{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:34:38Z","timestamp":1771698878888,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,5]],"date-time":"2021-09-05T00:00:00Z","timestamp":1630800000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,5]]},"DOI":"10.1109\/iscc53001.2021.9631491","type":"proceedings-article","created":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T15:46:50Z","timestamp":1639583210000},"page":"1-6","source":"Crossref","is-referenced-by-count":10,"title":["Towards a Peer-to-Peer Federated Machine Learning Environment for Continuous Authentication"],"prefix":"10.1109","author":[{"given":"David","family":"Monschein","sequence":"first","affiliation":[]},{"given":"Jose Antonio","family":"Peregrina Perez","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Piotrowski","sequence":"additional","affiliation":[]},{"given":"Zoltan","family":"Nochta","sequence":"additional","affiliation":[]},{"given":"Oliver P.","family":"Waldhorst","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Zirpins","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB52358.2021.9484338"},{"key":"ref32","article-title":"Adaptive federated optimization","author":"reddi","year":"2021","journal-title":"International Conference on Learning Representations"},{"key":"ref31","article-title":"Federated learning: Strategies for improving communication efficiency","author":"konecny","year":"2016","journal-title":"NIPS Workshop on Private Multi-Party Machine Learning PMPML '16"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23240"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS.2019.8892848"},{"key":"ref34","first-page":"473","article-title":"Personalized and private peer-to-peer machine learning","volume":"84","author":"bellet","year":"2018","journal-title":"AISTATS"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03251-7_27"},{"key":"ref11","first-page":"79","article-title":"Can I get your digits&#x201D;: Illegal acquisition of wireless phone numbers for sim-swap attacks and wireless provider liability","volume":"16","author":"andrews","year":"2018","journal-title":"Journal of Northwestern"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49669-2_19"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3347450.3357663"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LCN52139.2021.9524959"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2018.8489605"},{"key":"ref17","article-title":"Braintorrent: A peer-to-peer environment for decentralized federated learning","volume":"abs 1905 6731","author":"roy","year":"2019","journal-title":"CoRR"},{"key":"ref18","article-title":"GAMIN: an adversarial approach to black-box model inversion","volume":"abs 1909 11835","author":"aivodji","year":"2019","journal-title":"CoRR"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1561\/3300000019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-38557-6_2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629210"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/QRS51102.2020.00026"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WORKS49585.2019.00006"},{"key":"ref6","article-title":"Federated learning for mobile keyboard prediction","volume":"abs 1811 3604","author":"hard","year":"2018","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2020.101493"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/0015198X.2019.1593766"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1891879.1891881"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/cryptography2010001"},{"key":"ref9","first-page":"357","article-title":"A usability study of five two-factor authentication methods","author":"reese","year":"2019","journal-title":"Proc s15th USENIX Symp on Usable Privacy and Security (SOUPS)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103080"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2905055.2905316"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-020-00305-w"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W52860.2021.00034"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1996.11518099"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102402"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_11"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"}],"event":{"name":"2021 IEEE Symposium on Computers and Communications (ISCC)","location":"Athens, Greece","start":{"date-parts":[[2021,9,5]]},"end":{"date-parts":[[2021,9,8]]}},"container-title":["2021 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9631377\/9631248\/09631491.pdf?arnumber=9631491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:54:23Z","timestamp":1652187263000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9631491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,5]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/iscc53001.2021.9631491","relation":{},"subject":[],"published":{"date-parts":[[2021,9,5]]}}}