{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:53:55Z","timestamp":1773510835787,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T00:00:00Z","timestamp":1626825600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ecocloud"},{"name":"Swiss National Science Foundation","award":["200021_182542"],"award-info":[{"award-number":["200021_182542"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,21]]},"DOI":"10.1145\/3465084.3467919","type":"proceedings-article","created":{"date-parts":[[2021,7,23]],"date-time":"2021-07-23T21:09:28Z","timestamp":1627074568000},"page":"391-401","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Differential Privacy and Byzantine Resilience in SGD"],"prefix":"10.1145","author":[{"given":"Rachid","family":"Guerraoui","sequence":"first","affiliation":[{"name":"Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne (EPFL), Lausanne, Switzerland"}]},{"given":"Nirupam","family":"Gupta","sequence":"additional","affiliation":[{"name":"Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne (EPFL), Lausanne, Switzerland"}]},{"given":"Rafa\u00ebl","family":"Pinot","sequence":"additional","affiliation":[{"name":"Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne (EPFL), Lausanne, Switzerland"}]},{"given":"S\u00e9bastien","family":"Rouault","sequence":"additional","affiliation":[{"name":"Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne (EPFL), Lausanne, Switzerland"}]},{"given":"John","family":"Stephan","sequence":"additional","affiliation":[{"name":"Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne (EPFL), Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2021,7,23]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_2_1","volume-title":"Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019","author":"Baruch Moran","year":"2019","unstructured":"Moran Baruch , Gilad Baruch , and Yoav Goldberg . 2019 . A Little Is Enough: Circumventing Defenses For Distributed Learning . In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019 , 8--14 December 2019, Long Beach, CA, USA. Moran Baruch, Gilad Baruch, and Yoav Goldberg. 2019. A Little Is Enough: Circumventing Defenses For Distributed Learning. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 8--14 December 2019, Long Beach, CA, USA."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Raef Bassily Adam Smith and Abhradeep Thakurta. 2014. Differentially Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds. arxiv: 1405.7085 [cs.LG]  Raef Bassily Adam Smith and Abhradeep Thakurta. 2014. Differentially Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds. arxiv: 1405.7085 [cs.LG]","DOI":"10.1109\/FOCS.2014.56"},{"key":"e_1_3_2_2_4_1","first-page":"I","article-title":"Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent","volume":"30","author":"Blanchard Peva","year":"2017","unstructured":"Peva Blanchard , El Mahdi El Mhamdi , Rachid Guerraoui , and Julien Stainer . 2017 . Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent . In Advances in Neural Information Processing Systems 30 , I . Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.). Curran Associates, Inc., 119--129. http:\/\/papers.nips.cc\/paper\/6617-machine-learning-with-adversaries-byzantine-tolerant-gradient-descent.pdf Peva Blanchard, El Mahdi El Mhamdi, Rachid Guerraoui, and Julien Stainer. 2017. Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent. In Advances in Neural Information Processing Systems 30, I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.). Curran Associates, Inc., 119--129. http:\/\/papers.nips.cc\/paper\/6617-machine-learning-with-adversaries-byzantine-tolerant-gradient-descent.pdf","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_2_5_1","volume-title":"On-line Learning and Stochastic Approximations","author":"Bottou L\u00e9on","unstructured":"L\u00e9on Bottou . 1999. On-line Learning and Stochastic Approximations . Cambridge University Press , 9--42. https:\/\/doi.org\/10.1017\/CBO9780511569920.003 L\u00e9on Bottou. 1999. On-line Learning and Stochastic Approximations .Cambridge University Press, 9--42. https:\/\/doi.org\/10.1017\/CBO9780511569920.003"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/16M1080173"},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\"a ssan","author":"Chen Lingjiao","year":"2018","unstructured":"Lingjiao Chen , Hongyi Wang , Zachary B. Charles , and Dimitris S. Papailiopoulos . 2018. DRACO: Byzantine-resilient Distributed Training via Redundant Gradients . In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\"a ssan , Stockholm, Sweden, July 10--15 , 2018 (Proceedings of Machine Learning Research, Vol. 80), Jennifer G. Dy and Andreas Krause (Eds.). PMLR, 902--911. http:\/\/proceedings.mlr.press\/v80\/chen18l.html Lingjiao Chen, Hongyi Wang, Zachary B. Charles, and Dimitris S. Papailiopoulos. 2018. DRACO: Byzantine-resilient Distributed Training via Redundant Gradients. In Proceedings of the 35th International Conference on Machine Learning, ICML 2018, Stockholmsm\"a ssan, Stockholm, Sweden, July 10--15, 2018 (Proceedings of Machine Learning Research, Vol. 80), Jennifer G. Dy and Andreas Krause (Eds.). PMLR, 902--911. http:\/\/proceedings.mlr.press\/v80\/chen18l.html"},{"key":"e_1_3_2_2_9_1","volume-title":"Privacy-preserving and Secure Design. In 2018 IEEE International Conference on Big Data (Big Data). 1178--1187","author":"Chen X.","unstructured":"X. Chen , J. Ji , C. Luo , W. Liao , and P. Li . 2018. When Machine Learning Meets Blockchain: A Decentralized , Privacy-preserving and Secure Design. In 2018 IEEE International Conference on Big Data (Big Data). 1178--1187 . X. Chen, J. Ji , C. Luo, W. Liao, and P. Li. 2018. When Machine Learning Meets Blockchain: A Decentralized, Privacy-preserving and Secure Design. In 2018 IEEE International Conference on Big Data (Big Data). 1178--1187."},{"key":"e_1_3_2_2_10_1","volume-title":"Differentially Private Stochastic Coordinate Descent. arxiv","author":"Damaskinos Georgios","year":"2006","unstructured":"Georgios Damaskinos , Celestine Mendler-D\u00fcnner , Rachid Guerraoui , Nikolaos Papandreou , and Thomas Parnell . 2020. Differentially Private Stochastic Coordinate Descent. arxiv : 2006 .07272 [cs.LG] Georgios Damaskinos, Celestine Mendler-D\u00fcnner, Rachid Guerraoui, Nikolaos Papandreou, and Thomas Parnell. 2020. Differentially Private Stochastic Coordinate Descent. arxiv: 2006.07272 [cs.LG]"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"J. Deng W. Dong R. Socher L.-J. Li K. Li and L. Fei-Fei. 2009. ImageNet: A Large-Scale Hierarchical Image Database. In CVPR09 .  J. Deng W. Dong R. Socher L.-J. Li K. Li and L. Fei-Fei. 2009. ImageNet: A Large-Scale Hierarchical Image Database. In CVPR09 .","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_2_12_1","volume-title":"Automata, Languages and Programming ,","author":"Dwork Cynthia","unstructured":"Cynthia Dwork . 2006. Differential Privacy . In Automata, Languages and Programming , , Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 1--12. Cynthia Dwork. 2006. Differential Privacy. In Automata, Languages and Programming , , Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--12."},{"key":"e_1_3_2_2_13_1","first-page":"3","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork , Aaron Roth , 2014 . The algorithmic foundations of differential privacy . Foundations and Trends in Theoretical Computer Science , Vol. 9 , 3 -- 4 (2014), 211--407. Cynthia Dwork, Aaron Roth, et almbox. 2014. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science , Vol. 9, 3--4 (2014), 211--407.","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"e_1_3_2_2_14_1","volume-title":"L\u00ea Nguy\u00ean Hoang, and S\u00e9bastien Rouault","author":"El-Mhamdi El-Mahdi","year":"2020","unstructured":"El-Mahdi El-Mhamdi , Rachid Guerraoui , Arsany Guirguis , L\u00ea Nguy\u00ean Hoang, and S\u00e9bastien Rouault . 2020 . Genuinely Distributed Byzantine Machine Learning . arxiv: 1905.03853 [cs.DC] El-Mahdi El-Mhamdi, Rachid Guerraoui, Arsany Guirguis, L\u00ea Nguy\u00ean Hoang, and S\u00e9bastien Rouault. 2020. Genuinely Distributed Byzantine Machine Learning. arxiv: 1905.03853 [cs.DC]"},{"key":"e_1_3_2_2_15_1","volume-title":"Distributed Momentum for Byzantine-resilient Stochastic Gradient Descent. In 9th International Conference on Learning Representations, ICLR 2021","author":"El-Mhamdi El-Mahdi","year":"2021","unstructured":"El-Mahdi El-Mhamdi , Rachid Guerraoui , and S\u00e9bastien Rouault . 2021 . Distributed Momentum for Byzantine-resilient Stochastic Gradient Descent. In 9th International Conference on Learning Representations, ICLR 2021 , Vienna, Austria, May 4--8 , 2021. OpenReview.net. https:\/\/openreview.net\/forum?id=H8UHdhWG6A3 El-Mahdi El-Mhamdi, Rachid Guerraoui, and S\u00e9bastien Rouault. 2021. Distributed Momentum for Byzantine-resilient Stochastic Gradient Descent. In 9th International Conference on Learning Representations, ICLR 2021, Vienna, Austria, May 4--8, 2021. OpenReview.net. https:\/\/openreview.net\/forum?id=H8UHdhWG6A3"},{"key":"e_1_3_2_2_16_1","volume-title":"Sai Praneeth Karimireddy, and Martin Jaggi","author":"He Lie","year":"2020","unstructured":"Lie He , Sai Praneeth Karimireddy, and Martin Jaggi . 2020 . Secure Byzantine-Robust Machine Learning . arxiv: 2006.04747 [cs.LG] Lie He, Sai Praneeth Karimireddy, and Martin Jaggi. 2020. Secure Byzantine-Robust Machine Learning. arxiv: 2006.04747 [cs.LG]"},{"key":"e_1_3_2_2_17_1","volume-title":"Private, Federated Gradient Descent. arxiv","author":"Jayaram K. R.","year":"2012","unstructured":"K. R. Jayaram , Archit Verma , Ashish Verma , Gegi Thomas , and Colin Sutcher-Shepard . 2020. MYSTIKO : : Cloud-Mediated , Private, Federated Gradient Descent. arxiv : 2012 .00740 [cs.CR] K. R. Jayaram, Archit Verma, Ashish Verma, Gegi Thomas, and Colin Sutcher-Shepard. 2020. MYSTIKO : : Cloud-Mediated, Private, Federated Gradient Descent. arxiv: 2012.00740 [cs.CR]"},{"key":"e_1_3_2_2_18_1","volume-title":"Federated Learning: Strategies for Improving Communication Efficiency. In NIPS Workshop on Private Multi-Party Machine Learning . https:\/\/arxiv.org\/abs\/1610","author":"Jakub","year":"2016","unstructured":"Jakub Kone?n\u00fd, H. Brendan McMahan , Felix X. Yu , Peter Richtarik , Ananda Theertha Suresh , and Dave Bacon . 2016 . Federated Learning: Strategies for Improving Communication Efficiency. In NIPS Workshop on Private Multi-Party Machine Learning . https:\/\/arxiv.org\/abs\/1610 .05492 Jakub Kone?n\u00fd, H. Brendan McMahan, Felix X. Yu, Peter Richtarik, Ananda Theertha Suresh, and Dave Bacon. 2016. Federated Learning: Strategies for Improving Communication Efficiency. In NIPS Workshop on Private Multi-Party Machine Learning . https:\/\/arxiv.org\/abs\/1610.05492"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-020-01316-z"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685095"},{"key":"e_1_3_2_2_22_1","volume-title":"The Hidden Vulnerability of Distributed Learning in Byzantium. arxiv","author":"El Mhamdi El Mahdi","year":"1802","unstructured":"El Mahdi El Mhamdi , Rachid Guerraoui , and S\u00e9bastien Rouault . 2018. The Hidden Vulnerability of Distributed Learning in Byzantium. arxiv : 1802 .07927 [stat.ML] El Mahdi El Mhamdi, Rachid Guerraoui, and S\u00e9bastien Rouault. 2018. The Hidden Vulnerability of Distributed Learning in Byzantium. arxiv: 1802.07927 [stat.ML]"},{"key":"e_1_3_2_2_23_1","volume-title":"Toward Robustness and Privacy in Federated Learning: Experimenting with Local and Central Differential Privacy. ArXiv","author":"Naseri M.","year":"2020","unstructured":"M. Naseri , J. Hayes , and Emiliano De Cristofaro . 2020. Toward Robustness and Privacy in Federated Learning: Experimenting with Local and Central Differential Privacy. ArXiv , Vol. abs\/ 2009 .03561 ( 2020 ). M. Naseri, J. Hayes, and Emiliano De Cristofaro. 2020. Toward Robustness and Privacy in Federated Learning: Experimenting with Local and Central Differential Privacy. ArXiv , Vol. abs\/2009.03561 (2020)."},{"key":"e_1_3_2_2_24_1","unstructured":"Nicolas Papernot Mart\u00edn Abadi \u00dalfar Erlingsson Ian Goodfellow and Kunal Talwar. 2017. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. arxiv: 1610.05755 [stat.ML]  Nicolas Papernot Mart\u00edn Abadi \u00dalfar Erlingsson Ian Goodfellow and Kunal Talwar. 2017. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. arxiv: 1610.05755 [stat.ML]"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2008.09.002"},{"key":"e_1_3_2_2_26_1","series-title":"SIAM Journal on Control and Optimization","volume-title":"Acceleration of Stochastic Approximation by Averaging","author":"Polyak Boris","year":"1992","unstructured":"Boris Polyak and Anatoli Juditsky . 1992. Acceleration of Stochastic Approximation by Averaging . SIAM Journal on Control and Optimization , Vol. 30 (07 1992 ), 838--855. https:\/\/doi.org\/10.1137\/0330046 Boris Polyak and Anatoli Juditsky. 1992. Acceleration of Stochastic Approximation by Averaging. SIAM Journal on Control and Optimization , Vol. 30 (07 1992), 838--855. https:\/\/doi.org\/10.1137\/0330046"},{"key":"e_1_3_2_2_27_1","volume-title":"Breakthroughs in statistics","author":"Rao C Radhakrishna","unstructured":"C Radhakrishna Rao . 1992. Information and the accuracy attainable in the estimation of statistical parameters . In Breakthroughs in statistics . Springer , 235--247. C Radhakrishna Rao. 1992. Information and the accuracy attainable in the estimation of statistical parameters. In Breakthroughs in statistics . Springer, 235--247."},{"key":"e_1_3_2_2_28_1","volume-title":"ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. arxiv","author":"Salem Ahmed","year":"1806","unstructured":"Ahmed Salem , Yang Zhang , Mathias Humbert , Pascal Berrang , Mario Fritz , and Michael Backes . 2018. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. arxiv : 1806 .01246 [cs.CR] Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2018. ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models. arxiv: 1806.01246 [cs.CR]"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7447103"},{"key":"e_1_3_2_2_30_1","volume-title":"Membership Inference Attacks against Machine Learning Models. CoRR","author":"Shokri Reza","year":"2016","unstructured":"Reza Shokri , Marco Stronati , and Vitaly Shmatikov . 2016. Membership Inference Attacks against Machine Learning Models. CoRR , Vol. abs\/ 1610 .05820 ( 2016 ). arxiv: 1610.05820 http:\/\/arxiv.org\/abs\/1610.05820 Reza Shokri, Marco Stronati, and Vitaly Shmatikov. 2016. Membership Inference Attacks against Machine Learning Models. CoRR , Vol. abs\/1610.05820 (2016). arxiv: 1610.05820 http:\/\/arxiv.org\/abs\/1610.05820"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2003.1227801"},{"key":"e_1_3_2_2_32_1","volume-title":"Byzantine-Resilient Secure Federated Learning. arxiv","author":"So Jinhyun","year":"2007","unstructured":"Jinhyun So , Basak Guler , and A. Salman Avestimehr . 2020. Byzantine-Resilient Secure Federated Learning. arxiv : 2007 .11115 [cs.CR] Jinhyun So, Basak Guler, and A. Salman Avestimehr. 2020. Byzantine-Resilient Secure Federated Learning. arxiv: 2007.11115 [cs.CR]"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP.2013.6736861"},{"key":"e_1_3_2_2_34_1","volume-title":"Electronics","volume":"8","author":"Tang Fengyi","year":"2019","unstructured":"Fengyi Tang , Wei Wu , Jian Liu , and Ming Xian . 2019 . Privacy-Preserving Distributed Deep Learning via Homomorphic Re-Encryption . Electronics , Vol. 8 (04 2019), 411. https:\/\/doi.org\/10.3390\/electronics8040411 Fengyi Tang, Wei Wu, Jian Liu, and Ming Xian. 2019. Privacy-Preserving Distributed Deep Learning via Homomorphic Re-Encryption. Electronics , Vol. 8 (04 2019), 411. https:\/\/doi.org\/10.3390\/electronics8040411"},{"key":"e_1_3_2_2_35_1","volume-title":"Generalized Byzantine-tolerant SGD. arxiv","author":"Xie Cong","year":"1802","unstructured":"Cong Xie , Oluwasanmi Koyejo , and Indranil Gupta . 2018a. Generalized Byzantine-tolerant SGD. arxiv : 1802 .10116 [cs.DC] Cong Xie, Oluwasanmi Koyejo, and Indranil Gupta. 2018a. Generalized Byzantine-tolerant SGD. arxiv: 1802.10116 [cs.DC]"},{"key":"e_1_3_2_2_36_1","volume-title":"Phocas: dimensional Byzantine-resilient stochastic gradient descent. arxiv","author":"Xie Cong","year":"1805","unstructured":"Cong Xie , Oluwasanmi Koyejo , and Indranil Gupta . 2018b. Phocas: dimensional Byzantine-resilient stochastic gradient descent. arxiv : 1805 .09682 [cs.DC] Cong Xie, Oluwasanmi Koyejo, and Indranil Gupta. 2018b. Phocas: dimensional Byzantine-resilient stochastic gradient descent. arxiv: 1805.09682 [cs.DC]"},{"key":"e_1_3_2_2_37_1","volume-title":"Proceedings of the Thirty-Fifth Conference on Uncertainty in Artificial Intelligence, UAI 2019","author":"Xie Cong","year":"2019","unstructured":"Cong Xie , Oluwasanmi Koyejo , and Indranil Gupta . 2019 a. Fall of Empires: Breaking Byzantine-tolerant SGD by Inner Product Manipulation . In Proceedings of the Thirty-Fifth Conference on Uncertainty in Artificial Intelligence, UAI 2019 , Tel Aviv, Israel, July 22--25 , 2019. 83. Cong Xie, Oluwasanmi Koyejo, and Indranil Gupta. 2019 a. Fall of Empires: Breaking Byzantine-tolerant SGD by Inner Product Manipulation. In Proceedings of the Thirty-Fifth Conference on Uncertainty in Artificial Intelligence, UAI 2019, Tel Aviv, Israel, July 22--25, 2019. 83."},{"key":"e_1_3_2_2_38_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9--15","volume":"6901","author":"Xie Cong","year":"2019","unstructured":"Cong Xie , Sanmi Koyejo , and Indranil Gupta . 2019 b. Zeno: Distributed Stochastic Gradient Descent with Suspicion-based Fault-tolerance . In Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9--15 June 2019, Long Beach, California, USA (Proceedings of Machine Learning Research , Vol. 97), , Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.). PMLR , 6893-- 6901 . http:\/\/proceedings.mlr.press\/v97\/xie19b.html Cong Xie, Sanmi Koyejo, and Indranil Gupta. 2019 b. Zeno: Distributed Stochastic Gradient Descent with Suspicion-based Fault-tolerance. In Proceedings of the 36th International Conference on Machine Learning, ICML 2019, 9--15 June 2019, Long Beach, California, USA (Proceedings of Machine Learning Research, Vol. 97), , Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.). PMLR , 6893--6901. http:\/\/proceedings.mlr.press\/v97\/xie19b.html"},{"key":"e_1_3_2_2_39_1","volume-title":"Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates. arxiv","author":"Yin Dong","year":"1803","unstructured":"Dong Yin , Yudong Chen , Kannan Ramchandran , and Peter Bartlett . 2018. Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates. arxiv : 1803 .01498 [cs.LG] Dong Yin, Yudong Chen, Kannan Ramchandran, and Peter Bartlett. 2018. Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates. arxiv: 1803.01498 [cs.LG]"},{"key":"e_1_3_2_2_40_1","volume-title":"Wide Residual Networks. CoRR","author":"Zagoruyko Sergey","year":"2016","unstructured":"Sergey Zagoruyko and Nikos Komodakis . 2016. Wide Residual Networks. CoRR , Vol. abs\/ 1605 .07146 ( 2016 ). arxiv: 1605.07146 http:\/\/arxiv.org\/abs\/1605.07146 Sergey Zagoruyko and Nikos Komodakis. 2016. Wide Residual Networks. CoRR , Vol. abs\/1605.07146 (2016). arxiv: 1605.07146 http:\/\/arxiv.org\/abs\/1605.07146"},{"key":"e_1_3_2_2_41_1","volume-title":"Why gradient clipping accelerates training: A theoretical justification for adaptivity. arxiv","author":"Zhang Jingzhao","year":"1905","unstructured":"Jingzhao Zhang , Tianxing He , Suvrit Sra , and Ali Jadbabaie . 2020. Why gradient clipping accelerates training: A theoretical justification for adaptivity. arxiv : 1905 .11881 [math.OC] Jingzhao Zhang, Tianxing He, Suvrit Sra, and Ali Jadbabaie. 2020. Why gradient clipping accelerates training: A theoretical justification for adaptivity. arxiv: 1905.11881 [math.OC]"},{"key":"e_1_3_2_2_42_1","volume-title":"Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d Alch\u00e9-Buc","author":"Zhu Ligeng","unstructured":"Ligeng Zhu , Zhijian Liu , and Song Han . 2019. Deep Leakage from Gradients . In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d Alch\u00e9-Buc , E. Fox, and R. Garnett (Eds.). Curran Associates, Inc. , 14774--14784. http:\/\/papers.nips.cc\/paper\/9617-deep-leakage-from-gradients.pdf Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep Leakage from Gradients. In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. d Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., 14774--14784. http:\/\/papers.nips.cc\/paper\/9617-deep-leakage-from-gradients.pdf"},{"key":"e_1_3_2_2_43_1","volume-title":"Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity. arxiv","author":"Erlingsson \u00dalfar","year":"1811","unstructured":"\u00dalfar Erlingsson , Vitaly Feldman , Ilya Mironov , Ananth Raghunathan , Kunal Talwar , and Abhradeep Thakurta . 2020. Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity. arxiv : 1811 .12469 [cs.LG] \u00dalfar Erlingsson, Vitaly Feldman, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and Abhradeep Thakurta. 2020. Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity. arxiv: 1811.12469 [cs.LG]"}],"event":{"name":"PODC '21: ACM Symposium on Principles of Distributed Computing","location":"Virtual Event Italy","acronym":"PODC '21","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465084.3467919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465084.3467919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:25Z","timestamp":1750191505000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465084.3467919"}},"subtitle":["Do They Add Up?"],"short-title":[],"issued":{"date-parts":[[2021,7,21]]},"references-count":43,"alternative-id":["10.1145\/3465084.3467919","10.1145\/3465084"],"URL":"https:\/\/doi.org\/10.1145\/3465084.3467919","relation":{},"subject":[],"published":{"date-parts":[[2021,7,21]]},"assertion":[{"value":"2021-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}