{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T09:36:35Z","timestamp":1776245795821,"version":"3.50.1"},"reference-count":74,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T00:00:00Z","timestamp":1548633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2019,3,31]]},"abstract":"<jats:p>Today\u2019s artificial intelligence still faces two major challenges. One is that, in most industries, data exists in the form of isolated islands. The other is the strengthening of data privacy and security. We propose a possible solution to these challenges: secure federated learning. Beyond the federated-learning framework first proposed by Google in 2016, we introduce a comprehensive secure federated-learning framework, which includes horizontal federated learning, vertical federated learning, and federated transfer learning. We provide definitions, architectures, and applications for the federated-learning framework, and provide a comprehensive survey of existing works on this subject. In addition, we propose building data networks among organizations based on federated mechanisms as an effective solution to allowing knowledge to be shared without compromising user privacy.<\/jats:p>","DOI":"10.1145\/3298981","type":"journal-article","created":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T13:28:51Z","timestamp":1548682131000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4985,"title":["Federated Machine Learning"],"prefix":"10.1145","volume":"10","author":[{"given":"Qiang","family":"Yang","sequence":"first","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3800-3533","authenticated-orcid":false,"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Webank, Shenzhen, China"}]},{"given":"Tianjian","family":"Chen","sequence":"additional","affiliation":[{"name":"Webank, Shenzhen, China"}]},{"given":"Yongxin","family":"Tong","sequence":"additional","affiliation":[{"name":"Beihang University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2019,1,28]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857731"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"e_1_2_1_6_1","unstructured":"Eugene Bagdasaryan Andreas Veit Yiqing Hua Deborah Estrin and Vitaly Shmatikov. 2018. How To Backdoor Federated Learning. arxiv:cs.CR\/1807.00459  Eugene Bagdasaryan Andreas Veit Yiqing Hua Deborah Estrin and Vitaly Shmatikov. 2018. How To Backdoor Federated Learning. arxiv:cs.CR\/1807.00459"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Raad Bahmani Manuel Barbosa Ferdinand Brasser Bernardo Portela Ahmad-Reza Sadeghi Guillaume Scerri and Bogdan Warinschi. 2017. Secure multiparty computation from SGX. Financial Cryptography. 477\u2013497.  Raad Bahmani Manuel Barbosa Ferdinand Brasser Bernardo Portela Ahmad-Reza Sadeghi Guillaume Scerri and Bogdan Warinschi. 2017. Secure multiparty computation from SGX. Financial Cryptography. 477\u2013497.","DOI":"10.1007\/978-3-319-70972-7_27"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_2_1_10_1","first-page":"1114","article-title":"Fast homomorphic evaluation of deep discretized neural networks","volume":"2017","author":"Bourse Florian","year":"2017","unstructured":"Florian Bourse , Michele Minelli , Matthias Minihold , and Pascal Paillier . 2017 . Fast homomorphic evaluation of deep discretized neural networks . IACR Cryptology ePrint Archive 2017 (2017), 1114 . Florian Bourse, Michele Minelli, Matthias Minihold, and Pascal Paillier. 2017. Fast homomorphic evaluation of deep discretized neural networks. IACR Cryptology ePrint Archive 2017 (2017), 1114.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_2_1_11_1","first-page":"35","article-title":"Privacy-preserving classification on deep neural network","volume":"2017","author":"Chabanne Herv\u00e9","year":"2017","unstructured":"Herv\u00e9 Chabanne , Amaury de Wargny , Jonathan Milgram , Constance Morel , and Emmanuel Prouff . 2017 . Privacy-preserving classification on deep neural network . IACR Cryptology ePrint Archive 2017 (2017), 35 . Herv\u00e9 Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, and Emmanuel Prouff. 2017. Privacy-preserving classification on deep neural network. IACR Cryptology ePrint Archive 2017 (2017), 35.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_2_1_12_1","volume-title":"Advances in Neural Information Processing Systems 21","author":"Chaudhuri Kamalika","unstructured":"Kamalika Chaudhuri and Claire Monteleoni . 2009. Privacy-preserving logistic regression . In Advances in Neural Information Processing Systems 21 , D. Koller, D. Schuurmans, Y. Bengio, and L. Bottou (Eds.). Curran Associates, Inc. , 289--296. http:\/\/papers.nips.cc\/paper\/3486-privacy-preserving-logistic-regression.pdf. Kamalika Chaudhuri and Claire Monteleoni. 2009. Privacy-preserving logistic regression. In Advances in Neural Information Processing Systems 21, D. Koller, D. Schuurmans, Y. Bengio, and L. Bottou (Eds.). Curran Associates, Inc., 289--296. http:\/\/papers.nips.cc\/paper\/3486-privacy-preserving-logistic-regression.pdf."},{"key":"e_1_2_1_13_1","volume-title":"Federated meta-learning for recommendation. CoRR abs\/1802.07876","author":"Chen Fei","year":"2018","unstructured":"Fei Chen , Zhenhua Dong , Zhenguo Li , and Xiuqiang He. 2018. Federated meta-learning for recommendation. CoRR abs\/1802.07876 ( 2018 ). arxiv:1802.07876 http:\/\/arxiv.org\/abs\/1802.07876. Fei Chen, Zhenhua Dong, Zhenguo Li, and Xiuqiang He. 2018. Federated meta-learning for recommendation. CoRR abs\/1802.07876 (2018). arxiv:1802.07876 http:\/\/arxiv.org\/abs\/1802.07876."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC\u201901)","author":"Du W.","year":"2016","unstructured":"W. Du and M. Atallah . 2001. Privacy-preserving cooperative statistical analysis . In Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC\u201901) . IEEE Computer Society, Washington, DC, 102--. http:\/\/dl.acm.org\/citation.cfm?id&equals;87 2016 .872181. W. Du and M. Atallah. 2001. Privacy-preserving cooperative statistical analysis. In Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC\u201901). IEEE Computer Society, Washington, DC, 102--. http:\/\/dl.acm.org\/citation.cfm?id&equals;872016.872181."},{"key":"e_1_2_1_16_1","first-page":"222","article-title":"Privacy-preserving multivariate statistical analysis: Linear regression and classification","volume":"4","author":"Du Wenliang","year":"2004","unstructured":"Wenliang Du , Yunghsiang Sam Han , and Shigang Chen . 2004 . Privacy-preserving multivariate statistical analysis: Linear regression and classification . In SDM , Vol. 4. 222 \u2013 233 . Wenliang Du, Yunghsiang Sam Han, and Shigang Chen. 2004. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In SDM, Vol. 4. 222\u2013233.","journal-title":"SDM"},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the IEEE International Conference on Privacy, Security and Data Mining -","volume":"14","author":"Du Wenliang","year":"2002","unstructured":"Wenliang Du and Zhijun Zhan . 2002 . Building decision tree classifier on private data . In Proceedings of the IEEE International Conference on Privacy, Security and Data Mining - Volume 14 (CRPIT\u201902). Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 1--8. http:\/\/dl.acm.org\/citation.cfm?id&equals;850782.850784. Wenliang Du and Zhijun Zhan. 2002. Building decision tree classifier on private data. In Proceedings of the IEEE International Conference on Privacy, Security and Data Mining - Volume 14 (CRPIT\u201902). Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 1--8. http:\/\/dl.acm.org\/citation.cfm?id&equals;850782.850784."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_2_1_19_1","volume-title":"Retrieved","author":"EU.","year":"2018","unstructured":"EU. 2016. REGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ EC (general data protection regulation). Retrieved December 26, 2018 from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT. EU. 2016. REGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/EC (general data protection regulation). Retrieved December 26, 2018 from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT."},{"key":"e_1_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Boi Faltings Goran Radanovic and Ronald Brachman. 2017. Game Theory for Data Science: Eliciting Truthful Information. Morgan 8 Claypool Publishers.   Boi Faltings Goran Radanovic and Ronald Brachman. 2017. Game Theory for Data Science: Eliciting Truthful Information. Morgan 8 Claypool Publishers.","DOI":"10.1007\/978-3-031-01577-9"},{"key":"e_1_2_1_22_1","first-page":"892","article-title":"Secure linear regression on vertically partitioned datasets","volume":"2016","author":"Gasc\u00f3n Adri\u00e0","year":"2016","unstructured":"Adri\u00e0 Gasc\u00f3n , Phillipp Schoppmann , Borja Balle , Mariana Raykova , Jack Doerner , Samee Zahur , and David Evans . 2016 . Secure linear regression on vertically partitioned datasets . IACR Cryptology ePrint Archive 2016 (2016), 892 . Adri\u00e0 Gasc\u00f3n, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, and David Evans. 2016. Secure linear regression on vertically partitioned datasets. IACR Cryptology ePrint Archive 2016 (2016), 892.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_2_1_23_1","volume-title":"Differentially private federated learning: A client level perspective. CoRR abs\/1712.07557","author":"Geyer Robin C.","year":"2017","unstructured":"Robin C. Geyer , Tassilo Klein , and Moin Nabi . 2017. Differentially private federated learning: A client level perspective. CoRR abs\/1712.07557 ( 2017 ). arxiv:1712.07557 http:\/\/arxiv.org\/abs\/1712.07557 Robin C. Geyer, Tassilo Klein, and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. CoRR abs\/1712.07557 (2017). arxiv:1712.07557 http:\/\/arxiv.org\/abs\/1712.07557"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_2_1_26_1","first-page":"669","article-title":"Secure multiple linear regression based on homomorphic encryption","volume":"27","author":"Hall Rob","year":"2011","unstructured":"Rob Hall , Stephen E. Fienberg , and Yuval Nardi . 2011 . Secure multiple linear regression based on homomorphic encryption . Journal of Official Statistics 27 , 4 (2011), 669 -- 691 . Rob Hall, Stephen E. Fienberg, and Yuval Nardi. 2011. Secure multiple linear regression based on homomorphic encryption. Journal of Official Statistics 27, 4 (2011), 669--691.","journal-title":"Journal of Official Statistics"},{"key":"e_1_2_1_27_1","volume-title":"Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. CoRR abs\/1711.10677","author":"Hardy Stephen","year":"2017","unstructured":"Stephen Hardy , Wilko Henecka , Hamish Ivey-Law , Richard Nock , Giorgio Patrini , Guillaume Smith , and Brian Thorne . 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. CoRR abs\/1711.10677 ( 2017 ). Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Richard Nock, Giorgio Patrini, Guillaume Smith, and Brian Thorne. 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. CoRR abs\/1711.10677 (2017)."},{"key":"e_1_2_1_28_1","volume-title":"CryptoDL: Deep neural networks over encrypted data. CoRR abs\/1711.05189","author":"Hesamifard Ehsan","year":"2017","unstructured":"Ehsan Hesamifard , Hassan Takabi , and Mehdi Ghasemi . 2017. CryptoDL: Deep neural networks over encrypted data. CoRR abs\/1711.05189 ( 2017 ). arxiv:1711.05189 http:\/\/arxiv.org\/abs\/1711.05189. Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. 2017. CryptoDL: Deep neural networks over encrypted data. CoRR abs\/1711.05189 (2017). arxiv:1711.05189 http:\/\/arxiv.org\/abs\/1711.05189."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the 26th International Conference on Neural Information Processing Systems -","volume":"1","author":"Ho Qirong","unstructured":"Qirong Ho , James Cipar , Henggang Cui , Jin Kyu Kim , Seunghak Lee , Phillip B. Gibbons , Garth A. Gibson , Gregory R. Ganger , and Eric P. Xing . 2013. More effective distributed ML via a stale synchronous parallel parameter server . In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 1 (NIPS\u201913). Curran Associates Inc., 1223--1231. http:\/\/dl.acm.org\/citation.cfm?id&equals;2999611.2999748. Qirong Ho, James Cipar, Henggang Cui, Jin Kyu Kim, Seunghak Lee, Phillip B. Gibbons, Garth A. Gibson, Gregory R. Ganger, and Eric P. Xing. 2013. More effective distributed ML via a stale synchronous parallel parameter server. In Proceedings of the 26th International Conference on Neural Information Processing Systems - Volume 1 (NIPS\u201913). Curran Associates Inc., 1223--1231. http:\/\/dl.acm.org\/citation.cfm?id&equals;2999611.2999748."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.45"},{"key":"e_1_2_1_32_1","first-page":"125","article-title":"Privacy-preserving analysis of vertically partitioned data using secure matrix products","volume":"25","author":"Karr Alan F.","year":"2004","unstructured":"Alan F. Karr , X. Sheldon Lin , Ashish P. Sanil , and Jerome P. Reiter . 2004 . Privacy-preserving analysis of vertically partitioned data using secure matrix products . Journal of Official Statistics 25 , 125 \u2013 138 . Alan F. Karr, X. Sheldon Lin, Ashish P. Sanil, and Jerome P. Reiter. 2004. Privacy-preserving analysis of vertically partitioned data using secure matrix products. Journal of Official Statistics 25, 125\u2013138.","journal-title":"Journal of Official Statistics"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research), Jennifer Dy and Andreas Krause (Eds.)","volume":"80","author":"Kilbertus Niki","year":"2018","unstructured":"Niki Kilbertus , Adria Gascon , Matt Kusner , Michael Veale , Krishna Gummadi , and Adrian Weller . 2018 . Blind justice: Fairness with encrypted sensitive attributes . In Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research), Jennifer Dy and Andreas Krause (Eds.) , Vol. 80 . PMLR, Stockholmsm\u00e4ssan, Stockholm, Sweden, 2630--2639. http:\/\/proceedings.mlr.press\/v80\/kilbertus18a.html. Niki Kilbertus, Adria Gascon, Matt Kusner, Michael Veale, Krishna Gummadi, and Adrian Weller. 2018. Blind justice: Fairness with encrypted sensitive attributes. In Proceedings of the 35th International Conference on Machine Learning (Proceedings of Machine Learning Research), Jennifer Dy and Andreas Krause (Eds.), Vol. 80. PMLR, Stockholmsm\u00e4ssan, Stockholm, Sweden, 2630--2639. http:\/\/proceedings.mlr.press\/v80\/kilbertus18a.html."},{"key":"e_1_2_1_34_1","unstructured":"Hyesung Kim Jihong Park Mehdi Bennis and Seong-Lyun Kim. 2018. On-Device Federated Learning via Blockchain and its Latency Analysis. arxiv:cs.IT\/1808.03949  Hyesung Kim Jihong Park Mehdi Bennis and Seong-Lyun Kim. 2018. On-Device Federated Learning via Blockchain and its Latency Analysis. arxiv:cs.IT\/1808.03949"},{"key":"e_1_2_1_35_1","volume-title":"Secure logistic regression based on homomorphic encryption: Design and evaluation. JMIR Med Inform 6, 2 (17","author":"Kim Miran","year":"2018","unstructured":"Miran Kim , Yongsoo Song , Shuang Wang , Yuhou Xia , and Xiaoqian Jiang . 2018. Secure logistic regression based on homomorphic encryption: Design and evaluation. JMIR Med Inform 6, 2 (17 Apr 2018 ), e19. Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, and Xiaoqian Jiang. 2018. Secure logistic regression based on homomorphic encryption: Design and evaluation. JMIR Med Inform 6, 2 (17 Apr 2018), e19."},{"key":"e_1_2_1_36_1","volume-title":"Federated optimization: Distributed machine learning for on-device intelligence. CoRR abs\/1610.02527","author":"Konecn\u00fd Jakub","year":"2016","unstructured":"Jakub Konecn\u00fd , H. Brendan McMahan , Daniel Ramage , and Peter Richt\u00e1rik . 2016. Federated optimization: Distributed machine learning for on-device intelligence. CoRR abs\/1610.02527 ( 2016 ). arxiv:1610.02527 http:\/\/arxiv.org\/abs\/1610.02527 Jakub Konecn\u00fd, H. Brendan McMahan, Daniel Ramage, and Peter Richt\u00e1rik. 2016. Federated optimization: Distributed machine learning for on-device intelligence. CoRR abs\/1610.02527 (2016). arxiv:1610.02527 http:\/\/arxiv.org\/abs\/1610.02527"},{"key":"e_1_2_1_37_1","volume-title":"Ananda Theertha Suresh, and Dave Bacon","author":"Konecn\u00fd Jakub","year":"2016","unstructured":"Jakub Konecn\u00fd , H. Brendan McMahan , Felix X. Yu , Peter Richt\u00e1rik , Ananda Theertha Suresh, and Dave Bacon . 2016 . Federated learning: Strategies for improving communication efficiency. CoRR abs\/1610.05492 (2016). arxiv:1610.05492 http:\/\/arxiv.org\/abs\/1610.05492 Jakub Konecn\u00fd, H. Brendan McMahan, Felix X. Yu, Peter Richt\u00e1rik, Ananda Theertha Suresh, and Dave Bacon. 2016. Federated learning: Strategies for improving communication efficiency. CoRR abs\/1610.05492 (2016). arxiv:1610.05492 http:\/\/arxiv.org\/abs\/1610.05492"},{"key":"e_1_2_1_38_1","volume-title":"Chawathe","author":"Liang Gang","year":"2004","unstructured":"Gang Liang and Sudarshan S . Chawathe . 2004 . Privacy-preserving inter-database operations. In International Conference on Intelligence and Security Informatics. Springer , 66--82. Gang Liang and Sudarshan S. Chawathe. 2004. Privacy-preserving inter-database operations. In International Conference on Intelligence and Security Informatics. Springer, 66--82."},{"key":"e_1_2_1_39_1","volume-title":"Dally","author":"Lin Yujun","year":"2017","unstructured":"Yujun Lin , Song Han , Huizi Mao , Yu Wang , and William J . Dally . 2017 . Deep gradient compression: Reducing the communication bandwidth for distributed training. CoRR abs\/1712.01887 (2017). arxiv:1712.01887 http:\/\/arxiv.org\/abs\/1712.01887. Yujun Lin, Song Han, Huizi Mao, Yu Wang, and William J. Dally. 2017. Deep gradient compression: Reducing the communication bandwidth for distributed training. CoRR abs\/1712.01887 (2017). arxiv:1712.01887 http:\/\/arxiv.org\/abs\/1712.01887."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_2_1_41_1","volume-title":"Federated learning of deep networks using model averaging. CoRR abs\/1602.05629","author":"McMahan H. Brendan","year":"2016","unstructured":"H. Brendan McMahan , Eider Moore , Daniel Ramage , and Blaise Ag\u00fcera y Arcas . 2016. Federated learning of deep networks using model averaging. CoRR abs\/1602.05629 ( 2016 ). arxiv:1602.05629 http:\/\/arxiv.org\/abs\/1602.05629. H. Brendan McMahan, Eider Moore, Daniel Ramage, and Blaise Ag\u00fcera y Arcas. 2016. Federated learning of deep networks using model averaging. CoRR abs\/1602.05629 (2016). arxiv:1602.05629 http:\/\/arxiv.org\/abs\/1602.05629."},{"key":"e_1_2_1_42_1","volume-title":"Learning differentially private language models without losing accuracy. CoRR abs\/1710.06963","author":"McMahan H. Brendan","year":"2017","unstructured":"H. Brendan McMahan , Daniel Ramage , Kunal Talwar , and Li Zhang . 2017. Learning differentially private language models without losing accuracy. CoRR abs\/1710.06963 ( 2017 ). H. Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. 2017. Learning differentially private language models without losing accuracy. CoRR abs\/1710.06963 (2017)."},{"key":"e_1_2_1_43_1","volume-title":"Emiliano De Cristofaro, and Vitaly Shmatikov","author":"Melis Luca","year":"2018","unstructured":"Luca Melis , Congzheng Song , Emiliano De Cristofaro, and Vitaly Shmatikov . 2018 . Inference attacks against collaborative learning. CoRR abs\/1805.04049 (2018). arxiv:1805.04049 http:\/\/arxiv.org\/abs\/1805.04049. Luca Melis, Congzheng Song, Emiliano De Cristofaro, and Vitaly Shmatikov. 2018. Inference attacks against collaborative learning. CoRR abs\/1805.04049 (2018). arxiv:1805.04049 http:\/\/arxiv.org\/abs\/1805.04049."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813705"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_2_1_47_1","first-page":"396","article-title":"SecureML: A system for scalable privacy-preserving machine learning","volume":"2017","author":"Mohassel Payman","year":"2017","unstructured":"Payman Mohassel and Yupeng Zhang . 2017 . SecureML: A system for scalable privacy-preserving machine learning . IACR Cryptology ePrint Archive 2017 (2017), 396 . Payman Mohassel and Yupeng Zhang. 2017. SecureML: A system for scalable privacy-preserving machine learning. IACR Cryptology ePrint Archive 2017 (2017), 396.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"e_1_2_1_49_1","volume-title":"Entity resolution and federated learning get a federated resolution. CoRR abs\/1803.04035","author":"Nock Richard","year":"2018","unstructured":"Richard Nock , Stephen Hardy , Wilko Henecka , Hamish Ivey-Law , Giorgio Patrini , Guillaume Smith , and Brian Thorne . 2018. Entity resolution and federated learning get a federated resolution. CoRR abs\/1803.04035 ( 2018 ). arxiv:1803.04035 http:\/\/arxiv.org\/abs\/1803.04035. Richard Nock, Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Giorgio Patrini, Guillaume Smith, and Brian Thorne. 2018. Entity resolution and federated learning get a federated resolution. CoRR abs\/1803.04035 (2018). arxiv:1803.04035 http:\/\/arxiv.org\/abs\/1803.04035."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/3196160.3196245"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_2_1_53_1","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest R. L.","year":"1978","unstructured":"R. L. Rivest , L. Adleman , and M. L. Dertouzos . 1978 . On data banks and privacy homomorphisms . Foundations of Secure Computation 4 , 11 (1978), 169 -- 179 . R. L. Rivest, L. Adleman, and M. L. Dertouzos. 1978. On data banks and privacy homomorphisms. Foundations of Secure Computation 4, 11 (1978), 169--179.","journal-title":"Foundations of Secure Computation"},{"key":"e_1_2_1_54_1","volume-title":"DeepSecure: Scalable provably-secure deep learning. CoRR abs\/1705.08963","author":"Rouhani Bita Darvish","year":"2017","unstructured":"Bita Darvish Rouhani , M. Sadegh Riazi , and Farinaz Koushanfar . 2017. DeepSecure: Scalable provably-secure deep learning. CoRR abs\/1705.08963 ( 2017 ). arxiv:1705.08963 http:\/\/arxiv.org\/abs\/1705.08963. Bita Darvish Rouhani, M. Sadegh Riazi, and Farinaz Koushanfar. 2017. DeepSecure: Scalable provably-secure deep learning. CoRR abs\/1705.08963 (2017). arxiv:1705.08963 http:\/\/arxiv.org\/abs\/1705.08963."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014139"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247553"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/96602.96604"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature16961"},{"key":"e_1_2_1_60_1","first-page":"I","article-title":"Federated multi-task learning","volume":"30","author":"Smith Virginia","year":"2017","unstructured":"Virginia Smith , Chao-Kai Chiang , Maziar Sanjabi , and Ameet S. Talwalkar . 2017 . Federated multi-task learning . In Advances in Neural Information Processing Systems 30 , I . Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.). Curran Associates, Inc., 4424--4434. http:\/\/papers.nips.cc\/paper\/7029-federated-multi-task-learning.pdf. Virginia Smith, Chao-Kai Chiang, Maziar Sanjabi, and Ameet S. Talwalkar. 2017. Federated multi-task learning. In Advances in Neural Information Processing Systems 30, I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.). Curran Associates, Inc., 4424--4434. http:\/\/papers.nips.cc\/paper\/7029-federated-multi-task-learning.pdf.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736861"},{"key":"e_1_2_1_62_1","volume-title":"Securing distributed machine learning in high dimensions. CoRR abs\/1804.10140","author":"Su Lili","year":"2018","unstructured":"Lili Su and Jiaming Xu. 2018. Securing distributed machine learning in high dimensions. CoRR abs\/1804.10140 ( 2018 ). arxiv:1804.10140 http:\/\/arxiv.org\/abs\/1804.10140. Lili Su and Jiaming Xu. 2018. Securing distributed machine learning in high dimensions. CoRR abs\/1804.10140 (2018). arxiv:1804.10140 http:\/\/arxiv.org\/abs\/1804.10140."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.59"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956776"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535706_11"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281275"},{"key":"e_1_2_1_69_1","volume-title":"When edge meets learning: Adaptive control for resource-constrained distributed machine learning. CoRR abs\/1804.05271","author":"Wang Shiqiang","year":"2018","unstructured":"Shiqiang Wang , Tiffany Tuor , Theodoros Salonidis , Kin K. Leung , Christian Makaya , Ting He , and Kevin Chan . 2018. When edge meets learning: Adaptive control for resource-constrained distributed machine learning. CoRR abs\/1804.05271 ( 2018 ). arxiv:1804.05271 http:\/\/arxiv.org\/abs\/1804.05271. Shiqiang Wang, Tiffany Tuor, Theodoros Salonidis, Kin K. Leung, Christian Makaya, Ting He, and Kevin Chan. 2018. When edge meets learning: Adaptive control for resource-constrained distributed machine learning. CoRR abs\/1804.05271 (2018). arxiv:1804.05271 http:\/\/arxiv.org\/abs\/1804.05271."},{"key":"e_1_2_1_70_1","unstructured":"Wikipedia. 2018. Facebook--Cambridge Analytica Data Scandal. https:\/\/en.wikipedia.org\/wiki\/Facebook-Cambridge_Analytica%_data_scandal.  Wikipedia. 2018. Facebook--Cambridge Analytica Data Scandal. https:\/\/en.wikipedia.org\/wiki\/Facebook-Cambridge_Analytica%_data_scandal."},{"key":"e_1_2_1_71_1","first-page":"49","article-title":"Federated learning","volume":"14","author":"Yang Qiang","year":"2018","unstructured":"Qiang Yang , Yang Liu , Tianjian Chen , and Yongxin Tong . 2018 . Federated learning . Communications of the CCF 14 , 11 (2018), 49 -- 55 . Qiang Yang, Yang Liu, Tianjian Chen, and Yongxin Tong. 2018. Federated learning. Communications of the CCF 14, 11 (2018), 49--55.","journal-title":"Communications of the CCF"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141415"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/11731139_74"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.18"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2470255"},{"key":"e_1_2_1_77_1","unstructured":"Yue Zhao Meng Li Liangzhen Lai Naveen Suda Damon Civin and Vikas Chandra. 2018. Federated Learning with Non-IID Data. arxiv:cs.LG\/1806.00582  Yue Zhao Meng Li Liangzhen Lai Naveen Suda Damon Civin and Vikas Chandra. 2018. Federated Learning with Non-IID Data. arxiv:cs.LG\/1806.00582"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3298981","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3298981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:56Z","timestamp":1750201976000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3298981"}},"subtitle":["Concept and Applications"],"short-title":[],"issued":{"date-parts":[[2019,1,28]]},"references-count":74,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3,31]]}},"alternative-id":["10.1145\/3298981"],"URL":"https:\/\/doi.org\/10.1145\/3298981","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"value":"2157-6904","type":"print"},{"value":"2157-6912","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,28]]},"assertion":[{"value":"2018-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}