{"id":"https://openalex.org/W4398151257","doi":"https://doi.org/10.1109/tifs.2024.3402993","title":"Split Aggregation: Lightweight Privacy-Preserving Federated Learning Resistant to Byzantine Attacks","display_name":"Split Aggregation: Lightweight Privacy-Preserving Federated Learning Resistant to Byzantine Attacks","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4398151257","doi":"https://doi.org/10.1109/tifs.2024.3402993"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3402993","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3402993","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016307931","display_name":"Zhi Lu","orcid":"https://orcid.org/0000-0002-5411-9854"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhi Lu","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048196007","display_name":"Songfeng Lu","orcid":"https://orcid.org/0000-0003-4489-2488"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"SongFeng Lu","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China","Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067198674","display_name":"Yongquan Cui","orcid":"https://orcid.org/0000-0003-4641-8034"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"YongQuan Cui","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Huazhong University of Science and Technology, Wuhan, China","Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101790669","display_name":"Xueming Tang","orcid":"https://orcid.org/0000-0003-0806-5100"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"XueMing Tang","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100460435","display_name":"Junjun Wu","orcid":"https://orcid.org/0000-0002-9140-2990"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"JunJun Wu","raw_affiliation_strings":["Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Hubei Key Laboratory of Distributed System Security, Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]},{"raw_affiliation_string":"Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Hubei Key Laboratory of Distributed System Security, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5016307931"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":6.0876,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.96757622,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"19","issue":null,"first_page":"5575","last_page":"5590"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.855754554271698},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5194287300109863},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.43102535605430603},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4036844074726105}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.855754554271698},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5194287300109863},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.43102535605430603},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4036844074726105}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3402993","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3402993","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W1499934958","https://openalex.org/W2027471022","https://openalex.org/W2112796928","https://openalex.org/W2117756735","https://openalex.org/W2535690855","https://openalex.org/W2554864439","https://openalex.org/W2591882872","https://openalex.org/W2618530766","https://openalex.org/W2701059868","https://openalex.org/W2767079719","https://openalex.org/W2897830718","https://openalex.org/W2930926105","https://openalex.org/W2963456518","https://openalex.org/W2970408908","https://openalex.org/W2972594657","https://openalex.org/W2995022099","https://openalex.org/W3016632787","https://openalex.org/W3103245149","https://openalex.org/W3127927415","https://openalex.org/W3138153888","https://openalex.org/W3138597937","https://openalex.org/W3180608480","https://openalex.org/W3188785851","https://openalex.org/W3198262235","https://openalex.org/W3201919447","https://openalex.org/W3202882929","https://openalex.org/W3215937653","https://openalex.org/W4210426519","https://openalex.org/W4226047321","https://openalex.org/W4226461837","https://openalex.org/W4288057793","https://openalex.org/W4289147229","https://openalex.org/W4298171975","https://openalex.org/W4302363089","https://openalex.org/W4306830536","https://openalex.org/W4311081048","https://openalex.org/W4318619660","https://openalex.org/W4384499048","https://openalex.org/W4385299238","https://openalex.org/W4390904993","https://openalex.org/W6637373629","https://openalex.org/W6676935882","https://openalex.org/W6734213055","https://openalex.org/W6743821447","https://openalex.org/W6748786018","https://openalex.org/W6752600739","https://openalex.org/W6756333562","https://openalex.org/W6756756286","https://openalex.org/W6763048141","https://openalex.org/W6770634426","https://openalex.org/W6775563089","https://openalex.org/W6780640148","https://openalex.org/W6850081529"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W2382290278","https://openalex.org/W4395014643"],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL),":[2],"a":[3,85,98,118,229],"distributed":[4,186],"learning":[5],"paradigm":[6],"optimizing":[7],"communication":[8,119],"costs":[9],"and":[10,32,42,63,117,155,184,193],"enhancing":[11],"privacy":[12,34],"by":[13,182],"uploading":[14],"gradients":[15],"instead":[16],"of":[17,91,101,121,153,219],"raw":[18],"data,":[19],"now":[20],"confronts":[21],"security":[22,192],"challenges.":[23],"It":[24],"is":[25],"particularly":[26],"vulnerable":[27],"to":[28,49,132,173],"Byzantine":[29],"poisoning":[30,72],"attacks":[31],"potential":[33],"breaches":[35],"via":[36],"inference":[37],"attacks.":[38,77,94],"While":[39],"homomorphic":[40],"encryption":[41],"secure":[43],"multi-party":[44],"computation":[45],"have":[46],"been":[47],"employed":[48],"design":[50],"robust":[51,222],"FL":[52,88,224],"mechanisms,":[53],"these":[54],"predominantly":[55],"rely":[56],"on":[57],"Euclidean":[58],"distance":[59],"or":[60],"median-based":[61],"metrics":[62],"often":[64],"fall":[65],"short":[66],"in":[67,178,241],"comprehensively":[68],"defending":[69],"against":[70],"advanced":[71],"attacks,":[73],"such":[74],"as":[75],"adaptive":[76,93,170],"Addressing":[78],"this":[79,213],"issue,":[80],"our":[81],"study":[82],"introduces":[83],"\u201cSplit-Aggregation\",":[84],"lightweight":[86],"privacy-preserving":[87,223],"solution":[89],"capable":[90],"withstanding":[92],"This":[95],"method":[96,214],"maintains":[97],"computational":[99],"complexity":[100,200],"<italic":[102,106,110,122,126,135,141,148,156,208,231],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[103,107,111,114,123,127,136,142,149,157,209,232],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">O</i>":[104,124],"(":[105,125],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">dkN</i>":[108],"+":[109],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">k</i>":[112,137,158,210,233],"<sup":[113],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">3</sup>":[115],")":[116],"overhead":[120],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">dN</i>":[128],"),":[129],"performing":[130],"comparably":[131],"FedAvg":[133],"when":[134],"=":[138,211],"10.":[139],"Here,":[140],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">d</i>":[143],"represents":[144],"the":[145,151,159,216],"gradient":[146,175],"dimension,":[147],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">N</i>":[150],"number":[152],"users,":[154],"rank":[160],"chosen":[161],"during":[162],"random":[163],"singular":[164],"value":[165],"decomposition.":[166],"Additionally,":[167],"we":[168],"utilize":[169],"weight":[171],"coefficients":[172],"mitigate":[174],"descent":[176],"issues":[177],"honest":[179],"users":[180],"caused":[181],"non-independent":[183],"identically":[185],"(Non-IID)":[187],"data.":[188],"The":[189],"proposed":[190],"method\u2019s":[191],"robustness":[194],"are":[195],"theoretically":[196],"proven,":[197],"with":[198,237],"its":[199],"thoroughly":[201],"analyzed.":[202],"Experimental":[203],"results":[204],"demonstrate":[205],"that":[206],"at":[207],"10,":[212],"surpasses":[215],"top-1":[217],"accuracy":[218],"current":[220],"state-of-the-art":[221],"approaches.":[225],"Moreover,":[226],"opting":[227],"for":[228],"smaller":[230],"significantly":[234],"boosts":[235],"efficiency":[236],"only":[238],"marginal":[239],"compromises":[240],"accuracy.":[242]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
