{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:54:10Z","timestamp":1773510850518,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"France 2030 ANR Projects","award":["ANR-22-PECY-003 SecureCompute"],"award-info":[{"award-number":["ANR-22-PECY-003 SecureCompute"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3652892.3700783","type":"proceedings-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:36:13Z","timestamp":1732736173000},"page":"431-444","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Practical Homomorphic Aggregation in Byzantine-Resilient Distributed Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2555-140X","authenticated-orcid":false,"given":"Antoine","family":"Choffrut","sequence":"first","affiliation":[{"name":"Universit\u00e9 Paris-Saclay, CEA List, Palaiseau, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4794-8902","authenticated-orcid":false,"given":"Rachid","family":"Guerraoui","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5372-8300","authenticated-orcid":false,"given":"Rafael","family":"Pinot","sequence":"additional","affiliation":[{"name":"Sorbonne, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4720-9269","authenticated-orcid":false,"given":"Renaud","family":"Sirdey","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Paris-Saclay, CEA List, Palaiseau, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0293-1967","authenticated-orcid":false,"given":"John","family":"Stephan","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0669-6486","authenticated-orcid":false,"given":"Martin","family":"Zuber","sequence":"additional","affiliation":[{"name":"CryptoNext Security, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-34671-2_8"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"e_1_3_2_1_3_1","volume-title":"Byzantine-Resilient Non-Convex Stochastic Gradient Descent. In International Conference on Learning Representations.","author":"Allen-Zhu Zeyuan","year":"2020","unstructured":"Zeyuan Allen-Zhu, Faeze Ebrahimianghazani, Jerry Li, and Dan Alistarh. 2020. Byzantine-Resilient Non-Convex Stochastic Gradient Descent. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of The 26th International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research","volume":"1300","author":"Allouah Youssef","year":"2023","unstructured":"Youssef Allouah, Sadegh Farhadkhani, Rachid Guerraoui, Nirupam Gupta, Rafael Pinot, and John Stephan. 2023. Fixing by Mixing: A Recipe for Optimal Byzantine ML under Heterogeneity. In Proceedings of The 26th International Conference on Artificial Intelligence and Statistics (Proceedings of Machine Learning Research, Vol. 206), Francisco Ruiz, Jennifer Dy, and Jan-Willem van de Meent (Eds.). PMLR, 1232--1300. https:\/\/proceedings.mlr.press\/v206\/allouah23a.html"},{"key":"e_1_3_2_1_5_1","unstructured":"Youssef Allouah Rachid Guerraoui Nirupam Gupta Ahmed Jellouli Geovani Rizk and John Stephan. 2024. The Vital Role of Gradient Clipping in Byzantine-Resilient Distributed Learning. arXiv:2405.14432 [cs.LG] https:\/\/arxiv.org\/abs\/2405.14432"},{"key":"e_1_3_2_1_6_1","volume-title":"On the Privacy-Robustness-Utility Trilemma in Distributed Learning. In International Conference on Machine Learning.","author":"Allouah Youssef","year":"2023","unstructured":"Youssef Allouah, Rachid Guerraoui, Nirupam Gupta, Rafa\u00ebl Pinot, and John Stephan. 2023. On the Privacy-Robustness-Utility Trilemma in Distributed Learning. In International Conference on Machine Learning."},{"key":"e_1_3_2_1_7_1","unstructured":"Youssef Allouah Rachid Guerraoui and John Stephan. 2024. Robustness Efficiency or Privacy: Pick Two in Machine Learning. arXiv:2312.14712 [cs.LG] https:\/\/arxiv.org\/abs\/2312.14712"},{"key":"e_1_3_2_1_8_1","unstructured":"Ahmad Al Badawi Jack Bates Flavio Bergamaschi David Bruce Cousins Saroja Erabelli Nicholas Genise Shai Halevi Hamish Hunt Andrey Kim Yongwoo Lee Zeyu Liu Daniele Micciancio Ian Quah Yuriy Polyakov Saraswathy R.V. Kurt Rohloff Jonathan Saylor Dmitriy Suponitsky Matthew Triplett Vinod Vaikuntanathan and Vincent Zucca. 2022. OpenFHE: Open-Source Fully Homomorphic Encryption Library. Cryptology ePrint Archive Paper 2022\/915. https:\/\/eprint.iacr.org\/2022\/915 https:\/\/eprint.iacr.org\/2022\/915."},{"key":"e_1_3_2_1_9_1","volume-title":"Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019","author":"Baruch Moran","year":"2019","unstructured":"Moran Baruch, Gilad Baruch, and Yoav Goldberg. 2019. A Little Is Enough: Circumventing Defenses For Distributed Learning. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 8--14 December 2019, Long Beach, CA, USA."},{"key":"e_1_3_2_1_10_1","volume-title":"Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019","author":"Baruch Moran","year":"2019","unstructured":"Moran Baruch, Gilad Baruch, and Yoav Goldberg. 2019. A Little Is Enough: Circumventing Defenses For Distributed Learning. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 8--14 December 2019, Long Beach, CA, USA."},{"key":"e_1_3_2_1_11_1","volume-title":"Parallel and distributed computation: numerical methods","author":"Bertsekas Dimitri","unstructured":"Dimitri Bertsekas and John Tsitsiklis. 2015. Parallel and distributed computation: numerical methods. Athena Scientific."},{"key":"e_1_3_2_1_12_1","first-page":"I","article-title":"Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent","volume":"30","author":"Blanchard Peva","year":"2017","unstructured":"Peva Blanchard, El Mahdi El Mhamdi, Rachid Guerraoui, and Julien Stainer. 2017. Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent. In Advances in Neural Information Processing Systems 30, I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.). Curran Associates, Inc., 119--129.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_15_1","first-page":"111","article-title":"Fully Homomorphic Encryption without Bootstrapping","volume":"18","author":"Brakerski Zvika","year":"2011","unstructured":"Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2011. Fully Homomorphic Encryption without Bootstrapping. Electron. Colloquium Comput. Complex. 18 (2011), 111. http:\/\/dblp.uni-trier.de\/db\/journals\/eccc\/eccc18.html#BrakerskiGV11","journal-title":"Electron. Colloquium Comput. Complex."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24434"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_4"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560827.3563375"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3154503","article-title":"Distributed statistical machine learning in adversarial settings: Byzantine gradient descent","volume":"1","author":"Chen Yudong","year":"2017","unstructured":"Yudong Chen, Lili Su, and Jiaming Xu. 2017. Distributed statistical machine learning in adversarial settings: Byzantine gradient descent. Proceedings of the ACM on Measurement and Analysis of Computing Systems 1, 2 (2017), 1--25.","journal-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_1_21_1","volume-title":"SABLE: Secure And Byzantine robust LEarning. arXiv:2309.05395 [cs.LG]","author":"Choffrut Antoine","year":"2023","unstructured":"Antoine Choffrut, Rachid Guerraoui, Rafael Pinot, Renaud Sirdey, John Stephan, and Martin Zuber. 2023. SABLE: Secure And Byzantine robust LEarning. arXiv:2309.05395 [cs.LG]"},{"key":"e_1_3_2_1_22_1","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Corrigan-Gibbs Henry","year":"2017","unstructured":"Henry Corrigan-Gibbs and Dan Boneh. 2017. Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. In 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). USENIX Association, Boston, MA, 259--282. https:\/\/www.usenix.org\/conference\/nsdi17\/technical-sessions\/presentation\/corrigan-gibbs"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2211477"},{"key":"e_1_3_2_1_24_1","volume-title":"Distributed Momentum for Byzantine-resilient Stochastic Gradient Descent. In 9th International Conference on Learning Representations, ICLR 2021","author":"El Mhamdi El Mahdi","year":"2021","unstructured":"El Mahdi El Mhamdi, Rachid Guerraoui, and S\u00e9bastien Rouault. 2021. Distributed Momentum for Byzantine-resilient Stochastic Gradient Descent. In 9th International Conference on Learning Representations, ICLR 2021, Vienna, Austria, May 4--8, 2021. OpenReview.net."},{"key":"e_1_3_2_1_25_1","unstructured":"Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. (2012). https:\/\/eprint.iacr.org\/2012\/144 Report Number: 144."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 40th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"9813","author":"Farhadkhani Sadegh","year":"2023","unstructured":"Sadegh Farhadkhani, Rachid Guerraoui, Nirupam Gupta, L\u00ea-Nguy\u00ean Hoang, Rafael Pinot, and John Stephan. 2023. Robust Collaborative Learning with Linear Gradient Overhead. In Proceedings of the 40th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 202), Andreas Krause, Emma Brunskill, Kyunghyun Cho, Barbara Engelhardt, Sivan Sabato, and Jonathan Scarlett (Eds.). PMLR, 9761--9813. https:\/\/proceedings.mlr.press\/v202\/farhadkhani23a.html"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 39th International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"6283","author":"Farhadkhani Sadegh","year":"2022","unstructured":"Sadegh Farhadkhani, Rachid Guerraoui, Nirupam Gupta, Rafael Pinot, and John Stephan. 2022. Byzantine Machine Learning Made Easy By Resilient Averaging of Momentums. In Proceedings of the 39th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 162), Kamalika Chaudhuri, Stefanie Jegelka, Le Song, Csaba Szepesvari, Gang Niu, and Sivan Sabato (Eds.). PMLR, 6246--6283."},{"key":"e_1_3_2_1_28_1","volume-title":"Lin (Eds.)","volume":"33","author":"Geiping Jonas","year":"2020","unstructured":"Jonas Geiping, Hartmut Bauermeister, Hannah Dr\u00f6ge, and Michael Moeller. 2020. Inverting Gradients - How easy is it to break privacy in federated learning?. In Advances in Neural Information Processing Systems, H. Larochelle, M. Ranzato, R. Hadsell, M.F. Balcan, and H. Lin (Eds.), Vol. 33. Curran Associates, Inc., 16937--16947. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2020\/file\/c4ede56bbd98819ae6112b20ac6bf145-Paper.pdf"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of The 33rd International Conference on Machine Learning (Proceedings of Machine Learning Research","volume":"210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In Proceedings of The 33rd International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 48), Maria Florina Balcan and Kilian Q. Weinberger (Eds.). PMLR, New York, New York, USA, 201--210. https:\/\/proceedings.mlr.press\/v48\/giladbachrach16.html"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467919"},{"key":"e_1_3_2_1_31_1","unstructured":"Shai Halevi and Victor Shoup. 2020. Design and implementation of HElib: a homomorphic encryption library. Cryptology ePrint Archive Paper 2020\/1481. https:\/\/eprint.iacr.org\/2020\/1481 https:\/\/eprint.iacr.org\/2020\/1481."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488014"},{"key":"e_1_3_2_1_33_1","volume-title":"Sai Praneeth Karimireddy, and Martin Jaggi","author":"He Lie","year":"2020","unstructured":"Lie He, Sai Praneeth Karimireddy, and Martin Jaggi. 2020. Secure Byzantine-Robust Machine Learning. arXiv:2006.04747 [cs.LG]"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134012"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","unstructured":"Tzu-Ming Harry Hsu Hang Qi and Matthew Brown. 2019. Measuring the Effects of Non-Identical Data Distribution for Federated Visual Classification. 10.48550\/ARXIV.1909.06335","DOI":"10.48550\/ARXIV.1909.06335"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0046"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In Proceedings of the 27th USENIX Conference on Security Symposium (Baltimore, MD, USA) (SEC'18). USENIX Association, USA, 1651--1668."},{"key":"e_1_3_2_1_38_1","volume-title":"International Conference On Machine Learning, Vol 139 139","author":"Karimireddy Sai Praneeth","year":"2021","unstructured":"Sai Praneeth Karimireddy, Lie He, and Martin Jaggi. 2021. Learning from History for Byzantine Robust Optimization. International Conference On Machine Learning, Vol 139 139 (2021)."},{"key":"e_1_3_2_1_39_1","volume-title":"MLGuard: Mitigating Poisoning Attacks in Privacy Preserving Distributed Collaborative Learning. 2020 29th International Conference on Computer Communications and Networks (ICCCN) (2020","author":"Khazbak Youssef","year":"2020","unstructured":"Youssef Khazbak, Tianxiang Tan, and Guohong Cao. 2020. MLGuard: Mitigating Poisoning Attacks in Privacy Preserving Distributed Collaborative Learning. 2020 29th International Conference on Computer Communications and Networks (ICCCN) (2020), 1--9. https:\/\/api.semanticscholar.org\/CorpusID:218594342"},{"key":"e_1_3_2_1_40_1","volume-title":"The CIFAR-10 dataset. online: http:\/\/www.cs.toronto.edu\/kriz\/cifar.html 55, 5","author":"Krizhevsky Alex","year":"2014","unstructured":"Alex Krizhevsky, Vinod Nair, and Geoffrey Hinton. 2014. The CIFAR-10 dataset. online: http:\/\/www.cs.toronto.edu\/kriz\/cifar.html 55, 5 (2014)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011544"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467902"},{"key":"e_1_3_2_1_43_1","volume-title":"Geoffrey Charles Fox, and Lei Jiang","author":"Lou Qian","year":"2020","unstructured":"Qian Lou, Bo Feng, Geoffrey Charles Fox, and Lei Jiang. 2020. Glyph: Fast and Accurately Training Deep Neural Networks on Encrypted Data. In Advances in Neural Information Processing Systems, H. Larochelle, M. Ranzato, R. Hadsell, M.F. Balcan, and H. Lin (Eds.), Vol. 33. Curran Associates, Inc., 9193--9202. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2020\/file\/685ac8cadc1be5ac98da9556bc1c8d9e-Paper.pdf"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22818"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103561"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","unstructured":"Abbass Madi Oana Stan Aur\u00e9lien Mayoue Arnaud Grivet-S\u00e9bert C\u00e9dric Gouy-Pailler and Renaud Sirdey. 2021. A Secure Federated Learning framework using Homomorphic Encryption and Verifiable Computing. In 2021 Reconciling Data Analytics Automation Privacy and Security: A Big Data Challenge (RDAAPS). 1--8. 10.1109\/RDAAPS48126.2021.9452005","DOI":"10.1109\/RDAAPS48126.2021.9452005"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3196274"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00054"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2017.85"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.00198"},{"key":"e_1_3_2_1_51_1","volume-title":"FLGUARD: Secure and Private Federated Learning. (01","author":"Nguyen Thien","year":"2021","unstructured":"Thien Nguyen, Phillip Rieger, Hossein Yalame, Helen M\u00f6llering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, and Shaza Zeitouni. 2021. FLGUARD: Secure and Private Federated Learning. (01 2021)."},{"key":"e_1_3_2_1_52_1","volume-title":"PyTorch: An Imperative Style","author":"Paszke Adam","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems 32. Curran Associates, Inc., 8024--8035. http:\/\/papers.neurips.cc\/paper\/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdf"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1137\/0202007"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1971-0301966-0"},{"key":"e_1_3_2_1_56_1","volume-title":"Some methods of speeding up the convergence of iteration methods. USSR computational mathematics and mathematical physics 4, 5","author":"Polyak Boris T","year":"1964","unstructured":"Boris T Polyak. 1964. Some methods of speeding up the convergence of iteration methods. USSR computational mathematics and mathematical physics 4, 5 (1964), 1--17."},{"key":"e_1_3_2_1_57_1","unstructured":"Yogachandran Rahulamathavan Charuka Herath Xiaolan Liu Sangarapillai Lambotharan and Carsten Maple. 2023. FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users. arXiv preprint arXiv:2306.05112 (2023)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560611"},{"key":"e_1_3_2_1_59_1","volume-title":"https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research","author":"SEAL","unstructured":"SEAL 2023. Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL. Microsoft Research, Redmond, WA.."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-021-05970-3"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0045"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","unstructured":"Jinhyun So Basak Guler and A. Salman Avestimehr. 2020. Byzantine-Resilient Secure Federated Learning. 10.48550\/ARXIV.2007.11115","DOI":"10.48550\/ARXIV.2007.11115"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Oana Stan Vincent Thouvenot Aymen Boudguiga Katarzyna Kapusta Martin Zuber and Renaud Sirdey. 2022. A Secure Federated Learning: Analysis of Different Cryptographic Tools.","DOI":"10.5220\/0011322700003283"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST58708.2023.10320195"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2967740"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"e_1_3_2_1_68_1","unstructured":"Raj Kiriti Velicheti Derek Xia and Oluwasanmi Koyejo. 2021. Secure Byzantine-Robust Distributed Learning via Clustering. arXiv:2110.02940 [cs.CR]"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685821"},{"key":"e_1_3_2_1_70_1","volume-title":"Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms. arXiv preprint arXiv:1708.07747","author":"Xiao Han","year":"2017","unstructured":"Han Xiao, Kashif Rasul, and Roland Vollgraf. 2017. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms. arXiv preprint arXiv:1708.07747 (2017)."},{"key":"e_1_3_2_1_71_1","unstructured":"Cong Xie Oluwasanmi Koyejo and Indranil Gupta. 2018. Generalized Byzantine-tolerant SGD. arXiv:1802.10116 [cs.DC]"},{"key":"e_1_3_2_1_72_1","volume-title":"Proceedings of the Thirty-Fifth Conference on Uncertainty in Artificial Intelligence, UAI 2019","author":"Xie Cong","year":"2019","unstructured":"Cong Xie, Oluwasanmi Koyejo, and Indranil Gupta. 2019. Fall of Empires: Breaking Byzantine-tolerant SGD by Inner Product Manipulation. In Proceedings of the Thirty-Fifth Conference on Uncertainty in Artificial Intelligence, UAI 2019, Tel Aviv, Israel, July 22--25, 2019. 83."},{"key":"e_1_3_2_1_73_1","volume-title":"Proceedings of the Thirty-Fifth Conference on Uncertainty in Artificial Intelligence, UAI 2019","author":"Xie Cong","year":"2019","unstructured":"Cong Xie, Oluwasanmi Koyejo, and Indranil Gupta. 2019. Fall of Empires: Breaking Byzantine-tolerant SGD by Inner Product Manipulation. In Proceedings of the Thirty-Fifth Conference on Uncertainty in Artificial Intelligence, UAI 2019, Tel Aviv, Israel, July 22--25, 2019. 83."},{"key":"e_1_3_2_1_74_1","volume-title":"International Conference on Machine Learning. PMLR, 5650--5659","author":"Yin Dong","year":"2018","unstructured":"Dong Yin, Yudong Chen, Ramchandran Kannan, and Peter Bartlett. 2018. Byzantine-robust distributed learning: Towards optimal statistical rates. In International Conference on Machine Learning. PMLR, 5650--5659."},{"key":"e_1_3_2_1_75_1","volume-title":"BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning. In 2020 USENIX Annual Technical Conference (USENIX ATC 20)","author":"Zhang Chengliang","year":"2020","unstructured":"Chengliang Zhang, Suyi Li, Junzhe Xia, Wei Wang, Feng Yan, and Yang Liu. 2020. BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning. In 2020 USENIX Annual Technical Conference (USENIX ATC 20). USENIX Association, 493--506. https:\/\/www.usenix.org\/conference\/atc20\/presentation\/zhang-chengliang"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3221899"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3093711"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"crossref","unstructured":"Heng Zhu and Qing Ling. 2022. Bridging Differential Privacy and Byzantine-Robustness via Model Aggregation. arXiv:2205.00107 [cs.LG]","DOI":"10.24963\/ijcai.2022\/337"},{"key":"e_1_3_2_1_79_1","volume-title":"Garnett (Eds.)","volume":"32","author":"Zhu Ligeng","year":"2019","unstructured":"Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep Leakage from Gradients. In Advances in Neural Information Processing Systems, H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.), Vol. 32. Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2019\/file\/60a6c4002cc7b29142def8871531281a-Paper.pdf"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0020"}],"event":{"name":"Middleware '24: 25th International Middleware Conference","location":"Hong Kong Hong Kong","acronym":"Middleware '24","sponsor":["IFIP","Usenix"]},"container-title":["Proceedings of the 25th International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700783","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652892.3700783","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:57Z","timestamp":1750287237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700783"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":80,"alternative-id":["10.1145\/3652892.3700783","10.1145\/3652892"],"URL":"https:\/\/doi.org\/10.1145\/3652892.3700783","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}