{"id":"https://openalex.org/W4285322027","doi":"https://doi.org/10.1145/3510513.3510531","title":"Universal Interactive Verification Framework for Federated Learning Protocol","display_name":"Universal Interactive Verification Framework for Federated Learning Protocol","publication_year":2021,"publication_date":"2021-12-10","ids":{"openalex":"https://openalex.org/W4285322027","doi":"https://doi.org/10.1145/3510513.3510531"},"language":"en","primary_location":{"id":"doi:10.1145/3510513.3510531","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3510513.3510531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 The 10th International Conference on Networks, Communication and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085268987","display_name":"Zhihua Cheng","orcid":"https://orcid.org/0000-0001-9040-2473"},"institutions":[{"id":"https://openalex.org/I17442442","display_name":"State Grid Corporation of China (China)","ror":"https://ror.org/05twwhs70","country_code":"CN","type":"company","lineage":["https://openalex.org/I17442442"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhihua Cheng","raw_affiliation_strings":["Big Data Center of State Grid Corporation of China, China"],"affiliations":[{"raw_affiliation_string":"Big Data Center of State Grid Corporation of China, China","institution_ids":["https://openalex.org/I17442442"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101660645","display_name":"Yiwen Jiang","orcid":"https://orcid.org/0000-0003-3504-8824"},"institutions":[{"id":"https://openalex.org/I17442442","display_name":"State Grid Corporation of China (China)","ror":"https://ror.org/05twwhs70","country_code":"CN","type":"company","lineage":["https://openalex.org/I17442442"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiwen Jiang","raw_affiliation_strings":["Big Data Center of State Grid Corporation of China, China"],"affiliations":[{"raw_affiliation_string":"Big Data Center of State Grid Corporation of China, China","institution_ids":["https://openalex.org/I17442442"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102442317","display_name":"Xiuli Huang","orcid":"https://orcid.org/0009-0008-8551-2238"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiuli Huang","raw_affiliation_strings":["State Grid Key Laboratory of Information&amp;#38;Network Security, Global Energy Interconnection Research Institute Co.,LTD Nanjing Branch, China","State Grid Key Laboratory of Information&#38"],"affiliations":[{"raw_affiliation_string":"State Grid Key Laboratory of Information&amp;#38;Network Security, Global Energy Interconnection Research Institute Co.,LTD Nanjing Branch, China","institution_ids":[]},{"raw_affiliation_string":"State Grid Key Laboratory of Information&#38","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089918570","display_name":"Yuxiao Xia","orcid":null},"institutions":[{"id":"https://openalex.org/I17442442","display_name":"State Grid Corporation of China (China)","ror":"https://ror.org/05twwhs70","country_code":"CN","type":"company","lineage":["https://openalex.org/I17442442"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuxiao Xia","raw_affiliation_strings":["Big Data Center of State Grid Corporation of China, China"],"affiliations":[{"raw_affiliation_string":"Big Data Center of State Grid Corporation of China, China","institution_ids":["https://openalex.org/I17442442"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5085268987"],"corresponding_institution_ids":["https://openalex.org/I17442442"],"apc_list":null,"apc_paid":null,"fwci":0.136,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58751086,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"108","last_page":"113"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9840999841690063,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.857647180557251},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6421903371810913},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.62674880027771},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.6103395819664001},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5766551494598389},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5444756746292114},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4646555781364441},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4371569752693176},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4333200454711914},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4272877275943756},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.2773720622062683},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.27397048473358154},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.19192451238632202},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15308740735054016}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.857647180557251},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6421903371810913},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.62674880027771},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.6103395819664001},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5766551494598389},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5444756746292114},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4646555781364441},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4371569752693176},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4333200454711914},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4272877275943756},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2773720622062683},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.27397048473358154},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.19192451238632202},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15308740735054016},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3510513.3510531","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3510513.3510531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 The 10th International Conference on Networks, Communication and Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W569478347","https://openalex.org/W2541884796","https://openalex.org/W2591882872","https://openalex.org/W2767079719","https://openalex.org/W2774510177","https://openalex.org/W2930926105","https://openalex.org/W2990614164","https://openalex.org/W3007318395","https://openalex.org/W3038028469","https://openalex.org/W3103245149","https://openalex.org/W4299301436","https://openalex.org/W6769858516"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2091483479"],"abstract_inverted_index":{"Federated":[0],"learning":[1,10,17,35,60],"protocol":[2],"provides":[3],"an":[4],"applicable":[5],"solution":[6],"for":[7,33,80],"large-scale":[8],"deep":[9],"in":[11],"distributed":[12],"scenario.":[13],"However,":[14],"existing":[15],"federated":[16,34],"system":[18,93],"is":[19,65],"vulnerable":[20],"to":[21,38,67],"many":[22],"attacks":[23],"and":[24,42,49,54,92],"threats.":[25],"This":[26],"paper":[27],"proposes":[28],"a":[29,74],"universal":[30],"verification":[31,63,78],"framework":[32,64],"protocol,":[36],"aiming":[37],"analyze":[39],"the":[40,52],"security":[41],"privacy":[43,86],"risks":[44],"of":[45,76],"interactions":[46],"between":[47],"clients":[48],"servers":[50],"during":[51],"training":[53],"inference":[55],"process.":[56],"Based":[57],"on":[58],"reinforcement":[59],"technology,":[61],"our":[62],"capable":[66],"adopt":[68],"various":[69],"conditions.":[70],"Furthermore,":[71],"it":[72],"presents":[73],"set":[75],"interactive":[77],"metrics":[79],"comprehensive":[81],"evaluation,":[82],"including":[83],"data":[84],"confidentiality,":[85],"threat,":[87],"model":[88,90],"availability,":[89],"robustness":[91],"vulnerability.":[94]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
