{"id":"https://openalex.org/W4312643771","doi":"https://doi.org/10.1109/tdsc.2022.3215574","title":"A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learning","display_name":"A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learning","publication_year":2022,"publication_date":"2022-11-03","ids":{"openalex":"https://openalex.org/W4312643771","doi":"https://doi.org/10.1109/tdsc.2022.3215574"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2022.3215574","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3215574","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056148718","display_name":"Zan Zhou","orcid":"https://orcid.org/0000-0003-2388-2280"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zan Zhou","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069646989","display_name":"Changqiao Xu","orcid":"https://orcid.org/0000-0003-1467-1086"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Changqiao Xu","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029936222","display_name":"Mingze Wang","orcid":"https://orcid.org/0009-0009-2047-5111"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingze Wang","raw_affiliation_strings":["State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"School of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053431750","display_name":"Xiaohui Kuang","orcid":"https://orcid.org/0000-0003-3816-402X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohui Kuang","raw_affiliation_strings":["State Key Laboratory of Science and Technology on Information System Security, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Science and Technology on Information System Security, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034083458","display_name":"Yirong Zhuang","orcid":"https://orcid.org/0000-0003-4956-0351"},"institutions":[{"id":"https://openalex.org/I4387153335","display_name":"China Telecom","ror":"https://ror.org/05p67dv18","country_code":null,"type":"company","lineage":["https://openalex.org/I4387153335"]},{"id":"https://openalex.org/I4210136246","display_name":"China Telecom (China)","ror":"https://ror.org/03jgnzt20","country_code":"CN","type":"company","lineage":["https://openalex.org/I4210136246"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yirong Zhuang","raw_affiliation_strings":["China Telecom Research Institute, Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Telecom Research Institute, Beijing, China","institution_ids":["https://openalex.org/I4210136246","https://openalex.org/I4387153335"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of Software, University of Technology Sydney, Sydney, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"School of Software, University of Technology Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5056148718"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":null,"apc_paid":null,"fwci":4.4111,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.95101219,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"20","issue":"5","first_page":"4230","last_page":"4244"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9711999893188477,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8094666600227356},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7279393672943115},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6869609951972961},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.6155429482460022},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5774255394935608},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5490399599075317},{"id":"https://openalex.org/keywords/dilemma","display_name":"Dilemma","score":0.5406678318977356},{"id":"https://openalex.org/keywords/malice","display_name":"Malice","score":0.5080482959747314},{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.5039440989494324},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.4998359680175781},{"id":"https://openalex.org/keywords/threat-model","display_name":"Threat model","score":0.4908238351345062},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4802727699279785},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.4729354679584503},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.4429033398628235},{"id":"https://openalex.org/keywords/arms-race","display_name":"Arms race","score":0.41716620326042175},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4102402627468109},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21168169379234314},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.11780485510826111}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8094666600227356},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7279393672943115},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6869609951972961},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.6155429482460022},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5774255394935608},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5490399599075317},{"id":"https://openalex.org/C2778496695","wikidata":"https://www.wikidata.org/wiki/Q254128","display_name":"Dilemma","level":2,"score":0.5406678318977356},{"id":"https://openalex.org/C2778068216","wikidata":"https://www.wikidata.org/wiki/Q55019500","display_name":"Malice","level":2,"score":0.5080482959747314},{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.5039440989494324},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.4998359680175781},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.4908238351345062},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4802727699279785},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.4729354679584503},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.4429033398628235},{"id":"https://openalex.org/C2989419327","wikidata":"https://www.wikidata.org/wiki/Q322348","display_name":"Arms race","level":2,"score":0.41716620326042175},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4102402627468109},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21168169379234314},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.11780485510826111},{"id":"https://openalex.org/C6303427","wikidata":"https://www.wikidata.org/wiki/Q47398","display_name":"Economic history","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2022.3215574","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3215574","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7900000214576721}],"awards":[{"id":"https://openalex.org/G4917731782","display_name":null,"funder_award_id":"62225105","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":64,"referenced_works":["https://openalex.org/W2006737181","https://openalex.org/W2167372639","https://openalex.org/W2294409705","https://openalex.org/W2473418344","https://openalex.org/W2564029303","https://openalex.org/W2761138375","https://openalex.org/W2788816110","https://openalex.org/W2807955733","https://openalex.org/W2898146121","https://openalex.org/W2940805057","https://openalex.org/W2950321888","https://openalex.org/W2955213239","https://openalex.org/W2963445059","https://openalex.org/W2963540401","https://openalex.org/W2963699739","https://openalex.org/W2965721472","https://openalex.org/W2967889168","https://openalex.org/W2970408908","https://openalex.org/W2971544778","https://openalex.org/W2981349114","https://openalex.org/W2990595670","https://openalex.org/W2993860272","https://openalex.org/W2996422317","https://openalex.org/W2998158283","https://openalex.org/W3012360060","https://openalex.org/W3016632787","https://openalex.org/W3017123256","https://openalex.org/W3034856597","https://openalex.org/W3035616549","https://openalex.org/W3043610783","https://openalex.org/W3087391814","https://openalex.org/W3093410479","https://openalex.org/W3099185500","https://openalex.org/W3107632872","https://openalex.org/W3120859663","https://openalex.org/W3128083813","https://openalex.org/W3175919946","https://openalex.org/W3183165740","https://openalex.org/W3204548896","https://openalex.org/W3205650096","https://openalex.org/W3211219647","https://openalex.org/W4200346980","https://openalex.org/W4205228770","https://openalex.org/W4226249052","https://openalex.org/W4252654521","https://openalex.org/W4285607018","https://openalex.org/W4287863289","https://openalex.org/W4289656845","https://openalex.org/W4295358171","https://openalex.org/W4298221930","https://openalex.org/W6728757088","https://openalex.org/W6743821447","https://openalex.org/W6746720608","https://openalex.org/W6748626757","https://openalex.org/W6748786018","https://openalex.org/W6752145142","https://openalex.org/W6757844995","https://openalex.org/W6765541894","https://openalex.org/W6768836789","https://openalex.org/W6771533808","https://openalex.org/W6774561342","https://openalex.org/W6788725530","https://openalex.org/W6791673544","https://openalex.org/W6803546119"],"related_works":["https://openalex.org/W2069002210","https://openalex.org/W2034199088","https://openalex.org/W2085319386","https://openalex.org/W1551379303","https://openalex.org/W2807875806","https://openalex.org/W4327500323","https://openalex.org/W2593956379","https://openalex.org/W2136110824","https://openalex.org/W2579153474","https://openalex.org/W2161613764"],"abstract_inverted_index":{"Albeit":[0],"the":[1,23,32,55,71,96,145],"popularity":[2],"of":[3,25,159],"federated":[4,27,104],"learning":[5,28,45,105],"(FL),":[6],"recently":[7],"emerging":[8],"model-inversion":[9],"and":[10,37,76,93,122,135],"poisoning":[11,133,152],"attacks":[12],"arouse":[13],"extensive":[14],"concerns":[15],"towards":[16],"privacy":[17,36,58,130,160],"or":[18],"model":[19],"integrity,":[20,38],"which":[21,110],"catalyzes":[22],"developments":[24],"secure":[26,103],"(SFL)":[29],"methods.":[30],"Nonetheless,":[31],"collisions":[33],"between":[34,73,91],"its":[35],"two":[39],"equally":[40],"crucial":[41],"elements":[42],"in":[43,54,148],"collaborative":[44],"scenarios,":[46],"are":[47],"relatively":[48],"underexplored.":[49],"Individuals\u2019":[50],"wish":[51],"to":[52,64,83,87,126],"\u201chide":[53],"crowd\u201d":[56],"for":[57,68],"frequently":[59],"clashes":[60],"with":[61,155],"aggregators\u2019":[62],"need":[63],"resist":[65],"abnormal":[66],"participants":[67],"integrity":[69],"(i.e.,":[70],"incompatibility":[72],"Byzantine":[74],"robustness":[75],"differential":[77],"privacy).":[78],"The":[79],"dilemma":[80],"prompts":[81],"researchers":[82],"reflect":[84],"on":[85,109,141],"how":[86],"build":[88],"mutual":[89],"confidence":[90],"individuals":[92],"aggregators.":[94],"Against":[95],"backdrop,":[97],"this":[98],"paper":[99],"proposes":[100],"a":[101,156],"multi-shuffler":[102],"(MSFL)":[106],"framework,":[107],"based":[108],"we":[111],"further":[112],"propound":[113],"three":[114],"modules":[115],"(hierarchical":[116],"shuffling":[117],"mechanism,":[118],"malice":[119],"evaluation":[120],"module,":[121],"composite":[123],"defense":[124],"strategy)":[125],"jointly":[127],"guarantee":[128],"strong":[129],"protection,":[131],"efficient":[132],"resistance,":[134],"agile":[136],"adversary":[137],"elimination.":[138],"Extensive":[139],"experiments":[140],"standard":[142],"datasets":[143],"exhibited":[144],"method's":[146],"effectiveness":[147],"thwarting":[149],"different":[150],"FL":[151],"attack":[153],"paradigms":[154],"minimal":[157],"cost":[158],"breaches.":[161]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":18},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":5}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
