{"id":"https://openalex.org/W4386233424","doi":"https://doi.org/10.1109/tai.2023.3309273","title":"Robust and Verifiable Privacy Federated Learning","display_name":"Robust and Verifiable Privacy Federated Learning","publication_year":2023,"publication_date":"2023-08-28","ids":{"openalex":"https://openalex.org/W4386233424","doi":"https://doi.org/10.1109/tai.2023.3309273"},"language":"en","primary_location":{"id":"doi:10.1109/tai.2023.3309273","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tai.2023.3309273","pdf_url":null,"source":{"id":"https://openalex.org/S4210169448","display_name":"IEEE Transactions on Artificial Intelligence","issn_l":"2691-4581","issn":["2691-4581"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016307931","display_name":"Zhi Lu","orcid":"https://orcid.org/0000-0002-5411-9854"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhi Lu","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048196007","display_name":"Songfeng Lu","orcid":"https://orcid.org/0000-0003-4489-2488"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songfeng Lu","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101790669","display_name":"Xueming Tang","orcid":"https://orcid.org/0000-0003-0806-5100"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xueming Tang","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100460435","display_name":"Junjun Wu","orcid":"https://orcid.org/0000-0002-9140-2990"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junjun Wu","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5016307931"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":1.9231,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.88765926,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"5","issue":"4","first_page":"1895","last_page":"1908"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9904000163078308,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.9560352563858032},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.653031587600708},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5339354872703552},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4648961126804352},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08153524994850159}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.9560352563858032},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.653031587600708},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5339354872703552},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4648961126804352},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08153524994850159},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tai.2023.3309273","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tai.2023.3309273","pdf_url":null,"source":{"id":"https://openalex.org/S4210169448","display_name":"IEEE Transactions on Artificial Intelligence","issn_l":"2691-4581","issn":["2691-4581"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W2042281163","https://openalex.org/W2132172731","https://openalex.org/W2156186849","https://openalex.org/W2748789698","https://openalex.org/W2767079719","https://openalex.org/W2781091734","https://openalex.org/W2791827614","https://openalex.org/W2963540401","https://openalex.org/W2994111940","https://openalex.org/W3008493372","https://openalex.org/W3015535799","https://openalex.org/W3022452713","https://openalex.org/W3046112435","https://openalex.org/W3091870957","https://openalex.org/W3095251140","https://openalex.org/W3107632872","https://openalex.org/W3110845456","https://openalex.org/W3157680283","https://openalex.org/W3176353699","https://openalex.org/W3176786489","https://openalex.org/W3198262235","https://openalex.org/W3215937653","https://openalex.org/W4206822884","https://openalex.org/W4226047321","https://openalex.org/W4226225303","https://openalex.org/W4232916392","https://openalex.org/W4288057793","https://openalex.org/W4289792488","https://openalex.org/W4295832541","https://openalex.org/W4306830536","https://openalex.org/W4311081048","https://openalex.org/W4313350237","https://openalex.org/W6728757088","https://openalex.org/W6743581629","https://openalex.org/W6743821447","https://openalex.org/W6748786018","https://openalex.org/W6770634426","https://openalex.org/W6775563089","https://openalex.org/W6787633081","https://openalex.org/W6795476670","https://openalex.org/W6801227851","https://openalex.org/W6804378100"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928"],"abstract_inverted_index":{"Federated":[0],"learning":[1,107,194],"(FL)":[2],"safeguards":[3],"user":[4,145],"privacy":[5,34,60,105],"by":[6,23,120],"uploading":[7],"gradients":[8,21,66],"instead":[9],"of":[10,48,53,88,117,126,139,156,173,179],"raw":[11,18],"data.":[12],"However,":[13,39],"inference":[14],"attacks":[15],"can":[16,110],"reconstruct":[17],"data":[19],"using":[20],"uploaded":[22],"users":[24],"in":[25,69,129],"FL.":[26,38],"To":[27,92],"mitigate":[28],"this":[29,96,148],"issue,":[30],"researchers":[31],"have":[32],"combined":[33],"computing":[35],"techniques":[36,41],"with":[37],"these":[40,82,94],"may":[42],"not":[43],"ensure":[44,85],"the":[45,51,54,70,76,79,86,89,114,118,122,127,130,137,169,176],"Byzantine":[46,170],"robustness":[47,171],"aggregation":[49,77,90,141,174,180],"or":[50],"integrity":[52,87,138,177],"aggregated":[55],"outcomes.":[56],"Most":[57],"current":[58],"robust":[59,102,189],"FL":[61],"methods":[62,83],"assess":[63],"differences":[64],"between":[65],"and":[67,103,124,153,175,186,190],"benchmarks":[68],"direction,":[71],"allowing":[72],"adversaries":[73],"to":[74,160,184],"poison":[75],"against":[78],"magnitude.":[80],"Furthermore,":[81],"cannot":[84],"results.":[91],"overcome":[93],"challenges,":[95],"study":[97],"proposes":[98],"a":[99],"novel":[100],"algorithm,":[101],"verifiable":[104],"federated":[106],"(RVPFL),":[108],"which":[109,182],"more":[111,188],"effectively":[112],"eliminate":[113],"poisoning":[115],"attack":[116],"opponent":[119],"measuring":[121],"direction":[123],"magnitude":[125],"gradient":[128],"ciphertext":[131],"state.":[132],"The":[133,164],"proposed":[134,165],"algorithm":[135,167],"guarantees":[136],"server":[140],"results":[142],"while":[143],"safeguarding":[144],"privacy.":[146],"In":[147],"study,":[149],"comprehensive":[150],"theoretical":[151],"analysis":[152],"experimental":[154],"validation":[155],"RVPFL":[157,166],"are":[158],"conducted":[159],"demonstrate":[161],"its":[162],"superiority.":[163],"solves":[168],"problem":[172,178],"results,":[181],"helps":[183],"research":[185],"develop":[187],"effective":[191],"privacy-preserving":[192],"federal":[193],"techniques.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
