{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:14:48Z","timestamp":1763968488026,"version":"3.41.0"},"reference-count":14,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:00:00Z","timestamp":1648598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["GetMobile: Mobile Comp. and Comm."],"published-print":{"date-parts":[[2022,3,30]]},"abstract":"<jats:p>Mobile networks and devices provide the users with ubiquitous connectivity, while many of their functionality and business models rely on data analysis and processing. In this context, Machine Learning (ML) plays a key role and has been successfully leveraged by the different actors in the mobile ecosystem (e.g., application and Operating System developers, vendors, network operators, etc.). Traditional ML designs assume (user) data are collected and models are trained in a centralized location. However, this approach has privacy consequences related to data collection and processing. Such concerns have incentivized the scientific community to design and develop Privacy-preserving ML methods, including techniques like Federated Learning (FL) where the ML model is trained or personalized on user devices close to the data; Differential Privacy, where data are manipulated to limit the disclosure of private information; Trusted Execution Environments (TEE), where most of the computation is run under a secure\/ private environment; and Multi-Party Computation, a cryptographic technique that allows various parties to run joint computations without revealing their private data to each other.<\/jats:p>","DOI":"10.1145\/3529706.3529715","type":"journal-article","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T22:24:07Z","timestamp":1648679047000},"page":"35-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["PPFL"],"prefix":"10.1145","volume":"25","author":[{"given":"Fan","family":"Mo","sequence":"first","affiliation":[{"name":"Imperial College London, UK"}]},{"given":"Hamed","family":"Haddadi","sequence":"additional","affiliation":[{"name":"Imperial College London, UK"}]},{"given":"Kleomenis","family":"Katevas","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"given":"Eduard","family":"Marin","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"given":"Diego","family":"Perino","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]},{"given":"Nicolas","family":"Kourtellis","sequence":"additional","affiliation":[{"name":"Telefonica Research, Barcelona, Spain"}]}],"member":"320","published-online":{"date-parts":[[2022,3,30]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics, PMLR, 2938--2948. https:\/\/ proceedings.mlr.press\/v108\/bagdasaryan20a.html","author":"Bagdasaryan Eugene","year":"2020","unstructured":"Eugene Bagdasaryan , Andreas Veit , Yiqing Hua , Deborah Estrin , and Vitaly Shmatikov . 2020 . How to backdoor federated learning . Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics, PMLR, 2938--2948. https:\/\/ proceedings.mlr.press\/v108\/bagdasaryan20a.html Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2020. How to backdoor federated learning. Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics, PMLR, 2938--2948. https:\/\/ proceedings.mlr.press\/v108\/bagdasaryan20a.html"},{"key":"e_1_2_1_2_1","volume-title":"Eleanor Birrell, Hamed Haddadi, and Deborah Estrin.","author":"Katevas Kleomenis","year":"2021","unstructured":"Kleomenis Katevas , Eugene Bagdasaryan , Jason Waterman , Mohamad Mounir Safadieh , Eleanor Birrell, Hamed Haddadi, and Deborah Estrin. 2021 . Policy-based federated learning. http:\/\/arxiv.org\/ abs\/2003.06612 Kleomenis Katevas, Eugene Bagdasaryan, Jason Waterman, Mohamad Mounir Safadieh, Eleanor Birrell, Hamed Haddadi, and Deborah Estrin. 2021. Policy-based federated learning. http:\/\/arxiv.org\/ abs\/2003.06612"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3426745.3431337"},{"key":"e_1_2_1_4_1","first-page":"429","article-title":"Federated optimization in heterogeneous networks","volume":"2","author":"Li Tian","year":"2020","unstructured":"Tian Li , Anit Kumar Sahu , Manzil Zaheer , Maziar Sanjabi , Ameet Talwalkar , and Virginia Smith . 2020 . Federated optimization in heterogeneous networks . Proceedings of Machine Learning and Systems 2 , 429 -- 450 . Tian Li, Anit Kumar Sahu, Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, and Virginia Smith. 2020. Federated optimization in heterogeneous networks. Proceedings of Machine Learning and Systems 2, 429--450.","journal-title":"Proceedings of Machine Learning and Systems"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, PMLR, 1273--1282","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan , Eider Moore , Daniel Ramage , Seth Hampson , and Blaise Aguera y Arcas . 2017 . Communication-efficient learning of deep networks from decentralized data . Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, PMLR, 1273--1282 . https:\/\/proceedings. mlr.press\/v54\/mcmahan17a.html Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, PMLR, 1273--1282. https:\/\/proceedings. mlr.press\/v54\/mcmahan17a.html"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"key":"e_1_2_1_7_1","volume-title":"International Conference of Learning Representations: Workshop on Distributed and Private Machine Learning (DPML).","author":"Mo Fan","year":"2020","unstructured":"Fan Mo , Anastasia Borovykh , Mohammad Malekzadeh , Hamed Haddadi , and Soteris Demetriou . 2020 . Layer-wise characterization of latent information leakage in federated learning . International Conference of Learning Representations: Workshop on Distributed and Private Machine Learning (DPML). Fan Mo, Anastasia Borovykh, Mohammad Malekzadeh, Hamed Haddadi, and Soteris Demetriou. 2020. Layer-wise characterization of latent information leakage in federated learning. International Conference of Learning Representations: Workshop on Distributed and Private Machine Learning (DPML)."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466628"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3388946"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning, PMLR, 5558--5567","author":"Sablayrolles Alexandre","year":"2019","unstructured":"Alexandre Sablayrolles , Matthijs Douze , Cordelia Schmid , Yann Ollivier , and Herve Jegou . 2019 . White-box vs black-box: Bayes optimal strategies for membership inference . Proceedings of the 36th International Conference on Machine Learning, PMLR, 5558--5567 . https:\/\/proceedings. mlr.press\/v97\/sablayrolles19a.html Alexandre Sablayrolles, Matthijs Douze, Cordelia Schmid, Yann Ollivier, and Herve Jegou. 2019. White-box vs black-box: Bayes optimal strategies for membership inference. Proceedings of the 36th International Conference on Machine Learning, PMLR, 5558--5567. https:\/\/proceedings. mlr.press\/v97\/sablayrolles19a.html"},{"key":"e_1_2_1_12_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=BkluqlSFDS","author":"Wang Hongyi","year":"2019","unstructured":"Hongyi Wang , Mikhail Yurochkin , Yuekai Sun , Dimitris Papailiopoulos , and Yasaman Khazaeni . 2019 . Federated learning with matched averaging . International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=BkluqlSFDS Hongyi Wang, Mikhail Yurochkin, Yuekai Sun, Dimitris Papailiopoulos, and Yasaman Khazaeni. 2019. Federated learning with matched averaging. International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=BkluqlSFDS"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"},{"key":"e_1_2_1_14_1","volume-title":"Curran Associates","author":"Zhu Ligeng","year":"2019","unstructured":"Ligeng Zhu , Zhijian Liu , and Song Han . 2019. Deep leakage from gradients. Advances in Neural Information Processing Systems , Curran Associates , Inc . https:\/\/proceedings.neurips.cc\/ paper\/ 2019 \/hash\/60a6c4002cc7b29142def887153 1281a-Abstract.html Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep leakage from gradients. Advances in Neural Information Processing Systems, Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/ paper\/2019\/hash\/60a6c4002cc7b29142def887153 1281a-Abstract.html"}],"container-title":["GetMobile: Mobile Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529706.3529715","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3529706.3529715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:13Z","timestamp":1750183753000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529706.3529715"}},"subtitle":["Enhancing Privacy in Federated Learning with Confidential Computing"],"short-title":[],"issued":{"date-parts":[[2022,3,30]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,3,30]]}},"alternative-id":["10.1145\/3529706.3529715"],"URL":"https:\/\/doi.org\/10.1145\/3529706.3529715","relation":{},"ISSN":["2375-0529","2375-0537"],"issn-type":[{"type":"print","value":"2375-0529"},{"type":"electronic","value":"2375-0537"}],"subject":[],"published":{"date-parts":[[2022,3,30]]},"assertion":[{"value":"2022-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}