{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:01:08Z","timestamp":1773511268099,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"publisher","award":["BI 2492\/1-1,WA 3907\/7-1"],"award-info":[{"award-number":["BI 2492\/1-1,WA 3907\/7-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,24]]},"DOI":"10.1109\/itw61385.2024.10807034","type":"proceedings-article","created":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T19:18:57Z","timestamp":1735586337000},"page":"223-228","source":"Crossref","is-referenced-by-count":9,"title":["Byzantine-Resilient Secure Aggregation for Federated Learning Without Privacy Compromises"],"prefix":"10.1109","author":[{"given":"Yue","family":"Xia","sequence":"first","affiliation":[{"name":"School of Computation, Information and Technology, Technical University of Munich,Munich,Germany"}]},{"given":"Christoph","family":"Hofmeister","sequence":"additional","affiliation":[{"name":"School of Computation, Information and Technology, Technical University of Munich,Munich,Germany"}]},{"given":"Maximilian","family":"Egger","sequence":"additional","affiliation":[{"name":"School of Computation, Information and Technology, Technical University of Munich,Munich,Germany"}]},{"given":"Rawad","family":"Bitar","sequence":"additional","affiliation":[{"name":"School of Computation, Information and Technology, Technical University of Munich,Munich,Germany"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"McMahan","year":"2017","journal-title":"Artificial intelligence and statistics"},{"key":"ref2","article-title":"Deep leakage from gradients","volume":"32","author":"Zhu","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref3","first-page":"16937","article-title":"Inverting gradients-how easy is it to break privacy in federated learning?","volume":"33","author":"Geiping","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref7","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume":"30","author":"Blanchard","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref8","first-page":"5650","article-title":"Byzantine-robust distributed learning: Towards optimal statistical rates","volume-title":"International Conference on Machine Learning","author":"Yin"},{"key":"ref9","first-page":"3521","article-title":"The hidden vulnerability of distributed learning in byzantium","volume-title":"International Conference on Machine Learning","author":"Guerraoui"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i8.20903"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-0688-4"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3041404"},{"key":"ref14","first-page":"2302","article-title":"Byzantine-resistant secure aggregation for federated learning based on coded computing and vector commitment","author":"Jahani-Nezhad","year":"2023","journal-title":"arXiv e-prints"},{"key":"ref15","article-title":"Secure byzantine-robust machine learning","author":"He","year":"2020","journal-title":"arXiv preprint"},{"key":"ref16","article-title":"Secure byzantine-robust distributed learning via clustering","author":"Velicheti","year":"2021","journal-title":"arXiv preprint"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488014"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3169918"},{"key":"ref19","article-title":"Fedgt: Identification of malicious clients in federated learning with secure aggregation","author":"Xhemrishi","year":"2023","journal-title":"arXiv preprint"},{"key":"ref20","first-page":"1215","article-title":"Lagrange coded computing: Optimal design for resiliency, security, and privacy","volume-title":"The 22nd International Conference on Artificial Intelligence and Statistics","author":"Yu"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-015-9214-4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/277697.277716"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/358746.358762"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref26","first-page":"3056","article-title":"The fundamental price of secure aggregation in differentially private federated learning","volume-title":"International Conference on Machine Learning.","author":"Chen"},{"key":"ref27","first-page":"1605","article-title":"Local model poisoning attacks to byzantine-robust federated learning","author":"Fang","year":"2020","journal-title":"USENIX security symposium"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT54713.2023.10206717"}],"event":{"name":"2024 IEEE Information Theory Workshop (ITW)","location":"Shenzhen, China","start":{"date-parts":[[2024,11,24]]},"end":{"date-parts":[[2024,11,28]]}},"container-title":["2024 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10806859\/10806904\/10807034.pdf?arnumber=10807034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T06:22:07Z","timestamp":1735626127000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10807034\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,24]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/itw61385.2024.10807034","relation":{},"subject":[],"published":{"date-parts":[[2024,11,24]]}}}