{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:53:28Z","timestamp":1730213608156,"version":"3.28.0"},"reference-count":68,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,12]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927802","type":"proceedings-article","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T19:43:02Z","timestamp":1670960582000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Preservation using Federated Learning and Homomorphic Encryption: A Study"],"prefix":"10.1109","author":[{"given":"Ajay D","family":"M","sequence":"first","affiliation":[{"name":"HCL Technologies,Engineering and R&#x0026;D Services (ERS) Research,Chennai,India"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.1145\/3338501.3357370","article-title":"A Hybrid Approach to Privacy-Preserving Federated Learning","author":"truex","year":"2019"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2021.3082561"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00023"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1561\/9781680837896"},{"key":"ref31","first-page":"715","article-title":"Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model&#x2019;s Complexity","author":"parisot","year":"2021","journal-title":"Proceedings of the 18th International Conference on Security and Cryptography SCITEPRESS - Science and Technology Publications"},{"key":"ref30","first-page":"1895","article-title":"Evaluating Differentially Private Machine Learning in Practice","author":"jayaraman","year":"2019","journal-title":"28th USENIX security symposium USENIX security 2019 Santa Clara CA USA"},{"article-title":"Learning Differentially Private Recurrent Language Models","year":"2018","author":"mcmahan","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/IVWorkshops54471.2021.9669214"},{"article-title":"Stealing Hyperparameters in Machine Learning","year":"2019","author":"wang","key":"ref34"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29172-7_11"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS190923022O"},{"journal-title":"Awesome - A curated list of amazing Homomorphic Encryption libraries software and resources","year":"0","author":"schneider","key":"ref61"},{"key":"ref63","first-page":"493","article-title":"Efficient Homomorphic Encryption for {Cross-Silo} Federated Learning","author":"zhang","year":"2020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00129"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.3390\/app12020734"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209744"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"33","DOI":"10.2991\/ijcis.11.1.3","article-title":"CPP-ELM: Cryptographically Privacy-Preserving Extreme Learning Machine for Cloud Systems","volume":"11","author":"\u00e7atak","year":"2018","journal-title":"International Journal of Computational Intelligence Systems"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.3390\/fi13040094"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-021-00105-6"},{"article-title":"Privacy-Preserving Federated Learning Based on Multi-Key Homomorphic Encryption","year":"2021","author":"ma","key":"ref67"},{"journal-title":"NVIDA Technical Blog","article-title":"Clara Train 4.0 Upgrades to MONAI and Supports FL with Homomorphic Encryption","year":"2021","key":"ref68"},{"journal-title":"What is Deep Learning?","year":"0","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-021-00445-7"},{"article-title":"Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning","year":"2021","author":"hu","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS47876.2019.00042"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3023126"},{"key":"ref24","first-page":"8635","article-title":"A Little Is Enough: Circumventing Defenses for Distributed Learning","author":"baruch","year":"2019","journal-title":"Proceedings of the 33rd International Conference on Neural Information Processing Systems Curran Associates Inc"},{"article-title":"How to Backdoor Federated Learning","year":"2019","author":"bagdasaryan","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2959108"},{"article-title":"Local Model Poisoning Attacks to Byzantine-Robust Federated Learning","year":"2021","author":"fang","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857731"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.2196\/medinform.8805"},{"article-title":"A Review of Homomorphic Encryption Libraries for Secure Computation","year":"2018","author":"sathya","key":"ref59"},{"journal-title":"Simple Encrypted Arithmetic Library 2 3 1 Microsoft Research 2017","year":"0","author":"laine","key":"ref58"},{"key":"ref57","article-title":"A Robust and Verifiable Cryptographically Secure Election Scheme","author":"benaloh","year":"1985","journal-title":"26th Annual Symposium on Foundations of Computer Science (sfcs 1985)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_31"},{"article-title":"A Reputation Mechanism Is All You Need: Collaborative Fairness and Adversarial Robustness in Federated Learning","year":"2021","author":"xu","key":"ref54"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0045"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102402"},{"article-title":"Federated Learning Based on Dynamic Regularization","year":"2021","author":"acar","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359660"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3119038"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s41666-020-00082-4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.02.014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3118642"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2021.1936455"},{"article-title":"Can You Really Backdoor Federated Learning?","year":"2019","author":"sun","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108661"},{"article-title":"LoMar: A Local Defense Against Poisoning Attack on Federated Learning","year":"2022","author":"li","key":"ref18"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-58951-6_24","article-title":"Data Poisoning Attacks Against Federated Learning Systems","author":"tolpegin","year":"2020"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2200\/S00960ED2V01Y201910AIM043"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00035"},{"journal-title":"VentureBeat","article-title":"AI Has a Privacy Problem, but These Techniques Could Fix It","year":"0","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3216981"},{"year":"0","key":"ref8","article-title":"Application, Region - Global Forecast to 2027 - Cumulative Impact of COVID-19"},{"key":"ref7","first-page":"235","article-title":"Survey on Federated Learning Towards Privacy Preserving AI","author":"sheela raju","year":"2020","journal-title":"Computer Science &amp; Information Technology (CS &amp; IT)"},{"article-title":"IDLG: Improved Deep Leakage from Gradients","year":"2020","author":"zhao","key":"ref49"},{"journal-title":"Deloitte Insights","article-title":"Keeping AI Private: Homomorphic Encryption and Federated Learning Can Underpin More Private, Secure AI","year":"0","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_2"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93387-0_13"},{"key":"ref41","first-page":"535","author":"chenal","year":"2014","journal-title":"On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes"},{"key":"ref44","first-page":"79:1","article-title":"A Survey on Homomorphic Encryption Schemes: Theory and Implementation","volume":"51","author":"acar","year":"2018","journal-title":"ACM Computing Surveys"},{"article-title":"Applications of Federated Learning in Smart Cities: Recent Advances, Taxonomy, and Open Challenges","year":"2021","author":"zheng","key":"ref43"}],"event":{"name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2022,9,12]]},"location":"Falerna, Italy","end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9927523\/9927699\/09927802.pdf?arnumber=9927802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T20:12:22Z","timestamp":1674504742000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9927802\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,12]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927802","relation":{},"subject":[],"published":{"date-parts":[[2022,9,12]]}}}