{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T13:31:47Z","timestamp":1777987907709,"version":"3.51.4"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100019779","name":"Qatar National Library","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100019779","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/tifs.2023.3273914","type":"journal-article","created":{"date-parts":[[2023,5,8]],"date-time":"2023-05-08T18:40:27Z","timestamp":1683571227000},"page":"2977-2990","source":"Crossref","is-referenced-by-count":73,"title":["Efficient Verifiable Protocol for Privacy-Preserving Aggregation in Federated Learning"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2849-0569","authenticated-orcid":false,"given":"Tamer","family":"Eltaras","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department, Qatar University, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5639-983X","authenticated-orcid":false,"given":"Farida","family":"Sabry","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Qatar University, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6097-2395","authenticated-orcid":false,"given":"Wadha","family":"Labda","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Qatar University, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2797-2673","authenticated-orcid":false,"given":"Khawla","family":"Alzoubi","sequence":"additional","affiliation":[{"name":"Engineering Technology Department, Community College, Qatar University, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8664-9091","authenticated-orcid":false,"given":"Qutaibah","family":"AHMEDELTARAS","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Qatar University, Doha, Qatar"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.145"},{"key":"ref12","first-page":"2521","article-title":"Shuffled model of differential privacy in federated learning","volume":"130","author":"girgis","year":"2021","journal-title":"Proc 24th Int Conf Artif Intell Statist"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2929409"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3043139"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-9709-8"},{"key":"ref10","article-title":"Secure outsourcing of some computations","author":"atallah","year":"1998"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3140657"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3126323"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref18","article-title":"LDP-FL: Practical private aggregation in federated learning with local differential privacy","author":"sun","year":"2020","journal-title":"arXiv 2007 15789"},{"key":"ref50","article-title":"Learning multiple layers of features from tiny images","author":"krizhevsky","year":"2009"},{"key":"ref46","article-title":"Slalom: Fast, verifiable and private execution of neural networks in trusted hardware","author":"tram\u00e8r","year":"2019","journal-title":"arXiv 1806 03287"},{"key":"ref45","first-page":"1","article-title":"SafetyNets: Verifiable execution of deep neural networks on an untrusted cloud","author":"ghodsi","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref48","article-title":"Federated learning: Strategies for improving communication efficiency","author":"kone?n\u00fd","year":"2016","journal-title":"arXiv 1610 05492"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.3390\/s22051887"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3054610"},{"key":"ref41","article-title":"FastSecAgg: Scalable secure aggregation for privacy-preserving federated learning","author":"kadhe","year":"2020","journal-title":"arXiv 2009 11248"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3219485"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3194930"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN49398.2020.9209670"},{"key":"ref7","article-title":"Mitigating sybils in federated learning poisoning","author":"fung","year":"2018","journal-title":"arXiv 1808 04866"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2022\/792"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5895"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407811"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3075203"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.007"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2921755"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101824"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/int.22818"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SPW53761.2021.00017"},{"key":"ref36","article-title":"Practical secure aggregation for federated learning on user-held data","author":"bonawitz","year":"2016","journal-title":"arXiv 1611 04482"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3169918"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3176191"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2200000083","article-title":"Advances and open problems in federated learning","volume":"14","author":"kairouz","year":"2019","journal-title":"Found Trends Mach Learn"},{"key":"ref1","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume":"54","author":"mcmahan","year":"2017","journal-title":"Proc 20th Int Conf Artif Intell Statist"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3196274"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3146448"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3010335"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3174394"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.6096"},{"key":"ref20","article-title":"The distributed discrete Gaussian mechanism for federated learning with secure aggregation","author":"kairouz","year":"2021","journal-title":"arXiv 2102 06387"},{"key":"ref22","article-title":"Efficient differentially private secure aggregation for federated learning via hardness of learning with errors","author":"stevens","year":"2021","journal-title":"arXiv 2112 06872"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2457317.2457343"},{"key":"ref28","author":"zhang","year":"2020","journal-title":"BatchCrypt Efficient Homomorphic Encryption for Cross-Silo Federated Learning"},{"key":"ref27","article-title":"A hybrid approach to privacy-preserving federated learning","author":"truex","year":"2018","journal-title":"arXiv 1812 03224"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/app12020734"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9970396\/10121168.pdf?arnumber=10121168","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T18:01:03Z","timestamp":1686592863000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10121168\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3273914","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}