{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T00:48:05Z","timestamp":1775263685733,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1935923"],"award-info":[{"award-number":["CNS-1935923"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2140477"],"award-info":[{"award-number":["CNS-2140477"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1109\/tnet.2023.3302016","type":"journal-article","created":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T17:33:42Z","timestamp":1692984822000},"page":"833-843","source":"Crossref","is-referenced-by-count":71,"title":["Preserving Privacy and Security in Federated Learning"],"prefix":"10.1109","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5836-5884","authenticated-orcid":false,"given":"Truc","family":"Nguyen","sequence":"first","affiliation":[{"name":"Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0503-2012","authenticated-orcid":false,"given":"My T.","family":"Thai","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"ref3","first-page":"2938","article-title":"How to backdoor federated learning","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Bagdasaryan"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335756"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_18"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/eurosp57164.2023.00020"},{"key":"ref7","article-title":"Towards federated learning at scale: System design","author":"Bonawitz","year":"2019","journal-title":"arXiv:1902.01046"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-017-9273-9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0119-9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_10"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833584"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref15","first-page":"1","article-title":"Robbing the fed: Directly obtaining private data in federated learning with modified models","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Fowl"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref17","first-page":"1069","article-title":"ZKBOO: Faster zero-knowledge for Boolean circuits","volume-title":"Proc. 25th Usenix Secur. Symp. (Usenix Security)","author":"Giacomelli"},{"key":"ref18","volume-title":"Gnu Multiple Precision Arithmetic Library","author":"Granlund","year":"2010"},{"key":"ref19","article-title":"Federated learning for mobile keyboard prediction","author":"Hard","year":"2018","journal-title":"arXiv:1811.03604"},{"key":"ref20","volume-title":"Imagenette","author":"Howard","year":"2019"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250794"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1201\/9781351133036"},{"key":"ref23","article-title":"Learning multiple layers of features from tiny images","author":"Krizhevsky","year":"2009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_16"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363216"},{"key":"ref27","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proc. Artif. Intell. Statist.","author":"McMahan"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i10.26401"},{"key":"ref29","first-page":"5714","article-title":"Active membership inference attack under local differential privacy in federated learning","volume-title":"Proc. 26th Int. Conf. Artif. Intell. Statist.","volume":"206. PMLR","author":"Nguyen"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17955-6_4"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"ref34","first-page":"1","article-title":"Differentially private learning needs better features (or much more data)","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Tramer"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00031"},{"key":"ref37","first-page":"16070","article-title":"Attack of the tails: Yes, you really can backdoor federated learning","volume-title":"Advances in Neural Information Processing Systems","volume":"33","author":"Wang","year":"2020"},{"key":"ref38","first-page":"1","article-title":"DBA: Distributed backdoor attacks against federated learning","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Xie"},{"key":"ref39","first-page":"493","article-title":"BatchCrypt: Efficient homomorphic encryption for cross-silo federated learning","volume-title":"Proc. USENIX Annu. Tech. Conf. (USENIX ATC)","author":"Zhang"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/90\/10439254\/10230990-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/10439254\/10230990.pdf?arnumber=10230990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T22:16:30Z","timestamp":1709331390000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10230990\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":39,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnet.2023.3302016","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2]]}}}