Decentralized Federated Learning: A Survey on Security and Privacy (2401.17319v1)
Abstract: Federated learning has been rapidly evolving and gaining popularity in recent years due to its privacy-preserving features, among other advantages. Nevertheless, the exchange of model updates and gradients in this architecture provides new attack surfaces for malicious users of the network which may jeopardize the model performance and user and data privacy. For this reason, one of the main motivations for decentralized federated learning is to eliminate server-related threats by removing the server from the network and compensating for it through technologies such as blockchain. However, this advantage comes at the cost of challenging the system with new privacy threats. Thus, performing a thorough security analysis in this new paradigm is necessary. This survey studies possible variations of threats and adversaries in decentralized federated learning and overviews the potential defense mechanisms. Trustability and verifiability of decentralized federated learning are also considered in this study.
- J. Konečný, H. B. McMahan, D. Ramage, and P. Richtárik, “Federated optimization: Distributed machine learning for on-device intelligence,” 2016, arXiv:1610.02527.
- B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y. Arcas, “Communication-Efficient Learning of Deep Networks from Decentralized Data,” in Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, vol. 54, 2017, pp. 1273–1282.
- C. Ma, J. Li, M. Ding, H. H. Yang, F. Shu, T. Q. S. Quek, and H. V. Poor, “On safeguarding privacy and security in the framework of federated learning,” IEEE Network, vol. 34, no. 4, pp. 242–248, 2020.
- Y. Qu, L. Gao, T. H. Luan, Y. Xiang, S. Yu, B. Li, and G. Zheng, “Decentralized privacy using blockchain-enabled federated learning in fog computing,” IEEE Internet of Things Journal, vol. 7, no. 6, pp. 5171–5183, 2020.
- M. Shayan, C. Fung, C. J. M. Yoon, and I. Beschastnikh, “Biscotti: A blockchain system for private and secure federated learning,” IEEE Transactions on Parallel and Distributed Systems, vol. 32, no. 7, pp. 1513–1525, 2021.
- T. Li, A. K. Sahu, A. Talwalkar, and V. Smith, “Federated learning: Challenges, methods, and future directions,” IEEE Signal Processing Magazine, vol. 37, no. 3, pp. 50–60, 2020.
- P. Kairouz et al., “Advances and open problems in federated learning,” 2019, arXiv:1912.04977.
- D. C. Nguyen, M. Ding, Q.-V. Pham, P. N. Pathirana, L. B. Le, A. Seneviratne, J. Li, D. Niyato, and H. V. Poor, “Federated learning meets blockchain in edge computing: Opportunities and challenges,” IEEE Internet of Things Journal, vol. 8, no. 16, pp. 12 806–12 825, 2021.
- D. Li, D. Han, T.-H. Weng, Z. Zheng, H. Li, H. Liu, A. Castiglione, and K.-C. Li, “Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey,” Soft Computing, 2021.
- D. Hou, J. Zhang, K. L. Man, J. Ma, and Z. Peng, “A systematic literature review of blockchain-based federated learning: Architectures, applications and issues,” in 2nd Information Communication Technologies Conference, 2021, pp. 302–307.
- C. Li, Y. Yuan, and F.-Y. Wang, “Blockchain-enabled federated learning: A survey,” in IEEE 1st International Conference on Digital Twins and Parallel Intelligence, 2021, pp. 286–289.
- Z. Wang and Q. Hu, “Blockchain-based federated learning: A comprehensive survey,” 2021, arXiv:2110.02182.
- M. Ali, H. Karimipour, and M. Tariq, “Integration of blockchain and federated learning for internet of things: Recent advances and future challenges,” Computers & Security, vol. 108, p. 102355, 2021.
- L. Lyu, H. Yu, and Q. Yang, “Threats to federated learning: A survey,” 2020, arXiv:2003.02133.
- M. S. Jere, T. Farnan, and F. Koushanfar, “A taxonomy of attacks on federated learning,” IEEE Security Privacy, vol. 19, no. 2, pp. 20–28, 2021.
- L. Lyu, H. Yu, X. Ma, L. Sun, J. Zhao, Q. Yang, and P. S. Yu, “Privacy and robustness in federated learning: Attacks and defenses,” 2020, arXiv:2012.06337.
- N. Bouacida and P. Mohapatra, “Vulnerabilities in federated learning,” IEEE Access, vol. 9, pp. 63 229–63 249, 2021.
- V. Mothukuri, R. M. Parizi, S. Pouriyeh, Y. Huang, A. Dehghantanha, and G. Srivastava, “A survey on security and privacy of federated learning,” Future Generation Computer Systems, vol. 115, pp. 619–640, 2021.
- P. Liu, X. Xu, and W. Wang, “Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives,” Cybersecurity, vol. 5, no. 1, p. 4, 2022.
- A. Qammar, A. Karim, H. Ning, and J. Ding, “Securing federated learning with blockchain: a systematic literature review,” Artificial Intelligence Review, 2022.
- M. Kolp, P. Giorgini, and J. Mylopoulos, “A goal-based organizational perspective on multi-agent architectures,” in Intelligent Agents VIII. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002, pp. 128–140.
- S. C. Hayden, C. Carrick, and Q. Yang, “Architectural design patterns for multiagent coordination,” in Proceedings of the International Conference on Agent Systems, vol. 99, 1999.
- Q. Yang, Y. Liu, T. Chen, and Y. Tong, “Federated machine learning: Concept and applications,” ACM Transactions on Intelligent Systems and Technology, vol. 10, no. 2, 2019.
- M. Kantarcioglu and C. Clifton, “Privacy-preserving distributed mining of association rules on horizontally partitioned data,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp. 1026–1037, 2004.
- S. Hardy, W. Henecka, H. Ivey-Law, R. Nock, G. Patrini, G. Smith, and B. Thorne, “Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption,” 2017, arXiv:1711.10677.
- Y. Liu, Y. Kang, C. Xing, T. Chen, and Q. Yang, “A secure federated transfer learning framework,” IEEE Intelligent Systems, vol. 35, no. 4, pp. 70–82, 2020.
- Y. Wu, S. Cai, X. Xiao, G. Chen, and B. C. Ooi, “Privacy preserving vertical federated learning for tree-based models,” Proc. VLDB Endow., vol. 13, no. 12, p. 2090–2103, 2020.
- K. Cheng, T. Fan, Y. Jin, Y. Liu, T. Chen, D. Papadopoulos, and Q. Yang, “Secureboost: A lossless federated learning framework,” IEEE Intelligent Systems, vol. 36, no. 6, pp. 87–98, 2021.
- Q. Li, Z. Wen, and B. He, “Practical federated gradient boosting decision trees,” Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34, no. 04, pp. 4642–4649, 2020.
- S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Decentralized business review, p. 21260, 2008.
- D. C. Nguyen, P. N. Pathirana, M. Ding, and A. Seneviratne, “Blockchain for 5g and beyond networks: A state of the art survey,” Journal of Network and Computer Applications, vol. 166, p. 102693, 2020.
- W. Wang, D. T. Hoang, P. Hu, Z. Xiong, D. Niyato, P. Wang, Y. Wen, and D. I. Kim, “A survey on consensus mechanisms and mining strategy management in blockchain networks,” IEEE Access, vol. 7, pp. 22 328–22 370, 2019.
- X. Wang, X. Zha, W. Ni, R. P. Liu, Y. J. Guo, X. Niu, and K. Zheng, “Survey on blockchain for internet of things,” Computer Communications, vol. 136, pp. 10–29, 2019.
- “Ethereum.” [Online]. Available: http://ethereum.org
- “Hyperledger.” [Online]. Available: https://www.hyperledger.org/
- V. Buterin, “Ethereum: A next generation smart contract & decentralized application platform,” 2014. [Online]. Available: https://ethereum.org/669c9e2e2027310b6b3cdce6e1c52962/Ethereum_Whitepaper_-_Buterin_2014.pdf
- E. Androulaki, A. Barger, V. Bortnikov, C. Cachin, K. Christidis, A. De Caro, D. Enyeart, C. Ferris, G. Laventman, Y. Manevich, S. Muralidharan, C. Murthy, B. Nguyen, M. Sethi, G. Singh, K. Smith, A. Sorniotti, C. Stathakopoulou, M. Vukolić, S. W. Cocco, and J. Yellick, “Hyperledger fabric: A distributed operating system for permissioned blockchains,” in Proceedings of the Thirteenth EuroSys Conference, 2018.
- J. Kang, R. Yu, X. Huang, S. Maharjan, Y. Zhang, and E. Hossain, “Enabling localized peer-to-peer electricity trading among plug-in hybrid electric vehicles using consortium blockchains,” IEEE Transactions on Industrial Informatics, vol. 13, no. 6, pp. 3154–3164, 2017.
- Z. Li, J. Kang, R. Yu, D. Ye, Q. Deng, and Y. Zhang, “Consortium blockchain for secure energy trading in industrial internet of things,” IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3690–3700, 2018.
- H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, and J. Kishigami, “Blockchain contract: Securing a blockchain applied to smart contracts,” in IEEE International Conference on Consumer Electronics, 2016, pp. 467–468.
- Z. Cui, F. XUE, S. Zhang, X. Cai, Y. Cao, W. Zhang, and J. Chen, “A hybrid blockchain-based identity authentication scheme for multi-wsn,” IEEE Transactions on Services Computing, vol. 13, no. 2, pp. 241–251, 2020.
- P. Vanhaesebrouck, A. Bellet, and M. Tommasi, “Decentralized Collaborative Learning of Personalized Models over Networks,” in Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, vol. 54. PMLR, 2017, pp. 509–517.
- W. Liu, L. Chen, and W. Zhang, “Decentralized federated learning: Balancing communication and computing costs,” 2021, arXiv:2107.12048.
- X. Lian, C. Zhang, H. Zhang, C.-J. Hsieh, W. Zhang, and J. Liu, “Can decentralized algorithms outperform centralized algorithms? a case study for decentralized parallel stochastic gradient descent,” in Advances in Neural Information Processing Systems, vol. 30, 2017.
- Q. Yang, “Toward responsible ai: An overview of federated learning for user-centered privacy-preserving computing,” ACM Trans. Interact. Intell. Syst., vol. 11, no. 3–4, 2021.
- C. Hu, J. Jiang, and Z. Wang, “Decentralized federated learning: A segmented gossip approach,” 2019, arXiv:1908.07782.
- Z. Jiang, A. Balu, C. Hegde, and S. Sarkar, “Collaborative deep learning in fixed topology networks,” in Advances in Neural Information Processing Systems, vol. 30, 2017.
- P. Ramanan and K. Nakayama, “Baffle : Blockchain based aggregator free federated learning,” in IEEE International Conference on Blockchain, 2020, pp. 72–81.
- A. Lalitha, S. Shekhar, T. Javidi, and F. Koushanfar, “Fully decentralized federated learning,” in Third workshop on Bayesian Deep Learning (NeurIPS), 2018.
- A. Lalitha, O. C. Kilinc, T. Javidi, and F. Koushanfar, “Peer-to-peer federated learning on graphs,” 2019, arXiv:1901.11173.
- J. Li, Y. Shao, K. Wei, M. Ding, C. Ma, L. Shi, Z. Han, and H. Poor, “Blockchain assisted decentralized federated learning (blade-fl): Performance analysis and resource allocation,” IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 10, pp. 2401–2415, 2022.
- Y. Li, C. Chen, N. Liu, H. Huang, Z. Zheng, and Q. Yan, “A blockchain-based decentralized federated learning framework with committee consensus,” IEEE Network, vol. 35, no. 1, pp. 234–241, 2021.
- P. Bhattacharya, S. Tanwar, U. Bodkhe, S. Tyagi, and N. Kumar, “Bindaas: Blockchain-based deep-learning as-a-service in healthcare 4.0 applications,” IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 1242–1255, 2021.
- X. Chen, J. Ji, C. Luo, W. Liao, and P. Li, “When machine learning meets blockchain: A decentralized, privacy-preserving and secure design,” in IEEE International Conference on Big Data, 2018, pp. 1178–1187.
- S. Zhou, H. Huang, W. Chen, P. Zhou, Z. Zheng, and S. Guo, “Pirate: A blockchain-based secure framework of distributed machine learning in 5g networks,” IEEE Network, vol. 34, no. 6, pp. 84–91, 2020.
- A. Mondal, H. Virk, and D. Gupta, “BEAS: blockchain enabled asynchronous & secure federated machine learning,” 2022, arXiv:2202.02817.
- A. G. Roy, S. Siddiqui, S. Pölsterl, N. Navab, and C. Wachinger, “Braintorrent: A peer-to-peer environment for decentralized federated learning,” 2019, arXiv:1905.06731.
- J. Kang, Z. Xiong, D. Niyato, Y. Zou, Y. Zhang, and M. Guizani, “Reliable federated learning for mobile networks,” IEEE Wireless Communications, vol. 27, no. 2, pp. 72–80, 2020.
- H. B. Desai, M. S. Ozdayi, and M. Kantarcioglu, “Blockfla: Accountable federated learning via hybrid blockchain architecture,” in Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, 2021, p. 101–112.
- L. A. C. de Souza, G. Antonio F. Rebello, G. F. Camilo, L. C. B. Guimarães, and O. C. M. B. Duarte, “Dfedforest: Decentralized federated forest,” in IEEE International Conference on Blockchain, 2020, pp. 90–97.
- Y. He, K. Huang, G. Zhang, F. R. Yu, J. Chen, and J. Li, “Bift: A blockchain-based federated learning system for connected and autonomous vehicles,” IEEE Internet of Things Journal, vol. 9, no. 14, pp. 12 311–12 322, 2022.
- J. Chen, R. Monga, S. Bengio, and R. Jozefowicz, “Revisiting distributed synchronous sgd,” in International Conference on Learning Representations Workshop Track, 2016, arXiv:1604.00981.
- C. Fang, Y. Guo, J. Ma, H. Xie, and Y. Wang, “A privacy-preserving and verifiable federated learning method based on blockchain,” Computer Communications, vol. 186, pp. 1–11, 2022.
- Warnat-Herresthal et al., “Swarm Learning for decentralized and confidential clinical machine learning,” Nature, vol. 594, no. 7862, pp. 265–270, 2021.
- L. Chen, S. Fu, L. Lin, Y. Luo, and W. Zhao, “Privacy-preserving swarm learning based on homomorphic encryption,” in Algorithms and Architectures for Parallel Processing. Cham: Springer International Publishing, 2022, pp. 509–523.
- J. Han, Y. Ma, and Y. Han, “Demystifying swarm learning: A new paradigm of blockchain-based decentralized federated learning,” 2022, arXiv:2201.05286.
- E. Hallaji, R. Razavi-Far, M. Saif, and E. Herrera-Viedma, “Label noise analysis meets adversarial training: A defense against label poisoning in federated learning,” Knowledge-Based Systems, vol. 266, p. 110384, 2023.
- E. Rosenfeld, E. Winston, P. Ravikumar, and Z. Kolter, “Certified robustness to label-flipping attacks via randomized smoothing,” in Proceedings of the 37th International Conference on Machine Learning, vol. 119, 2020, pp. 8230–8241.
- E. Bagdasaryan, A. Veit, Y. Hua, D. Estrin, and V. Shmatikov, “How to backdoor federated learning,” in Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics, vol. 108, 2020, pp. 2938–2948.
- A. N. Bhagoji, S. Chakraborty, P. Mittal, and S. Calo, “Analyzing federated learning through an adversarial lens,” in Proceedings of the 36th International Conference on Machine Learning, vol. 97, 2019, pp. 634–643.
- X. Li, P. Jiang, T. Chen, X. Luo, and Q. Wen, “A survey on the security of blockchain systems,” Future Generation Computer Systems, vol. 107, pp. 841–853, 2020.
- M. A. Khan and K. Salah, “Iot security: Review, blockchain solutions, and open challenges,” Future Generation Computer Systems, vol. 82, pp. 395–411, 2018.
- L. Zhu, Z. Liu, and S. Han, “Deep leakage from gradients,” in Advances in Neural Information Processing Systems, vol. 32, 2019.
- L. Melis, C. Song, E. De Cristofaro, and V. Shmatikov, “Exploiting unintended feature leakage in collaborative learning,” in IEEE Symposium on Security and Privacy, 2019, pp. 691–706.
- B. Hitaj, G. Ateniese, and F. Perez-Cruz, “Deep models under the gan: Information leakage from collaborative deep learning,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 603–618.
- H. Wang, K. Sreenivasan, S. Rajput, H. Vishwakarma, S. Agarwal, J.-y. Sohn, K. Lee, and D. Papailiopoulos, “Attack of the tails: Yes, you really can backdoor federated learning,” in Advances in Neural Information Processing Systems, vol. 33, 2020, pp. 16 070–16 084.
- C. Xie, K. Huang, P.-Y. Chen, and B. Li, “Dba: Distributed backdoor attacks against federated learning,” in International Conference on Learning Representations, 2020.
- Z. A. E. Houda, A. S. Hafid, and L. Khoukhi, “Mitfed: A privacy preserving collaborative network attack mitigation framework based on federated learning using sdn and blockchain,” IEEE Transactions on Network Science and Engineering, vol. 10, no. 4, pp. 1985–2001, 2023.
- J. Xu, S. Huang, L. Song, and T. Lan, “Byzantine-robust federated learning through collaborative malicious gradient filtering,” in IEEE 42nd International Conference on Distributed Computing Systems, 2022, pp. 1223–1235.
- M. Fredrikson, S. Jha, and T. Ristenpart, “Model inversion attacks that exploit confidence information and basic countermeasures,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 1322–1333.
- Y. Chen, H. Chen, Y. Zhang, M. Han, M. Siddula, and Z. Cai, “A survey on blockchain systems: Attacks, defenses, and privacy preservation,” High-Confidence Computing, vol. 2, no. 2, p. 100048, 2022.
- H. Chu, P. Zhang, H. Dong, Y. Xiao, S. Ji, and W. Li, “A survey on smart contract vulnerabilities: Data sources, detection and repair,” Information and Software Technology, vol. 159, p. 107221, 2023.
- B. Wang, Y. Yao, S. Shan, H. Li, B. Viswanath, H. Zheng, and B. Y. Zhao, “Neural cleanse: Identifying and mitigating backdoor attacks in neural networks,” in IEEE Symposium on Security and Privacy, 2019, pp. 707–723.
- Y. Li, X. Lyu, N. Koren, L. Lyu, B. Li, and X. Ma, “Neural attention distillation: Erasing backdoor triggers from deep neural networks,” in International Conference on Learning Representations, 2021. [Online]. Available: https://openreview.net/forum?id=9l0K4OM-oXE
- R. Doriguzzi-Corin and D. Siracusa, “Flad: Adaptive federated learning for ddos attack detection,” Computers & Security, vol. 137, p. 103597, 2024.
- P. Blanchard, E. M. El Mhamdi, R. Guerraoui, and J. Stainer, “Machine learning with adversaries: Byzantine tolerant gradient descent,” in Advances in Neural Information Processing Systems, vol. 30, 2017.
- S. Shen, S. Tople, and P. Saxena, “Auror: Defending against poisoning attacks in collaborative deep learning systems,” in Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016, pp. 508–519.
- V. Rastogi and S. Nath, “Differentially private aggregation of distributed time-series with transformation and encryption,” in Proceedings of the CM SIGMOD International Conference on Management of Data, 2010, pp. 735–746.
- G. Ács and C. Castelluccia, “I have a dream! (differentially private smart metering),” in Information Hiding. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 118–132.
- B. Balle, G. Barthe, and M. Gaboardi, “Privacy amplification by subsampling: Tight analyses via couplings and divergences,” in Advances in Neural Information Processing Systems, vol. 31, 2018.
- V. Feldman, I. Mironov, K. Talwar, and A. Thakurta, “Privacy amplification by iteration,” in IEEE 59th Annual Symposium on Foundations of Computer Science, Los Alamitos, CA, USA, 2018, pp. 521–532.
- H. Kasyap and S. Tripathy, “Privacy-preserving decentralized learning framework for healthcare system,” ACM Trans. Multimedia Comput. Commun. Appl., vol. 17, no. 2s, 2021.
- X. Bao, C. Su, Y. Xiong, W. Huang, and Y. Hu, “Flchain: A blockchain for auditable federated learning with trust and incentive,” in 5th International Conference on Big Data Computing and Communications, 2019, pp. 151–159.
- Z. Peng, J. Xu, X. Chu, S. Gao, Y. Yao, R. Gu, and Y. Tang, “Vfchain: Enabling verifiable and auditable federated learning via blockchain systems,” IEEE Transactions on Network Science and Engineering, vol. 9, no. 1, pp. 173–186, 2022.
- M. Ogburn, C. Turner, and P. Dahal, “Homomorphic encryption,” Procedia Computer Science, vol. 20, pp. 502–509, 2013, complex Adaptive Systems.
- C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, 2009, pp. 169–178.
- I. Damgård, V. Pastro, N. Smart, and S. Zakarias, “Multiparty computation from somewhat homomorphic encryption,” in Advances in Cryptology. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 643–662.
- R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978.
- P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999, pp. 223–238.
- Y. Aono, T. Hayashi, L. Trieu Phong, and L. Wang, “Scalable and secure logistic regression via homomorphic encryption,” in Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, 2016, pp. 142–144.
- M. Kim, Y. Song, S. Wang, Y. Xia, and X. Jiang, “Secure logistic regression based on homomorphic encryption: Design and evaluation,” JMIR Med Inform, vol. 6, no. 2, p. e19, 2018.
- L. T. Phong, Y. Aono, T. Hayashi, L. Wang, and S. Moriai, “Privacy-preserving deep learning via additively homomorphic encryption,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1333–1345, 2018.
- A. C. Yao, “Protocols for secure computations,” in 23rd Annual Symposium on Foundations of Computer Science, 1982, pp. 160–164.
- P. Mohassel and Y. Zhang, “Secureml: A system for scalable privacy-preserving machine learning,” in IEEE Symposium on Security and Privacy, 2017, pp. 19–38.
- P. Mohassel and P. Rindal, “ABY 3 : A mixed protocol framework for machine learning,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2018, pp. 35–52.
- V. Chen, V. Pastro, and M. Raykova, “Secure computation for machine learning with SPDZ,” 2019, arXiv:1901.00329.
- Y. Ma, X. Zhu, and J. Hsu, “Data poisoning against differentially-private learners: Attacks and defenses,” in Proceedings of the 28th International Joint Conference on Artificial Intelligence, Macao, China, 2019, pp. 4732–4738.
- M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, “Deep learning with differential privacy,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 308–318.
- R. C. Geyer, T. Klein, and M. Nabi, “Differentially private federated learning: A client level perspective,” 2017, arXiv:1712.07557.
- A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, p. 612–613, 1979.
- C. Dwork, “Differential privacy: A survey of results,” in Theory and Applications of Models of Computation. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 1–19.
- R. Xu, N. Baracaldo, Y. Zhou, A. Anwar, and H. Ludwig, “Hybridalpha: An efficient approach for privacy-preserving federated learning,” in Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019, p. 13–23.
- S. Truex, N. Baracaldo, A. Anwar, T. Steinke, H. Ludwig, R. Zhang, and Y. Zhou, “A hybrid approach to privacy-preserving federated learning,” in Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019, p. 1–11.
- J. Dong, A. Roth, and W. J. Su, “Gaussian Differential Privacy,” Journal of the Royal Statistical Society Series B: Statistical Methodology, vol. 84, no. 1, pp. 3–37, 2022.
- Q. Zheng, S. Chen, Q. Long, and W. Su, “Federated f-differential privacy,” in Proceedings of The 24th International Conference on Artificial Intelligence and Statistics, vol. 130, 2021, pp. 2251–2259.
- Z. Bu, J. Dong, Q. Long, and W. Su, “Deep Learning With Gaussian Differential Privacy,” Harvard Data Science Review, vol. 2, no. 3, 2020. [Online]. Available: https://hdsr.mitpress.mit.edu/pub/u24wj42y
- D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,” in 3rd International Conference on Learning Representations, 2015, arXiv:1412.6980.
- H. B. McMahan, D. Ramage, K. Talwar, and L. Zhang, “Learning differentially private recurrent language models,” in International Conference on Learning Representations, 2018. [Online]. Available: https://openreview.net/forum?id=BJ0hF1Z0b
- J. C. Duchi, M. I. Jordan, and M. J. Wainwright, “Local privacy and statistical minimax rates,” in 1st Annual Allerton Conference on Communication, Control, and Computing, 2013, pp. 1592–1592.
- F. Benhamouda, M. Joye, and B. Libert, “A new framework for privacy-preserving aggregation of time-series data,” ACM Trans. Inf. Syst. Secur., vol. 18, no. 3, 2016.
- C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, “Our data, ourselves: Privacy via distributed noise generation,” in Advances in Cryptology, vol. 4004, 2006, pp. 486–503.
- L. Sun and L. Lyu, “Federated model distillation with noise-free differential privacy,” 2020, arXiv:2009.05537.
- N. Papernot, M. Abadi, Ú. Erlingsson, I. Goodfellow, and K. Talwar, “Semi-supervised knowledge transfer for deep learning from private training data,” 2017, arXiv:1610.05755.
- N. Agarwal, A. T. Suresh, F. Yu, S. Kumar, and H. B. McMahan, “CpSGD: Communication-efficient and differentially-private distributed SGD,” in Proceedings of the 32nd International Conference on Neural Information Processing Systems, 2018, pp. 7575–7586.
- E. Hallaji, R. Razavi-Far, M. Wang, M. Saif, and B. Fardanesh, “A stream learning approach for real-time identification of false data injection attacks in cyber-physical power systems,” IEEE Transactions on Information Forensics and Security, vol. 17, pp. 3934–3945, 2022.
- S. Morishima, “Scalable anomaly detection in blockchain using graphics processing unit,” Computers & Electrical Engineering, vol. 92, p. 107087, 2021.
- M. Signorini, M. Pontecorvi, W. Kanoun, and R. Di Pietro, “Bad: A blockchain anomaly detection solution,” IEEE Access, vol. 8, pp. 173 481–173 490, 2020.
- B. Nelson, M. Barreno, F. J. Chi, A. D. Joseph, B. I. P. Rubinstein, U. Saini, C. Sutton, J. D. Tygar, and K. Xia, “Exploiting machine learning to subvert your spam filter,” in Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008.
- M. Jagielski, A. Oprea, B. Biggio, C. Liu, C. Nita-Rotaru, and B. Li, “Manipulating machine learning: Poisoning attacks and countermeasures for regression learning,” in IEEE Symposium on Security and Privacy, 2018, pp. 19–35.
- S. Li, Y. Cheng, W. Wang, Y. Liu, and T. Chen, “Learning to detect malicious clients for robust federated learning,” 2020, arXiv:2002.00211.
- T. Idé, “Collaborative anomaly detection on blockchain from noisy sensor data,” in IEEE International Conference on Data Mining Workshops, 2018, pp. 120–127.
- E. Hallaji, M. Farajzadeh-Zanjani, R. Razavi-Far, V. Palade, and M. Saif, “Constrained generative adversarial learning for dimensionality reduction,” IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 3, pp. 2394–2405, 2023.
- F. Ang, L. Chen, N. Zhao, Y. Chen, W. Wang, and F. R. Yu, “Robust federated learning with noisy communication,” IEEE Transactions on Communications, vol. 68, no. 6, pp. 3452–3464, 2020.
- K. Pillutla, S. M. Kakade, and Z. Harchaoui, “Robust aggregation for federated learning,” 2019, arXiv:1912.13445.
- M. Grama, M. Musat, L. Muñoz-González, J. Passerat-Palmbach, D. Rueckert, and A. Alansary, “Robust aggregation for adaptive privacy preserving federated learning in healthcare,” 2020, arXiv:2009.08294.
- S. Caldas, J. Konečný, H. B. McMahan, and A. Talwalkar, “Expanding the reach of federated learning by reducing client resource requirements,” 2018, arXiv:1812.07210.
- Y. Jiang, S. Wang, B. Ko, W. Lee, and L. Tassiulas, “Model pruning enables efficient federated learning on edge devices,” 2019, arXiv:1909.12326.
- Y. Chen, F. Luo, T. Li, T. Xiang, Z. Liu, and J. Li, “A training-integrity privacy-preserving federated learning scheme with trusted execution environment,” Information Sciences, vol. 522, pp. 69–79, 2020.
- F. Mo, H. Haddadi, K. Katevas, E. Marin, D. Perino, and N. Kourtellis, “PPFL: Privacy-preserving federated learning with trusted execution environments,” in Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, 2021, pp. 94–108.
- M. Brandenburger, C. Cachin, R. Kapitza, and A. Sorniotti, “Blockchain and trusted computing: Problems, pitfalls, and a solution for hyperledger fabric,” 2018.
- S. Goldwasser, S. Micali, and C. Rackoff, “The knowledge complexity of interactive proof systems,” SIAM Journal on Computing, vol. 18, no. 1, pp. 186–208, 1989.
- B. Parno, J. Howell, C. Gentry, and M. Raykova, “Pinocchio: Nearly practical verifiable computation,” in EEE Symposium on Security and Privacy, 2013, pp. 238–252.
- C. Weng, K. Yang, X. Xie, J. Katz, and X. Wang, “Mystique: Efficient conversions for zero-knowledge proofs with applications to machine learning,” in USENIX Security, 2021, pp. 501–518.
- D. Li and J. Wang, “Fedmd: Heterogenous federated learning via model distillation,” 2019, arXiv:1910.03581.
- R. Shokri, M. Stronati, C. Song, and V. Shmatikov, “Membership inference attacks against machine learning models,” in IEEE Symposium on Security and Privacy, 2017, pp. 3–18.
- A. Salem, Y. Zhang, M. Humbert, M. Fritz, and M. Backes, “ML-Leaks: Model and data independent membership inference attacks and defenses on machine learning models,” 2018, arXiv:1806.01246.
- A. Raghunathan, J. Steinhardt, and P. Liang, “Certified defenses against adversarial examples,” in International Conference on Learning Representations, 2018. [Online]. Available: https://openreview.net/forum?id=Bys4ob-Rb
- Y. Zhang and H. Yu, “Towards verifiable federated learning,” in Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, IJCAI-22, 2022, pp. 5686–5693, survey Track.
- H. Kim, J. Park, M. Bennis, and S.-L. Kim, “Blockchained on-device federated learning,” IEEE Communications Letters, vol. 24, no. 6, pp. 1279–1283, 2020.
- Y. Zhao, J. Zhao, L. Jiang, R. Tan, and D. Niyato, “Mobile edge computing, blockchain and reputation-based crowdsourcing iot federated learning: A secure, decentralized and privacy-preserving system,” 2019, arXiv:1906.10893.
- S. Baghersalimi, T. Teijeiro, A. Aminifar, and D. Atienza, “Decentralized federated learning for epileptic seizures detection in low-power wearable systems,” IEEE Transactions on Mobile Computing, pp. 1–16, 2023.
- M. Aloqaily, I. A. Ridhawi, and M. Guizani, “Energy-aware blockchain and federated learning-supported vehicular networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 11, pp. 22 641–22 652, 2022.
- S. H. Alsamhi, F. A. Almalki, F. Afghah, A. Hawbani, A. V. Shvetsov, B. Lee, and H. Song, “Drones’ edge intelligence over smart environments in b5g: Blockchain and federated learning synergy,” IEEE Transactions on Green Communications and Networking, vol. 6, no. 1, pp. 295–312, 2022.
- X. Qu, S. Wang, Q. Hu, and X. Cheng, “Proof of federated learning: A novel energy-recycling consensus algorithm,” IEEE Transactions on Parallel and Distributed Systems, vol. 32, no. 08, pp. 2074–2085, 2021.
- T. Li, A. K. Sahu, M. Zaheer, M. Sanjabi, A. Talwalkar, and V. Smith, “Federated optimization in heterogeneous networks,” 2020.
- D. Gao, Y. Liu, A. Huang, C. Ju, H. Yu, and Q. Yang, “Privacy-preserving heterogeneous federated transfer learning,” in IEEE International Conference on Big Data, 2019, pp. 2552–2559.
- Q. Wang, Y. Guo, X. Wang, T. Ji, L. Yu, and P. Li, “Ai at the edge: Blockchain-empowered secure multiparty learning with heterogeneous models,” IEEE Internet of Things Journal, vol. 7, no. 10, pp. 9600–9610, 2020.
- X.-Z. Wu, S. Liu, and Z.-H. Zhou, “Heterogeneous model reuse via optimizing multiparty multiclass margin,” in Proceedings of the 36th International Conference on Machine Learning, vol. 97, 2019, pp. 6840–6849.
- J. Kang, Z. Xiong, D. Niyato, S. Xie, and J. Zhang, “Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory,” IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10 700–10 714, 2019.
- Ehsan Hallaji (8 papers)
- Roozbeh Razavi-Far (19 papers)
- Mehrdad Saif (11 papers)
- Boyu Wang (72 papers)
- Qiang Yang (202 papers)