{"id":"https://openalex.org/W4306904982","doi":"https://doi.org/10.1145/3533271.3561754","title":"Collusion Resistant Federated Learning with Oblivious Distributed Differential Privacy","display_name":"Collusion Resistant Federated Learning with Oblivious Distributed Differential Privacy","publication_year":2022,"publication_date":"2022-10-20","ids":{"openalex":"https://openalex.org/W4306904982","doi":"https://doi.org/10.1145/3533271.3561754"},"language":"en","primary_location":{"id":"doi:10.1145/3533271.3561754","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3533271.3561754","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Third ACM International Conference on AI in Finance","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110306774","display_name":"David R. Byrd","orcid":"https://orcid.org/0000-0002-1726-3320"},"institutions":[{"id":"https://openalex.org/I135474949","display_name":"Bowdoin College","ror":"https://ror.org/03gh96r95","country_code":"US","type":"education","lineage":["https://openalex.org/I135474949"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"David Byrd","raw_affiliation_strings":["Bowdoin College, US"],"affiliations":[{"raw_affiliation_string":"Bowdoin College, US","institution_ids":["https://openalex.org/I135474949"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082178110","display_name":"Vaikkunth Mugunthan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vaikkunth Mugunthan","raw_affiliation_strings":["DynamoFL, US"],"affiliations":[{"raw_affiliation_string":"DynamoFL, US","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030114656","display_name":"Antigoni Polychroniadou","orcid":"https://orcid.org/0009-0003-0125-2971"},"institutions":[{"id":"https://openalex.org/I1305429384","display_name":"JPMorgan Chase & Co (United States)","ror":"https://ror.org/01x3kkr08","country_code":"US","type":"company","lineage":["https://openalex.org/I1305429384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Antigoni Polychroniadou","raw_affiliation_strings":["JPMorgan AI Research, US"],"affiliations":[{"raw_affiliation_string":"JPMorgan AI Research, US","institution_ids":["https://openalex.org/I1305429384"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035482777","display_name":"Tucker Balch","orcid":"https://orcid.org/0000-0002-5148-2033"},"institutions":[{"id":"https://openalex.org/I1305429384","display_name":"JPMorgan Chase & Co (United States)","ror":"https://ror.org/01x3kkr08","country_code":"US","type":"company","lineage":["https://openalex.org/I1305429384"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tucker Balch","raw_affiliation_strings":["JP Morgan, US"],"affiliations":[{"raw_affiliation_string":"JP Morgan, US","institution_ids":["https://openalex.org/I1305429384"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5110306774"],"corresponding_institution_ids":["https://openalex.org/I135474949"],"apc_list":null,"apc_paid":null,"fwci":1.2492,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.83226726,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"114","last_page":"122"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8002730011940002},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.6841671466827393},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.6115498542785645},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6106398701667786},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.4772465229034424},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4603865146636963},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45909175276756287},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.45719587802886963},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.22058799862861633},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.206425279378891},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.20072761178016663}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8002730011940002},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.6841671466827393},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.6115498542785645},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6106398701667786},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.4772465229034424},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4603865146636963},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45909175276756287},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.45719587802886963},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.22058799862861633},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.206425279378891},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.20072761178016663},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3533271.3561754","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3533271.3561754","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Third ACM International Conference on AI in Finance","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7599999904632568,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G5248666984","display_name":null,"funder_award_id":"1741026","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6894402473","display_name":null,"funder_award_id":"Fellowship","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1557833142","https://openalex.org/W2027471022","https://openalex.org/W2109553965","https://openalex.org/W2156186849","https://openalex.org/W2217007515","https://openalex.org/W2535690855","https://openalex.org/W2595959570","https://openalex.org/W2767079719","https://openalex.org/W2986151549","https://openalex.org/W3033083249","https://openalex.org/W3201919447"],"related_works":["https://openalex.org/W4366307888","https://openalex.org/W4286971788","https://openalex.org/W3199340467","https://openalex.org/W3157608626","https://openalex.org/W3132132958","https://openalex.org/W4322580403","https://openalex.org/W3193217249","https://openalex.org/W4321612632","https://openalex.org/W4280591108","https://openalex.org/W3021849752"],"abstract_inverted_index":{"Federated":[0],"learning":[1,14,59],"enables":[2],"a":[3,11,20],"population":[4],"of":[5,19,41],"distributed":[6],"clients":[7],"to":[8,32,64,97],"jointly":[9],"train":[10],"shared":[12],"machine":[13],"model":[15,68,102],"with":[16],"the":[17,73,86],"assistance":[18],"central":[21,74],"server.":[22],"The":[23],"finance":[24],"community":[25],"has":[26],"shown":[27],"interest":[28,43],"in":[29,85,92],"its":[30],"potential":[31],"allow":[33],"inter-firm":[34],"and":[35,104],"cross-silo":[36],"collaborative":[37],"models":[38],"for":[39],"problems":[40],"common":[42],"(e.g.":[44],"fraud":[45],"detection),":[46],"even":[47,71],"when":[48,72],"customer":[49,108],"data":[50],"use":[51],"is":[52,76,81],"heavily":[53],"regulated.":[54],"Prior":[55],"works":[56],"on":[57],"federated":[58],"have":[60],"employed":[61],"cryptographic":[62],"techniques":[63],"keep":[65],"individual":[66],"client":[67],"parameters":[69],"private":[70],"server":[75],"not":[77],"trusted.":[78],"However,":[79],"there":[80],"an":[82,99],"important":[83],"gap":[84],"literature:":[87],"efficient":[88],"protection":[89],"against":[90],"attacks":[91],"which":[93],"other":[94],"parties":[95],"collude":[96],"expose":[98],"honest":[100],"client\u2019s":[101],"parameters,":[103],"therefore":[105],"potentially":[106],"protected":[107],"data.":[109]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
