{"id":"https://openalex.org/W4415709724","doi":"https://doi.org/10.1109/icme59968.2025.11209128","title":"RIDE: Robust and Decentralized Federated Learning with Input Validation","display_name":"RIDE: Robust and Decentralized Federated Learning with Input Validation","publication_year":2025,"publication_date":"2025-06-30","ids":{"openalex":"https://openalex.org/W4415709724","doi":"https://doi.org/10.1109/icme59968.2025.11209128"},"language":null,"primary_location":{"id":"doi:10.1109/icme59968.2025.11209128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme59968.2025.11209128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Multimedia and Expo (ICME)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016307931","display_name":"Zhi Lu","orcid":"https://orcid.org/0000-0002-5411-9854"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhi Lu","raw_affiliation_strings":["Huazhong University of Science and Technology,School of Cyber Science and Engineering,Wuhan,430074"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,School of Cyber Science and Engineering,Wuhan,430074","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104987784","display_name":"Mengyuan Zou","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mengyuan Zou","raw_affiliation_strings":["Huazhong University of Science and Technology,School of Cyber Science and Engineering,Wuhan,430074"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,School of Cyber Science and Engineering,Wuhan,430074","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103109393","display_name":"Samir M. Umran","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Samir M. Umran","raw_affiliation_strings":["Huazhong University of Science and Technology,School of Cyber Science and Engineering,Wuhan,430074"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,School of Cyber Science and Engineering,Wuhan,430074","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048049205","display_name":"Yuhao Long","orcid":null},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuhao Long","raw_affiliation_strings":["Huazhong University of Science and Technology,School of Cyber Science and Engineering,Wuhan,430074"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,School of Cyber Science and Engineering,Wuhan,430074","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048196007","display_name":"Songfeng Lu","orcid":"https://orcid.org/0000-0003-4489-2488"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songfeng Lu","raw_affiliation_strings":["Huazhong University of Science and Technology,School of Cyber Science and Engineering,Wuhan,430074"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,School of Cyber Science and Engineering,Wuhan,430074","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100460435","display_name":"Junjun Wu","orcid":"https://orcid.org/0000-0002-9140-2990"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junjun Wu","raw_affiliation_strings":["Huazhong University of Science and Technology,School of Cyber Science and Engineering,Wuhan,430074"],"affiliations":[{"raw_affiliation_string":"Huazhong University of Science and Technology,School of Cyber Science and Engineering,Wuhan,430074","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048663075","display_name":"Mu Wang","orcid":"https://orcid.org/0000-0002-3823-1272"},"institutions":[{"id":"https://openalex.org/I91935597","display_name":"University of South China","ror":"https://ror.org/03mqfn238","country_code":"CN","type":"education","lineage":["https://openalex.org/I91935597"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mu Wang","raw_affiliation_strings":["University of South China,Clinical Research Institute, Affiliated South China Hospital,Hengyang,421001"],"affiliations":[{"raw_affiliation_string":"University of South China,Clinical Research Institute, Affiliated South China Hospital,Hengyang,421001","institution_ids":["https://openalex.org/I91935597"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5016307931"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17567046,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9681000113487244,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9681000113487244,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.01119999960064888,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.002199999988079071,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.8550000190734863},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6288999915122986},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6068000197410583},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5863999724388123},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5861999988555908},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.43950000405311584},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4316999912261963},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.4262999892234802},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4262000024318695}],"concepts":[{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.8550000190734863},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.849399983882904},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6288999915122986},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6068000197410583},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5863999724388123},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5861999988555908},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4927999973297119},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.43950000405311584},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4316999912261963},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.4262999892234802},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4262000024318695},{"id":"https://openalex.org/C2779582901","wikidata":"https://www.wikidata.org/wiki/Q21013010","display_name":"Distributed learning","level":2,"score":0.42089998722076416},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38339999318122864},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.38260000944137573},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.36629998683929443},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3312999904155731},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33009999990463257},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.32580000162124634},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3246999979019165},{"id":"https://openalex.org/C2775937380","wikidata":"https://www.wikidata.org/wiki/Q1232589","display_name":"Replica","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.2766000032424927},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.27149999141693115},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2651999890804291},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2556000053882599},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2533000111579895}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icme59968.2025.11209128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icme59968.2025.11209128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Multimedia and Expo (ICME)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2141420453","https://openalex.org/W2151385722","https://openalex.org/W2883748642","https://openalex.org/W3037211059","https://openalex.org/W3092701607","https://openalex.org/W3096328345","https://openalex.org/W3204983216","https://openalex.org/W4308632285","https://openalex.org/W4385412495","https://openalex.org/W4387968397","https://openalex.org/W4387969004","https://openalex.org/W4390872697","https://openalex.org/W4394938903","https://openalex.org/W4396758620","https://openalex.org/W4399729203","https://openalex.org/W4403059436","https://openalex.org/W4403499895","https://openalex.org/W4405181861"],"related_works":[],"abstract_inverted_index":{"Federated":[0],"learning,":[1],"as":[2],"an":[3],"emerging":[4],"distributed":[5],"machine":[6],"learning":[7,19,58],"approach,":[8],"enables":[9],"collaborative":[10],"model":[11,73,98],"training":[12],"while":[13],"protecting":[14],"data":[15],"privacy.":[16],"However,":[17],"federated":[18,57],"is":[20,135,160,163],"vulnerable":[21],"to":[22,34,70],"Byzantine":[23],"attacks":[24],"and":[25,66,83,148],"inference":[26],"attacks.":[27],"Existing":[28],"solutions":[29],"typically":[30],"require":[31],"semi-honest":[32],"servers":[33],"perform":[35],"secure":[36,52,143],"aggregation":[37,53,144],"or":[38,109],"lack":[39],"effective":[40],"input":[41,60,81],"validation":[42],"mechanisms.":[43],"To":[44],"address":[45],"these":[46],"issues,":[47],"we":[48],"propose":[49],"RIDE,":[50],"a":[51,88,128],"protocol":[54,145,170],"for":[55],"decentralized":[56],"with":[59,76],"validation.":[61],"RIDE":[62,86,126],"utilizes":[63],"pedersen":[64],"commitments":[65],"efficient":[67],"zero-knowledge":[68],"proofs":[69],"verify":[71],"whether":[72],"updates":[74,99],"comply":[75],"predefined":[77],"constraints,":[78],"ensuring":[79,94],"client":[80,110],"privacy":[82],"integrity.":[84],"Additionally,":[85],"employs":[87],"publicly":[89],"verifiable":[90],"secret":[91],"sharing":[92],"scheme,":[93],"that":[95,138],"only":[96,136],"validated":[97],"are":[100],"aggregated,":[101],"even":[102],"in":[103],"the":[104,119,140,149,156,167],"presence":[105],"of":[106,121,132,139,152],"malicious":[107],"clients":[108],"dropouts.":[111],"Experimental":[112],"results":[113],"on":[114,155],"four":[115],"real":[116],"datasets":[117],"demonstrate":[118],"effectiveness":[120],"our":[122],"solution.":[123],"For":[124],"example,":[125],"has":[127],"maximum":[129],"bandwidth":[130],"overhead":[131],"7.11MB,":[133],"which":[134,162],"1.31\u00d7":[137],"most":[141],"popular":[142],"(CCS":[146],"2020),":[147],"computational":[150],"cost":[151],"RIDE\u2019s":[153],"execution":[154],"CIFAR-10":[157],"L":[158],"dataset":[159],"109.88s,":[161],"7.28\u00d7":[164],"faster":[165],"than":[166],"current":[168],"state-of-the-art":[169],"RoFL":[171],"(S&P":[172],"2023).":[173]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-30T00:00:00"}
