{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:29:21Z","timestamp":1763202561591,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647773","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["TEE-based Selective Testing of Local Workers in Federated Learning Systems"],"prefix":"10.1109","author":[{"given":"Wensheng","family":"Zhang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Trent","family":"Muhr","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","article-title":"Privacy in deep learning: A survey","volume":"abs 2004 12254","author":"mirshghallah","year":"2020","journal-title":"ArXiv"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1162\/99608f92.cfc5dd25"},{"key":"ref12","article-title":"Cryptonets: applying neural networks to encrypted data with high throughput and accuracy","author":"dowlin","year":"2016","journal-title":"ICML 2016"},{"key":"ref13","article-title":"Secure face matching using fully homomorphic encryption","author":"boddeti","year":"2018","journal-title":"BTAS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00013"},{"key":"ref15","article-title":"Slalom: Fast, verifiable and private execution of neural networks in trusted hardware","volume":"abs 1806 3287","author":"tram\u00e8r","year":"2019","journal-title":"ArXiv"},{"key":"ref16","first-page":"1","article-title":"Intelsgxexplained","author":"costan","year":"2016","journal-title":"IACR Cryptology ePrint"},{"journal-title":"ARM TrustZone Technology","year":"2021","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647773"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00017"},{"key":"ref6","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","author":"blanchard","year":"2017","journal-title":"NIPS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref8","article-title":"Local model poisoning attacks to byzantine-robust federated learning","volume":"abs 1911 11815","author":"fang","year":"2020","journal-title":"ArXiv"},{"key":"ref7","article-title":"Byzantinerobust distributed learning: Towards optimal statistical rates","volume":"abs 1803 1498","author":"yin","year":"2018","journal-title":"ArXiv"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref1","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"AISTATS"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647773.pdf?arnumber=9647773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:50Z","timestamp":1652201990000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647773\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647773","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}