{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T08:25:14Z","timestamp":1776414314788,"version":"3.51.2"},"reference-count":205,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":["AISG2-RP-2020-018"],"award-info":[{"award-number":["AISG2-RP-2020-018"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2023,4,1]]},"DOI":"10.1109\/tkde.2021.3124599","type":"journal-article","created":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T21:43:14Z","timestamp":1635889394000},"page":"3347-3366","source":"Crossref","is-referenced-by-count":926,"title":["A Survey on Federated Learning Systems: Vision, Hype and Reality for Data Privacy and Protection"],"prefix":"10.1109","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6539-6443","authenticated-orcid":false,"given":"Qinbin","family":"Li","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3370-6053","authenticated-orcid":false,"given":"Zeyi","family":"Wen","sequence":"additional","affiliation":[{"name":"The University of Western Australia, Crawley, WA, Australia"}]},{"given":"Zhaomin","family":"Wu","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Sixu","family":"Hu","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Naibo","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3178-4018","authenticated-orcid":false,"given":"Yuan","family":"Li","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Xu","family":"Liu","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Bingsheng","family":"He","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]}],"member":"263","reference":[{"key":"ref6","first-page":"265","article-title":"TensorFlow: A system for large-scale machine learning","volume-title":"Proc. 12th USENIX Conf. Oper. Syst. Des. Implementation","author":"Abadi"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v7i2.652"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.21552\/edpl\/2016\/3\/4"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013541"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10237"},{"key":"ref12","article-title":"Federated collaborative filtering for privacy-preserving personalized recommendation system","author":"Ammad-ud din","year":"2019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref14","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. 23rd Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417885"},{"key":"ref16","first-page":"559","article-title":"signSGD: Compressed optimisation for non-convex problems","volume-title":"Proc. Mach. Learn. Res.","volume":"80","author":"Bernstein"},{"key":"ref17","first-page":"634","article-title":"Analyzing federated learning through an adversarial lens","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Bhagoji"},{"key":"ref18","article-title":"Protection against reconstruction and its applications in private federated learning","author":"Bhowmick","year":"2018"},{"key":"ref19","first-page":"118","article-title":"Machine learning with adversaries: Byzantine tolerant gradient descent","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Blanchard"},{"key":"ref20","article-title":"Practical secure aggregation for federated learning on user-held data","author":"Bonawitz","year":"2016"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref22","article-title":"Towards federated learning at scale: System design","volume-title":"Proc. Mach. Learn. Syst.","author":"Bonawitz"},{"key":"ref23","article-title":"LEAF: A benchmark for federated settings","author":"Caldas","year":"2018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007379606734"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"ref26","article-title":"Privacy-preserving classification on deep neural network","volume":"2017","author":"Chabanne","year":"2017","journal-title":"IACR Cryptol. ePrint Arc."},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2020.3014880"},{"key":"ref28","article-title":"FedEval: A benchmark system with a comprehensive evaluation model for federated learning","author":"Chai","year":"2020"},{"key":"ref29","first-page":"1069","article-title":"Differentially private empirical risk minimization","volume":"12","author":"Chaudhuri","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/bf00206326"},{"key":"ref31","article-title":"Federated meta-learning for recommendation","author":"Chen","year":"2018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref33","article-title":"Targeted backdoor attacks on deep learning systems using data poisoning","author":"Chen","year":"2017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.03.061"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.02.037"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2021.3082561"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2013.07.010"},{"key":"ref38","article-title":"Differential privacy-enabled federated learning for sensitive health data","author":"Choudhury","year":"2019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31164-2"},{"key":"ref40","volume-title":"CUDA Programming: A Developer\u2019s Guide to Parallel Computing With GPUs","author":"Cook","year":"2012"},{"key":"ref41","first-page":"9687","article-title":"Federated Bayesian optimization via thompson sampling","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","author":"Dai"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/997817.997857"},{"key":"ref43","article-title":"Personalized federated learning with moreau envelopes","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Dinh"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD46524.2019.00038"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M2716"},{"key":"ref48","first-page":"45","article-title":"Bitcoin-NG: A scalable blockchain protocol","volume-title":"Proc. 13th USENIX Conf. Netw. Syst. Des. Implementation","author":"Eyal"},{"key":"ref49","first-page":"3557","article-title":"Personalized federated learning with theoretical guarantees: A model-agnostic meta-learning approach","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","author":"Fallah"},{"key":"ref50","first-page":"1623","article-title":"Local model poisoning attacks to byzantine-robust federated learning","volume-title":"Proc. 29th USENIX Conf. Secur. Symp.","author":"Fang"},{"key":"ref51","first-page":"3555","article-title":"Multi-layered gradient boosting decision trees","volume-title":"Proc. 32nd Int. Conf. Neural Inf. Process. Syst.","author":"Feng"},{"key":"ref52","first-page":"1126","article-title":"Model-agnostic meta-learning for fast adaptation of deep networks","volume-title":"Proc. 34th Int. Conf. Mach. Learn.","author":"Finn"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref54","article-title":"Inverting gradients\u2013How easy is it to break privacy in federated learning?","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Geiping"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmp.2011.08.004"},{"key":"ref56","article-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3192506"},{"key":"ref58","article-title":"Making ai forget you: Data deletion in machine learning","volume-title":"Proc. 33rd Int. Conf. Neural Inf. Process. Syst.","author":"Ginart"},{"key":"ref59","article-title":"Secure multi-party computation","volume":"78","author":"Goldreich","year":"1998","journal-title":"Manuscript. Preliminary Version"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2484326"},{"key":"ref61","volume-title":"Deep Learn. With Keras","author":"Gulli","year":"2017"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1126\/scirobotics.aay7120"},{"key":"ref63","article-title":"Lower bounds and optimal algorithms for personalized federated learning","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Hanzely"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32813-9_3"},{"key":"ref65","article-title":"Federated learning for mobile keyboard prediction","author":"Hard","year":"2018"},{"key":"ref66","article-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption","author":"Hardy","year":"2017"},{"key":"ref67","first-page":"14068","article-title":"Group knowledge transfer: Federated learning of large cnns at the edge","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","author":"He"},{"key":"ref68","article-title":"FedML: A research library and benchmark for federated machine learning","author":"He","year":"2020"},{"key":"ref69","first-page":"1223","article-title":"More effective distributed ML via a stale synchronous parallel parameter server","volume-title":"Proc. 26th Int. Conf. Neural Inf. Process. Syst.","author":"Ho"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3510540"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330765"},{"key":"ref72","article-title":"Communication-efficient on-device machine learning: Federated distillation and augmentation under non-iid private data","author":"Jeong","year":"2018"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310070"},{"key":"ref74","article-title":"Improving federated learning personalization via model agnostic meta learning","author":"Jiang","year":"2019"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080246"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/COEC.2003.1210263"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1561\/2200000083"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00337-8"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940820"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/VTS-APWCS.2019.8851649"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.45"},{"key":"ref82","first-page":"5132","article-title":"SCAFFOLD: Stochastic controlled averaging for federated learning","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Karimireddy"},{"key":"ref83","first-page":"125","article-title":"Privacy-preserving analysis of vertically partitioned data using secure matrix products","volume":"25","author":"Karr","year":"2009","journal-title":"J. Official Statist."},{"key":"ref84","first-page":"3149","article-title":"LightGBM: A highly efficient gradient boosting decision tree","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Ke"},{"key":"ref85","article-title":"On-device federated learning via blockchain and its latency analysis","author":"Kim","year":"2018"},{"key":"ref86","article-title":"Federated optimization: Distributed machine learning for on-device intelligence","author":"Kone\u010dn\u1ef3","year":"2016"},{"key":"ref87","article-title":"Federated learning: Strategies for improving communication efficiency","author":"Kone\u010dn\u1ef3","year":"2016"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3065386"},{"key":"ref89","first-page":"32","article-title":"Cloud federation","volume":"2011","author":"Kurze","year":"2011","journal-title":"Cloud Comput."},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683546"},{"key":"ref91","first-page":"1893","article-title":"Data poisoning attacks on factorization-based collaborative filtering","volume-title":"Proc. 30th Int. Conf. Neural Inf. Process. Syst.","author":"Li"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011544"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2015.7255222"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2944562"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5895"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i01.5422"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00077"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/205"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01057"},{"key":"ref100","article-title":"Federated optimization in heterogeneous networks","volume-title":"Proc. Mach. Learn. Syst.","author":"Li","year":"2018"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref102","article-title":"Fair resource allocation in federated learning","volume-title":"Proc. 8th Int. Conf. Learn. Representations","author":"Li"},{"key":"ref103","article-title":"On the convergence of fedavg on non-iid data","volume-title":"Proc. 8th Int. Conf. Learn. Representations","author":"Li"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3405438"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2986024"},{"key":"ref106","article-title":"Ensemble distillation for robust model fusion in federated learning","author":"Lin","year":"2020"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2019.2931179"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"ref109","article-title":"Evaluation framework for large-scale federated learning","author":"Liu","year":"2020"},{"key":"ref110","article-title":"Secure federated transfer learning","author":"Liu","year":"2018"},{"key":"ref111","article-title":"A communication efficient vertical federated learning framework","author":"Liu","year":"2019"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2020.2992755"},{"key":"ref113","article-title":"Boosting privately: Privacy-preserving federated extreme boosting for mobile crowdsensing","author":"Liu","year":"2019"},{"key":"ref114","first-page":"355","article-title":"GPUMLib: An efficient open-source GPU machine learning library","volume":"3","author":"Lopes","year":"2011","journal-title":"Int. J. Comput. Inf. Syst. Ind. Manage. Appl."},{"key":"ref115","article-title":"Real-world image datasets for federated learning","author":"Luo","year":"2019"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_1"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01216-8_12"},{"key":"ref118","article-title":"Throughput-optimal topology design for cross-silo federated learning","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Marfoq"},{"key":"ref119","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. 20th Int. Conf. Artif. Intell. Statist.","volume":"54","author":"McMahan"},{"key":"ref120","article-title":"Learning differentially private recurrent language models","volume-title":"Proc. 6th Int. Conf. Learn. Representations","author":"McMahan"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"ref122","first-page":"4615","article-title":"Agnostic federated learning","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","volume":"97","author":"Mohri"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2749422"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337028"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00080"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900461"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/3286490.3286559"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761315"},{"key":"ref131","article-title":"Entity resolution and federated learning get a federated resolution","author":"Nock","year":"2018"},{"key":"ref132","first-page":"619","article-title":"Oblivious multi-party machine learning on trusted processors","volume-title":"Proc. 25th USENIX Conf. Secur. Symp.","author":"Ohrimenko"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-x_16"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref135","first-page":"1","article-title":"Automatic differentiation in PyTorch","author":"Paszke","year":"2017"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.5555\/3454287.3455008"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9326-7_1"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/3299887.3299891"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2022.3206407"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.07.069"},{"key":"ref141","article-title":"Adaptive federated optimization","author":"Reddi","year":"2021"},{"key":"ref142","article-title":"Robust federated learning: The case of affine distribution shifts","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Reisizadeh"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"ref144","article-title":"An overview of multi-task learning in deep neural networks","author":"Ruder","year":"2017"},{"key":"ref145","article-title":"A generic framework for privacy preserving deep learning","author":"Ryffel","year":"2018"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647927"},{"key":"ref148","article-title":"Explainable artificial intelligence: Understanding, visualizing and interpreting deep learning models","author":"Samek","year":"2017"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014139"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2019.2947144"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2944481"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1145\/96602.96604"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2014.6859715"},{"key":"ref156","first-page":"4427","article-title":"Federated multi-task learning","volume-title":"Proc. 31st Int. Conf. Neural Inf. Process. Syst.","author":"Smith"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3041404"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736861"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-14880-5_2"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3485"},{"key":"ref161","article-title":"Securing distributed machine learning in high dimensions","author":"Su","year":"2018"},{"key":"ref162","article-title":"Can you really backdoor federated learning?","author":"Sun","year":"2019"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2012-65"},{"key":"ref164","volume-title":"Blockchain: Blueprint for a New Economy","author":"Swan","year":"2015"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3411528"},{"key":"ref166","first-page":"6105","article-title":"EfficientNet: Rethinking model scaling for convolutional neural networks","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","volume":"97","author":"Tan"},{"key":"ref167","article-title":"Differentially private learning with adaptive clipping","author":"Thakkar","year":"2019"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/2939502.2939516"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006179"},{"key":"ref173","first-page":"16070","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Wang"},{"key":"ref174","article-title":"Federated learning with matched averaging","volume-title":"Proc. 8th Int. Conf. Learn. Representations","author":"Wang"},{"key":"ref175","first-page":"7611","article-title":"Tackling the objective inconsistency problem in heterogeneous federated optimization","volume-title":"Proc. 34th Int. Conf. Neural Inf. Process. Syst.","author":"Wang"},{"key":"ref176","article-title":"Blockchain-based federated learning in mobile edge networks with application in internet of vehicles","author":"Wang","year":"2021"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2904348"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63076-8_11"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800286"},{"key":"ref180","first-page":"1","article-title":"CO-OP: Cooperative machine learning from mobile devices","author":"Wang","year":"2019"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2018.00033"},{"key":"ref182","first-page":"797","article-title":"ThunderSVM: A fast SVM library on GPUs and CPUs","volume":"19","author":"Wen","year":"2018","journal-title":"J. Mach. Learn. Res."},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2920131"},{"key":"ref184","first-page":"1","article-title":"ThunderGBM: Fast GBDTs and random forests on GPUs","volume":"21","author":"Wen","year":"2020","journal-title":"J. Mach. Learn. Res."},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2952332"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.247"},{"key":"ref187","first-page":"1","article-title":"DBA: Distributed backdoor attacks against federated learning","volume-title":"Proc. Int. Conf. Learn. Representations","author":"Xie"},{"key":"ref188","article-title":"Asynchronous federated optimization","author":"Xie","year":"2019"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357371"},{"key":"ref190","first-page":"165","article-title":"A survey on entity alignment of knowledge base","volume":"53","author":"Yan","year":"2016","journal-title":"J. Comput. Res. Develop."},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"ref192","article-title":"Applied federated learning: Improving Google keyboard query suggestions","author":"Yang","year":"2018"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141415"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647616"},{"key":"ref196","first-page":"7252","article-title":"Bayesian nonparametric federated learning of neural networks","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Yurochkin"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3032544"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3070203"},{"key":"ref199","article-title":"Benchmarking semi-supervised federated learning","author":"Zhang","year":"2020"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486352"},{"key":"ref201","article-title":"Mobile edge computing, blockchain and reputation-based crowdsourcing IoT federated learning: A secure, decentralized and privacy-preserving system","author":"Zhao","year":"2019"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3017377"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037194"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2020\/642"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1504\/ijwgs.2018.10016848"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2896894"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2936565"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2019.2919699"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1145\/3394171.3413814"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/10063074\/09599369.pdf?arnumber=9599369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:55:53Z","timestamp":1705020953000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9599369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":205,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2021.3124599","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,1]]}}}