{"id":"https://openalex.org/W4386470386","doi":"https://doi.org/10.1109/lcn58197.2023.10223365","title":"Outsourcing Privacy-Preserving Federated Learning on Malicious Networks through MPC","display_name":"Outsourcing Privacy-Preserving Federated Learning on Malicious Networks through MPC","publication_year":2023,"publication_date":"2023-09-06","ids":{"openalex":"https://openalex.org/W4386470386","doi":"https://doi.org/10.1109/lcn58197.2023.10223365"},"language":"en","primary_location":{"id":"doi:10.1109/lcn58197.2023.10223365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn58197.2023.10223365","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112685810","display_name":"Richard Hern\u00e1ndez","orcid":null},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Richard Hernandez","raw_affiliation_strings":["Florida International University,Department of Electrical and Computer Engineering,Miami,FL,US,33174"],"affiliations":[{"raw_affiliation_string":"Florida International University,Department of Electrical and Computer Engineering,Miami,FL,US,33174","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041815960","display_name":"Oscar G. Bautista","orcid":"https://orcid.org/0000-0002-5000-1912"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Oscar G. Bautista","raw_affiliation_strings":["Florida International University,Department of Electrical and Computer Engineering,Miami,FL,US,33174"],"affiliations":[{"raw_affiliation_string":"Florida International University,Department of Electrical and Computer Engineering,Miami,FL,US,33174","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019446590","display_name":"Mohammad Hossein Manshaei","orcid":"https://orcid.org/0000-0003-3765-7500"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Hossein Manshaei","raw_affiliation_strings":["University of Arizona,Department of Electrical and Computer Engineering,Tucson,AZ,US,85721"],"affiliations":[{"raw_affiliation_string":"University of Arizona,Department of Electrical and Computer Engineering,Tucson,AZ,US,85721","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020593115","display_name":"Abdulhadi Sahin","orcid":null},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Abdulhadi Sahin","raw_affiliation_strings":["Florida International University,Department of Electrical and Computer Engineering,Miami,FL,US,33174"],"affiliations":[{"raw_affiliation_string":"Florida International University,Department of Electrical and Computer Engineering,Miami,FL,US,33174","institution_ids":["https://openalex.org/I19700959"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078029373","display_name":"Kemal Akkaya","orcid":"https://orcid.org/0000-0002-7103-4545"},"institutions":[{"id":"https://openalex.org/I19700959","display_name":"Florida International University","ror":"https://ror.org/02gz6gg07","country_code":"US","type":"education","lineage":["https://openalex.org/I19700959"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kemal Akkaya","raw_affiliation_strings":["Florida International University,Department of Electrical and Computer Engineering,Miami,FL,US,33174"],"affiliations":[{"raw_affiliation_string":"Florida International University,Department of Electrical and Computer Engineering,Miami,FL,US,33174","institution_ids":["https://openalex.org/I19700959"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5112685810"],"corresponding_institution_ids":["https://openalex.org/I19700959"],"apc_list":null,"apc_paid":null,"fwci":0.5237,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.71471787,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9735000133514404,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8193254470825195},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7720077037811279},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7504525184631348},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.7464390993118286},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7309261560440063},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6597083806991577},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6114635467529297},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5994977355003357},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5254482626914978},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4717878997325897},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.45166921615600586},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.44485774636268616},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.43179476261138916},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23124748468399048},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19909319281578064},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.17067056894302368},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.13560035824775696},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.12145668268203735}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8193254470825195},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7720077037811279},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7504525184631348},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.7464390993118286},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7309261560440063},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6597083806991577},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6114635467529297},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5994977355003357},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5254482626914978},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4717878997325897},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.45166921615600586},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.44485774636268616},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.43179476261138916},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23124748468399048},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19909319281578064},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.17067056894302368},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.13560035824775696},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12145668268203735},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn58197.2023.10223365","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn58197.2023.10223365","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 48th Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6100000143051147,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2262308442","https://openalex.org/W2767079719","https://openalex.org/W2963540401","https://openalex.org/W2970606380","https://openalex.org/W3108672920","https://openalex.org/W3110845456","https://openalex.org/W3138090943","https://openalex.org/W3196371845","https://openalex.org/W4206320562","https://openalex.org/W4293901949","https://openalex.org/W4318619660","https://openalex.org/W6728757088"],"related_works":["https://openalex.org/W1557783852","https://openalex.org/W3022237949","https://openalex.org/W3088939963","https://openalex.org/W2357761884","https://openalex.org/W1474916271","https://openalex.org/W3205687329","https://openalex.org/W2810763716","https://openalex.org/W2377996584","https://openalex.org/W2363470634","https://openalex.org/W3029810255"],"abstract_inverted_index":{"While":[0],"Federated":[1],"Learning":[2],"(FL)":[3],"enables":[4,110],"training":[5,185],"by":[6],"only":[7],"sharing":[8],"model":[9,113,128],"updates":[10],"rather":[11],"than":[12],"data,":[13],"FL":[14,107,184],"can":[15,178],"still":[16],"be":[17],"prone":[18],"to":[19,28,36,68,99,115,126],"privacy":[20,34,192],"leaks.":[21],"Therefore,":[22],"many":[23],"efforts":[24],"have":[25],"been":[26],"made":[27],"adopt":[29],"homomorphic":[30],"encryption":[31],"or":[32],"differential":[33,131],"approaches":[35],"prevent":[37],"this.":[38],"However,":[39],"these":[40,90],"solutions":[41],"come":[42],"with":[43],"several":[44],"issues":[45,62],"that":[46,54,109,145,175],"may":[47],"limit":[48],"their":[49],"widespread":[50],"adoption":[51],"in":[52,59,70,195],"applications":[53],"involve":[55],"sensitive":[56],"data":[57],"sitting":[58],"silos.":[60],"Such":[61],"include":[63],"but":[64],"are":[65,146],"not":[66],"limited":[67,84],"trust":[69],"the":[71,74,77,112,127,134,138,149,153,166,180,188],"aggregation":[72,85,114],"server,":[73],"accuracy":[75,142,181],"of":[76,141,155,182,191],"model,":[78],"potential":[79],"collusion":[80,156],"among":[81,157],"clients,":[82],"and":[83,122,151,159,164,193],"function":[86],"support.":[87],"To":[88],"address":[89],"issues,":[91],"we":[92,104],"advocate":[93],"using":[94],"secure":[95],"Multiparty":[96],"Computation":[97],"(MPC)":[98],"offer":[100],"privacy-preserving":[101],"computation.":[102],"Specifically,":[103],"propose":[105],"an":[106],"framework":[108,136,168,177],"outsourcing":[111],"MPC":[116,160],"parties":[117],"on":[118,148],"untrusted":[119],"cloud":[120],"environments":[121],"offers":[123,137],"correctness":[124],"verification":[125],"owners.":[129],"Unlike":[130],"privacy-based":[132],"solutions,":[133],"proposed":[135,167],"same":[139],"level":[140,190],"as":[143],"models":[144],"trained":[147],"clear":[150],"minimize":[152],"possibility":[154],"clients":[158],"parties.":[161],"We":[162],"implemented":[163],"evaluated":[165],"under":[169],"various":[170],"conditions.":[171],"The":[172],"results":[173],"showed":[174],"our":[176],"match":[179],"centralized":[183],"while":[186],"maintaining":[187],"required":[189],"security":[194],"malicious":[196],"cross-silo":[197],"settings.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
