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2021.3130060"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/infocom41043.2020.9155359"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/gcwkshps45667.2019.9024520"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2020.3014246"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2952146"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2897005"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2019.2950017"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom50675.2020.00089"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/kse56063.2022.9953788"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/tpsisa52974.2021.00031"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3338027"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/idsta55301.2022.9923037"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2018.8486242"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3001287"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/tcss.2021.3134463"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2021.3073062"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/icinc58035.2022.00040"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/csf.2017.11"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00018"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2018.2805356"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/focs.2013.53"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31594-7_39"},{"key":"ref165","article-title":"Learning differentially private recurrent language models","author":"McMahan","year":"2017","journal-title":"arXiv:1710.06963"},{"key":"ref166","first-page":"7575","article-title":"cpSGD: Communication-efficient and differentially-private distributed SGD","volume-title":"Proc. 32nd Int. Conf. Neural Inf. Process. Syst.","author":"Agarwal"},{"key":"ref167","article-title":"Protection against reconstruction and its applications in private federated learning","author":"Bhowmick","year":"2018","journal-title":"arXiv:1812.00984"},{"key":"ref168","article-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017","journal-title":"arXiv:1712.07557"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3037194"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/icde.2019.00063"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1389735"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/217"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23054"},{"key":"ref175","article-title":"Can you really backdoor federated learning?","author":"Sun","year":"2019","journal-title":"arXiv:1911.07963"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2017.41"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/icccs52626.2021.9449232"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2020.2988575"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24178-9_9"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2015.2484326"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/mm.2017.38"},{"key":"ref182","article-title":"Chiron: Privacy-preserving machine learning as a service","author":"Hunt","year":"2018","journal-title":"arXiv:1803.05961"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1145\/3231594"},{"key":"ref184","article-title":"A survey of published attacks on Intel SGX","author":"Nilsson","year":"2020","journal-title":"arXiv:2006.13598"},{"key":"ref185","article-title":"Mitigating sybils in federated learning poisoning","author":"Fung","year":"2020","journal-title":"arXiv:1808.04866"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3345447"},{"key":"ref187","article-title":"Slalom: Fast, verifiable and private execution of neural networks in trusted hardware","author":"Tramer","year":"2019","journal-title":"arXiv:1806.03287"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/dsn.2019.00044"},{"key":"ref189","article-title":"Efficient deep learning on multi-source private data","author":"Hynes","year":"2018","journal-title":"arXiv:1807.06689"},{"key":"ref190","article-title":"Privacy-preserving inference in machine learning services using trusted execution environments","author":"Narra","year":"2019","journal-title":"arXiv:1912.03485"},{"key":"ref191","article-title":"DarKnight: A data privacy scheme for training and inference of deep neural networks","author":"Hashemi","year":"2020","journal-title":"arXiv:2006.01300"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i17.17746"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.02.037"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-69250-1"},{"key":"ref195","first-page":"1","article-title":"Efficient and private federated learning using TEE","volume-title":"Proc. EuroSys Conf.","author":"Mo"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388946"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466628"},{"key":"ref198","article-title":"Confidential inference via ternary model partitioning","author":"Gu","year":"2020","journal-title":"arXiv:1807.00969"},{"key":"ref199","volume-title":"Simple encrypted arithmetic library - SEAL v2.1","author":"Chen","year":"2017"},{"key":"ref200","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-44371-2_31","volume-title":"Algorithms in HElib","author":"Halevi","year":"2014"},{"key":"ref201","volume-title":"Design and implementation of HElib: A homomorphic encryption library","author":"Halevi","year":"2020"},{"key":"ref202","volume-title":"TFHE: Fast fully homomorphic encryption library","author":"Chillotti","year":"2016"},{"key":"ref203","volume-title":"PALISADE homomorphic encryption software library","author":"Cousins","year":"2019"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29172-7_11"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323047"},{"key":"ref207","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"Proc. 27th USENIX Security Symp. (USENIX Security)","author":"Juvekar"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/tasl.2011.2134090"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_1"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103509"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357371"},{"key":"ref213","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2023","journal-title":"arXiv:1602.05629"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412771"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3053220"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs.2015.10"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3030072"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3180828"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3103320"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3214227"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2986024"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3308991"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/jbhi.2022.3192648"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2021.3098010"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/embc48229.2022.9871742"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/icaiss55157.2022.10010573"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/bigdata52589.2021.9671857"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/i3cs58314.2023.10127502"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.23919\/jcc.2021.07.010"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/dtpi55838.2022.9998967"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/cai54212.2023.00019"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00029"},{"key":"ref233","first-page":"601","article-title":"Stealing machine learning models via prediction APIs","volume-title":"Proc. 25th USENIX Conf. Security Symp.","author":"Tram\u00e8r"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp.2018.00035"},{"key":"ref235","article-title":"Adversarial attacks and defences: A survey","author":"Chakraborty","year":"2018","journal-title":"arXiv:1810.00069"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00065"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2019.8737416"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2917223"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2019.2937484"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2019.00045"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.05.005"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/icc40277.2020.9148628"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2021.3131175"},{"key":"ref245","article-title":"A generic framework for privacy preserving deep learning","author":"Ryffel","year":"2018","journal-title":"arXiv:1811.04017"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/globecom54140.2023.10437327"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/ciss56502.2023.10089719"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr46437.2021.01607"},{"key":"ref249","article-title":"A framework for evaluating gradient leakage attacks in federated learning","author":"Wei","year":"2020","journal-title":"arXiv:2004.10397"},{"key":"ref250","first-page":"14774","article-title":"Deep leakage from gradients","volume-title":"Proc. 33rd Adv. Neural Inf. Process. Syst.","author":"Zhu"},{"key":"ref251","article-title":"iDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020","journal-title":"arXiv:2001.02610"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs51616.2021.00081"},{"key":"ref253","first-page":"7232","article-title":"Evaluating gradient inversion attacks and defenses in federated learning","volume-title":"Proc. 35th Adv. Neural Inf. Process. Syst.","author":"Huang"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.001.2000318"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/mic.2021.3049190"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3028764"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3161148"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/wcnc51071.2022.9771895"},{"key":"ref259","volume-title":"FHEVM Whitepaper","author":"Names","year":"2023"},{"key":"ref260","volume-title":"ZSM\u2014Zero Touch Network & Service Management","year":"2024"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/eucnc\/6gsummit51104.2021.9482503"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/eucnc\/6gsummit54941.2022.9815754"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2023.3268541"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3355462"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2023.3249756"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/cacml55074.2022.00017"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1109\/globecom46510.2021.9685308"},{"key":"ref268","doi-asserted-by":"publisher","DOI":"10.1109\/wcsp58612.2023.10404642"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10436772"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.002.2300640"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68024-3_5"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1109\/wowmom57956.2023.00053"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2024.100204"},{"key":"ref274","volume-title":"Learning Multiple Layers of Features From Tiny Images","author":"Krizhevsky","year":"2009"},{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3031966"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47880-7_25"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.2172\/1842271"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.3390\/s23010294"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2023.100548"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5510857"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.001.1900410"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2844341"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.2981379"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.2999594"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2022.3209200"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2020.3000374"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2021.3074185"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2024.3423718"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1109\/icc51166.2024.10622906"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2023.3349295"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1109\/globecom54140.2023.10437358"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2012.2211477"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108578"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1674"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1109\/tetc.2020.2983007"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.3390\/sym14020195"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2020.2982118"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1109\/ssci50451.2021.9659972"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2888904"},{"key":"ref300","article-title":"Privacy preserving machine learning for electric vehicles: A survey","author":"Sani","year":"2022","journal-title":"arXiv:2205.08462"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1145\/3624010"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1109\/ibcast.2019.8667248"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.10.007"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3087580"},{"key":"ref305","volume-title":"Irish Social Science Data Archive","year":"2020"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3110784"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1109\/jstsp.2018.2833749"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1109\/tsg.2020.2973681"},{"key":"ref309","volume-title":"Top Threats to Cloud Computing: Egregious Eleven","year":"2019"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01076-8"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/icpc2t53885.2022.9776691"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-022-00377-4"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1109\/kse56063.2022.9953624"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68035-0_9"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103737"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2021.3064345"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.12968\/s1353-4858(22)70046-3"},{"key":"ref318","volume-title":"Defense of cyber-physical systems against learning-based attackers","author":"Alisic","year":"2023"},{"key":"ref319","article-title":"HEMET: A homomorphic-encryption-friendly privacy-preserving mobile neural network architecture","author":"Lou","year":"2021","journal-title":"arXiv:2106.00038"},{"key":"ref320","article-title":"Low latency privacy preserving inference","author":"Brutzkus","year":"2019","journal-title":"arXiv:1812.10659"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1109\/iotdi.2018.00024"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.3390\/math11163477"},{"key":"ref323","volume-title":"Post-Quantum Cryptography Guide","year":"2024"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-24082-z"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1140\/epjqt\/s40507-022-00132-3"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1109\/icccmla56841.2022.9989244"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/5874935"},{"key":"ref328","volume-title":"Data Protection Declaration","year":"2024"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20819"},{"key":"ref330","first-page":"9489","article-title":"Personalized federated learning using hypernetworks","volume-title":"Proc. 38th Int. Conf. Mach. Learn.","author":"Shamsian"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1109\/ainit61980.2024.10581694"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i11.21446"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2023.3323129"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2022.3191697"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101876"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.2967734"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2024.103088"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.015.2200462"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2024.3366928"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1177\/15501329221114535"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2021.3053770"},{"key":"ref342","doi-asserted-by":"publisher","DOI":"10.1002\/9781119781042.ch7"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.024794"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2024.04.024"},{"key":"ref345","doi-asserted-by":"publisher","DOI":"10.1109\/iccmc51019.2021.9418424"},{"key":"ref346","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8951961"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/9739\/11123909\/10736556-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9739\/11123909\/10736556.pdf?arnumber=10736556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T18:23:26Z","timestamp":1755282206000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10736556\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":346,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2024.3486690","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8]]}}}