{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:02:37Z","timestamp":1773615757785,"version":"3.50.1"},"reference-count":18,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.3103\/s0146411625700749","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T12:32:17Z","timestamp":1771936337000},"page":"1224-1229","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protection of Neural Network Models from Privacy Breach Threats in Federated Learning Using Optimization Methods"],"prefix":"10.3103","volume":"59","author":[{"given":"D. S.","family":"Lavrova","sequence":"first","affiliation":[]},{"given":"P. D.","family":"Bezborodov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2026,2,24]]},"reference":[{"key":"7909_CR1","doi-asserted-by":"publisher","first-page":"934","DOI":"10.3103\/s0146411622080211","volume":"56","author":"E.A. Rudnitskaya","year":"2023","unstructured":"Rudnitskaya, E.A. and Poltavtseva, M.A., Adversarial machine learning protection using the example of evasion attacks on medical images, Autom. Control Comput. Sci., 2023, vol. 56, no. 8, pp. 934\u2013941. https:\/\/doi.org\/10.3103\/s0146411622080211","journal-title":"Autom. Control Comput. Sci."},{"key":"7909_CR2","doi-asserted-by":"publisher","first-page":"934","DOI":"10.3103\/s0146411622080211","volume":"56","author":"E.A. Rudnitskaya","year":"2022","unstructured":"Rudnitskaya, E.A. and Poltavtseva, M.A., Adversarial machine learning protection using the example of evasion attacks on medical images, Autom. Control Comput. Sci., 2022, vol. 56, no. 8, pp. 934\u2013941. https:\/\/doi.org\/10.3103\/s0146411622080211","journal-title":"Autom. Control Comput. Sci."},{"key":"7909_CR3","doi-asserted-by":"publisher","unstructured":"Shokri, R., Stronati, M., Song, C., and Shmatikov, V., Membership inference attacks against machine learning models, 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, 2017, IEEE, 2017, pp. 3\u201318. https:\/\/doi.org\/10.1109\/sp.2017.41","DOI":"10.1109\/sp.2017.41"},{"key":"7909_CR4","doi-asserted-by":"publisher","unstructured":"Fredrikson, M., Jha, S., and Ristenpart, T., Model inversion attacks that exploit confidence information and basic countermeasures, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, 2015, New York: Association for Computing Machinery, 2015, pp. 1322\u20131333. https:\/\/doi.org\/10.1145\/2810103.2813677","DOI":"10.1145\/2810103.2813677"},{"key":"7909_CR5","doi-asserted-by":"publisher","unstructured":"Zhang, J., Chen, J., Wu, D., Chen, B., and Yu, Sh., Poisoning attack in federated learning using generative adversarial nets, 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), Rotorua, New Zealand, 2019, IEEE, 2019, pp. 374\u2013380. https:\/\/doi.org\/10.1109\/trustcom\/bigdatase.2019.00057","DOI":"10.1109\/trustcom\/bigdatase.2019.00057"},{"key":"7909_CR6","doi-asserted-by":"crossref","unstructured":"Krundyshev, V.M., Cheskidov, V.K., and Kalinin, M.O., A method for protecting global models in federated learning systems based on a trust model, Autom. Control Comput. Sci., 2025, vol. 59, no. 8.","DOI":"10.3103\/S0146411625700762"},{"key":"7909_CR7","unstructured":"Sutskever, I., Martens, J., Dahl, G., and Hinton, G., On the importance of initialization and momentum in deep learning, International Conference on Machine Learning, PMLR, 2013, pp. 1139\u20131147."},{"key":"7909_CR8","first-page":"253","volume":"17","author":"D.P. Zegzhda","year":"2014","unstructured":"Zegzhda, D.P. and Nikolsky, A.V., Formal security model for virtual machine hypervisors in cloud computing systems, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, pp. 253\u2013262.","journal-title":"Nonlinear Phenom. Complex Syst."},{"key":"7909_CR9","doi-asserted-by":"publisher","unstructured":"Ma, J. and Yarats, D., Quasi-hyperbolic momentum and adam for deep learning, arXiv Preprint, 2018. https:\/\/doi.org\/10.48550\/arXiv.1810.06801","DOI":"10.48550\/arXiv.1810.06801"},{"key":"7909_CR10","doi-asserted-by":"publisher","unstructured":"Fatin, A., Pavlenko, E., and Zegzhda, P., Detection of anomalies in IoT systems by neuroevolution algorithms, Algorithms and Solutions Based on Computer Technology, Jahn, C., Ungv\u00e1ri, L., and Ilin, I., Eds., Lecture Notes in Networks and Systems, vol. 387, Cham: Springer, 2022, pp. 47\u201355. https:\/\/doi.org\/10.1007\/978-3-030-93872-7_5","DOI":"10.1007\/978-3-030-93872-7_5"},{"key":"7909_CR11","unstructured":"Polyak, B.T., Vvedenie v optimizatsiyu (Introduction to Optimization), Moscow: Nauka, 1983."},{"key":"7909_CR12","first-page":"543","volume":"269","author":"Yu.E. Nesterov","year":"1983","unstructured":"Nesterov, Yu.E., Method for minimizing convex functions with convergence rate O(1\/k\n               2), Dokl. Akad. Nauk SSSR, 1983, vol. 269, no. 3, pp. 543\u2013547.","journal-title":"Dokl. Akad. Nauk SSSR"},{"key":"7909_CR13","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s11416-022-00435-0","volume":"19","author":"M. Kalinin","year":"2022","unstructured":"Kalinin, M. and Krundyshev, V., Security intrusion detection using quantum machine learning techniques, J.\u00a0Comput. Virol. Hacking Tech., 2022, vol. 19, no. 1, pp. 125\u2013136. https:\/\/doi.org\/10.1007\/s11416-022-00435-0","journal-title":"J.\u00a0Comput. Virol. Hacking Tech."},{"key":"7909_CR14","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1137\/15m1009597","volume":"26","author":"L. Lessard","year":"2016","unstructured":"Lessard, L., Recht, B., and Packard, A., Analysis and design of optimization algorithms via integral quadratic constraints, SIAM J. Optim., 2016, vol. 26, no. 1, pp. 57\u201395. https:\/\/doi.org\/10.1137\/15m1009597","journal-title":"SIAM J. Optim."},{"key":"7909_CR15","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.3103\/s014641162108040x","volume":"55","author":"M.O. Kalinin","year":"2021","unstructured":"Kalinin, M.O. and Krundyshev, V.M., Analysis of a huge amount of network traffic based on quantum machine learning, Autom. Control Comput. Sci., 2021, vol. 55, no. 8, pp. 1165\u20131174. https:\/\/doi.org\/10.3103\/s014641162108040x","journal-title":"Autom. Control Comput. Sci."},{"key":"7909_CR16","doi-asserted-by":"publisher","unstructured":"Hu, C.S., Van Scoy, B., Lessard, B., and L,, A robust accelerated optimization algorithm for strongly convex functions, Annual American Control Conference (ACC), Milwaukee, WI, 2018, IEEE, 2018, pp. 1376\u20131381. https:\/\/doi.org\/10.23919\/ACC.2018.8430824","DOI":"10.23919\/ACC.2018.8430824"},{"key":"7909_CR17","doi-asserted-by":"publisher","first-page":"126","DOI":"10.3390\/a17030126","volume":"17","author":"G.V. Krivovichev","year":"2024","unstructured":"Krivovichev, G.V. and Sergeeva, V.Yu., Analysis of a two-step gradient method with two momentum parameters for strongly convex unconstrained optimization, Algorithms, 2024, vol. 17, no. 3, p. 126. https:\/\/doi.org\/10.3390\/a17030126","journal-title":"Algorithms"},{"key":"7909_CR18","first-page":"253","volume":"17","author":"D.P. Zegzhda","year":"2014","unstructured":"Zegzhda, D.P. and Nikolsky, A.V., Formal security model for virtual machine hypervisors in cloud computing systems, Nonlinear Phenom. Complex Syst., 2014, vol. 17, no. 3, pp. 253\u2013262.","journal-title":"Nonlinear Phenom. Complex Syst."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700749.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411625700749","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411625700749.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:04:11Z","timestamp":1773612251000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411625700749"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12]]},"references-count":18,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["7909"],"URL":"https:\/\/doi.org\/10.3103\/s0146411625700749","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"14 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}