{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T11:00:41Z","timestamp":1778756441142,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447837","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"101-112","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":67,"title":["BlockFLA"],"prefix":"10.1145","author":[{"given":"Harsh Bimal","family":"Desai","sequence":"first","affiliation":[{"name":"The University of Texas at Dallas, Richardson, TX, USA"}]},{"given":"Mustafa Safa","family":"Ozdayi","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas, Richardson, TX, USA"}]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[{"name":"The University of Texas at Dallas, Richardson, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. Common architectures in convolutional neural networks. https:\/\/www. jeremyjordan.me\/convnet-architectures\/  [n.d.]. Common architectures in convolutional neural networks. https:\/\/www. jeremyjordan.me\/convnet-architectures\/"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_2_3_1","volume-title":"International Conference on Artificial Intelligence and Statistics. 2938--2948","author":"Bagdasaryan Eugene","year":"2020","unstructured":"Eugene Bagdasaryan , Andreas Veit , Yiqing Hua , Deborah Estrin , and Vitaly Shmatikov . 2020 . How to backdoor federated learning . In International Conference on Artificial Intelligence and Statistics. 2938--2948 . Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2020. How to backdoor federated learning. In International Conference on Artificial Intelligence and Statistics. 2938--2948."},{"key":"e_1_3_2_2_4_1","volume-title":"signSGD: Compressed Optimisation for Non-Convex Problems. arxiv","author":"Bernstein Jeremy","year":"1802","unstructured":"Jeremy Bernstein , Yu-Xiang Wang , Kamyar Azizzadenesheli , and Anima Anandkumar . 2018. signSGD: Compressed Optimisation for Non-Convex Problems. arxiv : 1802 .04434 [cs.LG] Jeremy Bernstein, Yu-Xiang Wang, Kamyar Azizzadenesheli, and Anima Anandkumar. 2018. signSGD: Compressed Optimisation for Non-Convex Problems. arxiv: 1802.04434 [cs.LG]"},{"key":"e_1_3_2_2_5_1","volume-title":"International Conference on Machine Learning. 634--643","author":"Bhagoji Arjun Nitin","year":"2019","unstructured":"Arjun Nitin Bhagoji , Supriyo Chakraborty , Prateek Mittal , and Seraphin Calo . 2019 . Analyzing federated learning through an adversarial lens . In International Conference on Machine Learning. 634--643 . Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, and Seraphin Calo. 2019. Analyzing federated learning through an adversarial lens. In International Conference on Machine Learning. 634--643."},{"key":"e_1_3_2_2_6_1","volume-title":"et almbox","author":"Blanchard Peva","year":"2017","unstructured":"Peva Blanchard , Rachid Guerraoui , Julien Stainer , et almbox . 2017 . Machine learning with adversaries: Byzantine tolerant gradient descent. In Advances in Neural Information Processing Systems . 119--129. Peva Blanchard, Rachid Guerraoui, Julien Stainer, et almbox. 2017. Machine learning with adversaries: Byzantine tolerant gradient descent. In Advances in Neural Information Processing Systems. 119--129."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_2_9_1","volume-title":"Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526","author":"Chen Xinyun","year":"2017","unstructured":"Xinyun Chen , Chang Liu , Bo Li , Kimberly Lu , and Dawn Song . 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 ( 2017 ). Xinyun Chen, Chang Liu, Bo Li, Kimberly Lu, and Dawn Song. 2017. Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526 (2017)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"H. Desai K. Liu M. Kantarcioglu and L. Kagal. 2018. Adjudicating Violations in Data Sharing Agreements Using Smart Contracts. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). 1553--1560.  H. Desai K. Liu M. Kantarcioglu and L. Kagal. 2018. Adjudicating Violations in Data Sharing Agreements Using Smart Contracts. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). 1553--1560.","DOI":"10.1109\/Cybermatics_2018.2018.00261"},{"key":"e_1_3_2_2_11_1","volume-title":"Mitigating Sybils in Federated Learning Poisoning. arXiv preprint arXiv:1808.04866","author":"Fung Clement","year":"2020","unstructured":"Clement Fung , Chris J. M. Yoon , and Ivan Beschastnikh . 2020. Mitigating Sybils in Federated Learning Poisoning. arXiv preprint arXiv:1808.04866 ( 2020 ). Clement Fung, Chris J. M. Yoon, and Ivan Beschastnikh. 2020. Mitigating Sybils in Federated Learning Poisoning. arXiv preprint arXiv:1808.04866 (2020)."},{"key":"e_1_3_2_2_12_1","volume-title":"Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557","author":"Geyer Robin C","year":"2017","unstructured":"Robin C Geyer , Tassilo Klein , and Moin Nabi . 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 ( 2017 ). Robin C Geyer, Tassilo Klein, and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. arXiv preprint arXiv:1712.07557 (2017)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751452"},{"key":"e_1_3_2_2_14_1","volume-title":"Performance Analysis of Consensus Algorithm in Private Blockchain. In 2018 IEEE Intelligent Vehicles Symposium (IV). 280--285","author":"Hao Y.","unstructured":"Y. Hao , Y. Li , X. Dong , L. Fang , and P. Chen . 2018 . Performance Analysis of Consensus Algorithm in Private Blockchain. In 2018 IEEE Intelligent Vehicles Symposium (IV). 280--285 . Y. Hao, Y. Li, X. Dong, L. Fang, and P. Chen. 2018. Performance Analysis of Consensus Algorithm in Private Blockchain. In 2018 IEEE Intelligent Vehicles Symposium (IV). 280--285."},{"key":"e_1_3_2_2_15_1","volume-title":"Proofs of Work and Bread Pudding Protocols(Extended Abstract)","author":"Jakobsson Markus","unstructured":"Markus Jakobsson and Ari Juels . 1999. Proofs of Work and Bread Pudding Protocols(Extended Abstract) . Springer US , Boston, MA , 258--272. Markus Jakobsson and Ari Juels. 1999. Proofs of Work and Bread Pudding Protocols(Extended Abstract). Springer US, Boston, MA, 258--272."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278542"},{"key":"e_1_3_2_2_17_1","volume-title":"Ananda Theertha Suresh, and Dave Bacon","author":"Konen\u00fd Jakub","year":"2017","unstructured":"Jakub Konen\u00fd , H. Brendan McMahan , Felix X. Yu , Peter Richt\u00e1rik , Ananda Theertha Suresh, and Dave Bacon . 2017 . Federated Learning : Strategies for Improving Communication Efficiency . arxiv: 1610.05492 [cs.LG] Jakub Konen\u00fd, H. Brendan McMahan, Felix X. Yu, Peter Richt\u00e1rik, Ananda Theertha Suresh, and Dave Bacon. 2017. Federated Learning: Strategies for Improving Communication Efficiency. arxiv: 1610.05492 [cs.LG]"},{"key":"e_1_3_2_2_18_1","unstructured":"Alex Krizhevsky Vinod Nair and Geoffrey Hinton. 2009. CIFAR-10 (Canadian Institute for Advanced Research). (2009). http:\/\/www.cs.toronto.edu\/ kriz\/cifar.html  Alex Krizhevsky Vinod Nair and Geoffrey Hinton. 2009. CIFAR-10 (Canadian Institute for Advanced Research). (2009). http:\/\/www.cs.toronto.edu\/ kriz\/cifar.html"},{"key":"e_1_3_2_2_19_1","volume-title":"Trojaning Attack on Neural Networks. In 25nd Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Liu Yingqi","year":"2018","unstructured":"Yingqi Liu , Shiqing Ma , Yousra Aafer , Wen-Chuan Lee , Juan Zhai , Weihang Wang , and Xiangyu Zhang . 2018 . Trojaning Attack on Neural Networks. In 25nd Annual Network and Distributed System Security Symposium, NDSS 2018 , San Diego, California, USA , February 18-221, 2018. The Internet Society. Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, and Xiangyu Zhang. 2018. Trojaning Attack on Neural Networks. In 25nd Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-221, 2018. The Internet Society."},{"key":"e_1_3_2_2_20_1","volume-title":"When Federated Learning Meets Blockchain: A New Distributed Learning Paradigm. arxiv","author":"Ma Chuan","year":"2009","unstructured":"Chuan Ma , Jun Li , Ming Ding , Long Shi , Taotao Wang , Zhu Han , and H. Vincent Poor . 2020. When Federated Learning Meets Blockchain: A New Distributed Learning Paradigm. arxiv : 2009 .09338 [cs.NI] Chuan Ma, Jun Li, Ming Ding, Long Shi, Taotao Wang, Zhu Han, and H. Vincent Poor. 2020. When Federated Learning Meets Blockchain: A New Distributed Learning Paradigm. arxiv: 2009.09338 [cs.NI]"},{"key":"e_1_3_2_2_21_1","volume-title":"et almbox","author":"McMahan H Brendan","year":"2016","unstructured":"H Brendan McMahan , Eider Moore , Daniel Ramage , Seth Hampson , et almbox . 2016 b. Communication-efficient learning of deep networks from decentralized data. arXiv preprint arXiv:1602.05629 (2016). H Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, et almbox. 2016b. Communication-efficient learning of deep networks from decentralized data. arXiv preprint arXiv:1602.05629 (2016)."},{"key":"e_1_3_2_2_22_1","unstructured":"H. Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Ag\u00fcera y Arcas. 2016a. Communication-Efficient Learning of Deep Networks from Decentralized Data. arxiv: 1602.05629 [cs.LG]  H. Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Ag\u00fcera y Arcas. 2016a. Communication-Efficient Learning of Deep Networks from Decentralized Data. arxiv: 1602.05629 [cs.LG]"},{"key":"e_1_3_2_2_23_1","unstructured":"El Mahdi El Mhamdi Rachid Guerraoui and S\u00e9bastien Rouault. 2018. The hidden vulnerability of distributed learning in byzantium. arXiv preprint arXiv:1802.07927(2018).  El Mahdi El Mhamdi Rachid Guerraoui and S\u00e9bastien Rouault. 2018. The hidden vulnerability of distributed learning in byzantium. arXiv preprint arXiv:1802.07927(2018)."},{"key":"e_1_3_2_2_24_1","volume-title":"BlockFLow: An Accountable and Privacy-Preserving Solution for Federated Learning. arxiv","author":"Mugunthan Vaikkunth","year":"2007","unstructured":"Vaikkunth Mugunthan , Ravi Rahman , and Lalana Kagal . 2020. BlockFLow: An Accountable and Privacy-Preserving Solution for Federated Learning. arxiv : 2007 .03856 [cs.LG] Vaikkunth Mugunthan, Ravi Rahman, and Lalana Kagal. 2020. BlockFLow: An Accountable and Privacy-Preserving Solution for Federated Learning. arxiv: 2007.03856 [cs.LG]"},{"key":"e_1_3_2_2_25_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https:\/\/metzdowd.com (03","author":"Nakamoto Satoshi","year":"2009","unstructured":"Satoshi Nakamoto . 2009 . Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https:\/\/metzdowd.com (03 2009). Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. Cryptography Mailing list at https:\/\/metzdowd.com (03 2009)."},{"key":"e_1_3_2_2_26_1","volume-title":"Defending Against Backdoors in Federated Learning with Robust Learning Rate. arXiv preprint arXiv:2007.03767","author":"Ozdayi Mustafa Safa","year":"2020","unstructured":"Mustafa Safa Ozdayi , Murat Kantarcioglu , and Yulia R Gel . 2020. Defending Against Backdoors in Federated Learning with Robust Learning Rate. arXiv preprint arXiv:2007.03767 ( 2020 ). Mustafa Safa Ozdayi, Murat Kantarcioglu, and Yulia R Gel. 2020. Defending Against Backdoors in Federated Learning with Robust Learning Rate. arXiv preprint arXiv:2007.03767 (2020)."},{"key":"e_1_3_2_2_27_1","volume-title":"Robust aggregation for federated learning. arXiv preprint arXiv:1912.13445","author":"Pillutla Krishna","year":"2019","unstructured":"Krishna Pillutla , Sham M Kakade , and Zaid Harchaoui . 2019. Robust aggregation for federated learning. arXiv preprint arXiv:1912.13445 ( 2019 ). Krishna Pillutla, Sham M Kakade, and Zaid Harchaoui. 2019. Robust aggregation for federated learning. arXiv preprint arXiv:1912.13445 (2019)."},{"key":"e_1_3_2_2_28_1","volume-title":"Performance Analysis of Private Blockchain Platforms in Varying Workloads. In 2017 26th International Conference on Computer Communication and Networks (ICCCN). 1--6.","author":"Pongnumkul S.","unstructured":"S. Pongnumkul , C. Siripanpornchana , and S. Thajchayapong . 2017 . Performance Analysis of Private Blockchain Platforms in Varying Workloads. In 2017 26th International Conference on Computer Communication and Networks (ICCCN). 1--6. S. Pongnumkul, C. Siripanpornchana, and S. Thajchayapong. 2017. Performance Analysis of Private Blockchain Platforms in Varying Workloads. In 2017 26th International Conference on Computer Communication and Networks (ICCCN). 1--6."},{"key":"e_1_3_2_2_29_1","volume-title":"Robust and communication-efficient federated learning from non-iid data","author":"Sattler Felix","year":"2019","unstructured":"Felix Sattler , Simon Wiedemann , Klaus-Robert M\u00fcller , and Wojciech Samek . 2019. Robust and communication-efficient federated learning from non-iid data . IEEE transactions on neural networks and learning systems ( 2019 ). Felix Sattler, Simon Wiedemann, Klaus-Robert M\u00fcller, and Wojciech Samek. 2019. Robust and communication-efficient federated learning from non-iid data. IEEE transactions on neural networks and learning systems (2019)."},{"key":"e_1_3_2_2_30_1","unstructured":"Ali Shafahi W Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. In Advances in Neural Information Processing Systems. 6103--6113.  Ali Shafahi W Ronny Huang Mahyar Najibi Octavian Suciu Christoph Studer Tudor Dumitras and Tom Goldstein. 2018. Poison frogs! targeted clean-label poisoning attacks on neural networks. In Advances in Neural Information Processing Systems. 6103--6113."},{"key":"e_1_3_2_2_31_1","volume-title":"Overcoming Forgetting in Federated Learning on Non-IID Data. arXiv preprint arXiv:1910.07796","author":"Shoham Neta","year":"2019","unstructured":"Neta Shoham , Tomer Avidor , Aviv Keren , Nadav Israel , Daniel Benditkis , Liron Mor-Yosef , and Itai Zeitak . 2019. Overcoming Forgetting in Federated Learning on Non-IID Data. arXiv preprint arXiv:1910.07796 ( 2019 ). Neta Shoham, Tomer Avidor, Aviv Keren, Nadav Israel, Daniel Benditkis, Liron Mor-Yosef, and Itai Zeitak. 2019. Overcoming Forgetting in Federated Learning on Non-IID Data. arXiv preprint arXiv:1910.07796 (2019)."},{"key":"e_1_3_2_2_32_1","volume-title":"Ananda Theertha Suresh, and H Brendan McMahan","author":"Sun Ziteng","year":"2019","unstructured":"Ziteng Sun , Peter Kairouz , Ananda Theertha Suresh, and H Brendan McMahan . 2019 . Can you really backdoor federated learning? arXiv preprint arXiv:1911.07963 (2019). Ziteng Sun, Peter Kairouz, Ananda Theertha Suresh, and H Brendan McMahan. 2019. Can you really backdoor federated learning? arXiv preprint arXiv:1911.07963 (2019)."},{"key":"e_1_3_2_2_33_1","unstructured":"Gavin Wood. [n.d.]. Ethereum: A secure decentralised generalised transaction ledger. ([n. d.]).  Gavin Wood. [n.d.]. Ethereum: A secure decentralised generalised transaction ledger. ([n. d.])."},{"key":"e_1_3_2_2_34_1","volume-title":"Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates. In International Conference on Machine Learning. 5650--5659","author":"Yin Dong","year":"2018","unstructured":"Dong Yin , Yudong Chen , Ramchandran Kannan , and Peter Bartlett . 2018 . Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates. In International Conference on Machine Learning. 5650--5659 . Dong Yin, Yudong Chen, Ramchandran Kannan, and Peter Bartlett. 2018. Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates. In International Conference on Machine Learning. 5650--5659."}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","location":"Virtual Event USA","acronym":"CODASPY '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447837","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447837"}},"subtitle":["Accountable Federated Learning via Hybrid Blockchain Architecture"],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":34,"alternative-id":["10.1145\/3422337.3447837","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447837","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}