{"id":"https://openalex.org/W7123355961","doi":"https://doi.org/10.1109/icspis67605.2025.11318386","title":"A Cutting-Edge Hash-Comb Approach for Privacy-Preserving Federated Learning","display_name":"A Cutting-Edge Hash-Comb Approach for Privacy-Preserving Federated Learning","publication_year":2025,"publication_date":"2025-11-18","ids":{"openalex":"https://openalex.org/W7123355961","doi":"https://doi.org/10.1109/icspis67605.2025.11318386"},"language":null,"primary_location":{"id":"doi:10.1109/icspis67605.2025.11318386","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icspis67605.2025.11318386","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 8th International Conference on Signal Processing and Information Security (ICSPIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003850095","display_name":"Alanoud Almemari","orcid":null},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Alanoud Almemari","raw_affiliation_strings":["Khalifa University,EBTIC,Department of Computer Science,Abu Dhabi,UAE"],"affiliations":[{"raw_affiliation_string":"Khalifa University,EBTIC,Department of Computer Science,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ernesto Damiani","orcid":null},"institutions":[{"id":"https://openalex.org/I117222138","display_name":"Abu Dhabi University","ror":"https://ror.org/01r3kjq03","country_code":"AE","type":"education","lineage":["https://openalex.org/I117222138"]},{"id":"https://openalex.org/I189158943","display_name":"University of Milan","ror":"https://ror.org/00wjc7c48","country_code":"IT","type":"education","lineage":["https://openalex.org/I189158943"]}],"countries":["AE","IT"],"is_corresponding":false,"raw_author_name":"Ernesto Damiani","raw_affiliation_strings":["Universit&#x2018; a Degli Studi di Milano,Computer Science Department,Abu Dhabi,UAE"],"affiliations":[{"raw_affiliation_string":"Universit&#x2018; a Degli Studi di Milano,Computer Science Department,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I189158943","https://openalex.org/I117222138"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122849419","display_name":"Yousof Alhammadi","orcid":null},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Yousof Alhammadi","raw_affiliation_strings":["Khalifa University,Computer Science Department,Abu Dhabi,UAE"],"affiliations":[{"raw_affiliation_string":"Khalifa University,Computer Science Department,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I176601375"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038418373","display_name":"Rasool Asal","orcid":null},"institutions":[{"id":"https://openalex.org/I132806614","display_name":"University of Dubai","ror":"https://ror.org/05h0z7c09","country_code":"AE","type":"education","lineage":["https://openalex.org/I132806614"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Rasool Asal","raw_affiliation_strings":["University of Dubai,College of Engineering and IT,Dubai,UAE"],"affiliations":[{"raw_affiliation_string":"University of Dubai,College of Engineering and IT,Dubai,UAE","institution_ids":["https://openalex.org/I132806614"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090559896","display_name":"Maurizio Colombo","orcid":"https://orcid.org/0000-0002-0515-0724"},"institutions":[{"id":"https://openalex.org/I176601375","display_name":"Khalifa University of Science and Technology","ror":"https://ror.org/05hffr360","country_code":"AE","type":"education","lineage":["https://openalex.org/I176601375"]},{"id":"https://openalex.org/I4210141355","display_name":"EBTIC","ror":"https://ror.org/050mver74","country_code":"AE","type":"other","lineage":["https://openalex.org/I4210141355"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Maurizio Colombo","raw_affiliation_strings":["Khalifa University,EBTIC,Abu Dhabi,UAE"],"affiliations":[{"raw_affiliation_string":"Khalifa University,EBTIC,Abu Dhabi,UAE","institution_ids":["https://openalex.org/I176601375","https://openalex.org/I4210141355"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5099801455","display_name":"Lamees Mahmoud AlQassem","orcid":null},"institutions":[{"id":"https://openalex.org/I132806614","display_name":"University of Dubai","ror":"https://ror.org/05h0z7c09","country_code":"AE","type":"education","lineage":["https://openalex.org/I132806614"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Lamees M. AlQassem","raw_affiliation_strings":["University of Dubai,College of Engineering and IT,Dubai,UAE"],"affiliations":[{"raw_affiliation_string":"University of Dubai,College of Engineering and IT,Dubai,UAE","institution_ids":["https://openalex.org/I132806614"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5003850095"],"corresponding_institution_ids":["https://openalex.org/I176601375"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.83839521,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9398000240325928,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9398000240325928,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.026599999517202377,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.004900000058114529,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.774399995803833},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6791999936103821},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.5831999778747559},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5331000089645386},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5116000175476074},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.49230000376701355},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.44440001249313354},{"id":"https://openalex.org/keywords/data-anonymization","display_name":"Data anonymization","score":0.4302999973297119},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.4178999960422516}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8277999758720398},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.774399995803833},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6791999936103821},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.5831999778747559},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5331000089645386},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5116000175476074},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.49230000376701355},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.44440001249313354},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.4302999973297119},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.4178999960422516},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.4097999930381775},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.37929999828338623},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36579999327659607},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.36399999260902405},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.3625999987125397},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3598000109195709},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.3361999988555908},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.32179999351501465},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.3003999888896942},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.30000001192092896},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2948000133037567},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.28760001063346863},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27790001034736633},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.275299996137619},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2685999870300293},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.26570001244544983},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2597000002861023}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icspis67605.2025.11318386","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icspis67605.2025.11318386","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 8th International Conference on Signal Processing and Information Security (ICSPIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5800571441650391,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Federated":[0],"Learning":[1,146],"(FL)":[2],"enables":[3],"decentralized":[4],"model":[5,51,160,186],"training":[6],"without":[7],"sharing":[8],"raw":[9],"data,":[10],"but":[11,23],"it":[12,106,189],"remains":[13],"vulnerable":[14],"to":[15,88,163],"various":[16],"privacy":[17,75,90,181],"threats.":[18],"Cryptographic":[19],"methods":[20],"offer":[21],"protection":[22],"often":[24],"introduce":[25,96],"high":[26],"computational":[27],"and":[28,33,65,104,123,149,173,192,197],"communication":[29],"overhead,":[30],"degrading":[31],"performance":[32],"reducing":[34],"parameter":[35],"utility.":[36],"In":[37,136],"this":[38],"paper,":[39],"we":[40,139],"present":[41],"Hash-comb,":[42],"a":[43,81,117,166,190],"lightweight,":[44],"privacy-preserving,":[45],"distance-aware":[46],"hashing":[47],"approach":[48],"for":[49,195],"privatizing":[50],"updates":[52],"in":[53,77,91],"FL.":[54,199],"We":[55,69,94],"detail":[56],"the":[57,97,121,133],"algorithm\u2019s":[58],"design,":[59],"its":[60,66,101],"integration":[61],"into":[62,132],"FL":[63,92,134,168],"workflows,":[64],"encoding/decoding":[67],"processes.":[68],"begin":[70],"by":[71,80,116],"presenting":[72],"background":[73],"on":[74,185],"threats":[76],"FL,":[78],"followed":[79,115],"literature":[82],"review":[83],"of":[84,165],"cryptographic":[85],"approaches":[86],"used":[87],"protect":[89],"systems.":[93],"then":[95],"Hash-comb":[98,130,141,157,179],"approach,":[99],"explaining":[100],"core":[102],"principles":[103],"how":[105,129],"encodes":[107],"data":[108,150],"using":[109],"distance-aware,":[110],"multi-level":[111],"quantization.":[112],"This":[113],"is":[114],"detailed":[118],"methodology":[119],"outlining":[120],"encoding":[122,172],"decoding":[124],"processes,":[125],"as":[126,128],"well":[127],"integrates":[131],"workflow.":[135],"our":[137],"experiments,":[138],"evaluate":[140],"across":[142],"multiple":[143],"datasets,":[144],"Machine":[145],"(ML)":[147],"models,":[148],"distribution":[151],"scenarios.":[152],"The":[153],"results":[154],"demonstrate":[155],"that":[156,164,178],"maintains":[158],"global":[159],"accuracy":[161],"comparable":[162],"conventional":[167],"setup,":[169],"even":[170],"after":[171],"decoding.":[174],"These":[175],"findings":[176],"confirm":[177],"guarantees":[180],"with":[182],"minimal":[183],"impact":[184],"utility,":[187],"making":[188],"practical":[191],"scalable":[193],"solution":[194],"secure":[196],"privacy-preserving":[198]},"counts_by_year":[],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2026-01-14T00:00:00"}
