{"id":"https://openalex.org/W4399120444","doi":"https://doi.org/10.1145/3654823.3654854","title":"Optimizing Privacy in Federated Learning with MPC and Differential Privacy","display_name":"Optimizing Privacy in Federated Learning with MPC and Differential Privacy","publication_year":2024,"publication_date":"2024-03-22","ids":{"openalex":"https://openalex.org/W4399120444","doi":"https://doi.org/10.1145/3654823.3654854"},"language":"en","primary_location":{"id":"doi:10.1145/3654823.3654854","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3654823.3654854","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3654823.3654854","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3654823.3654854","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Chao Zheng","orcid":"https://orcid.org/0009-0006-3358-9618"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chao Zheng","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China"],"raw_orcid":"https://orcid.org/0009-0006-3358-9618","affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, China and School of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100328729","display_name":"Liming Wang","orcid":"https://orcid.org/0000-0002-5732-5258"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liming Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, China"],"raw_orcid":"https://orcid.org/0000-0002-5732-5258","affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004682581","display_name":"Zhen Xu","orcid":"https://orcid.org/0009-0006-8579-5544"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Xu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, China"],"raw_orcid":"https://orcid.org/0009-0006-8579-5544","affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101911275","display_name":"Hongjia Li","orcid":"https://orcid.org/0000-0003-1683-343X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongjia Li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, China"],"raw_orcid":"https://orcid.org/0000-0003-1683-343X","affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":2.9802,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.91982378,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"165","last_page":"169"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.9119265079498291},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7917276620864868},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5709717869758606},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5608082413673401},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5570394992828369},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.527308464050293},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.5238295197486877},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.508188009262085},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.484425812959671},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.4493909776210785},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.445929616689682},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.43894654512405396},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.41656625270843506},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19908148050308228},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.12424466013908386},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.08776599168777466}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.9119265079498291},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7917276620864868},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5709717869758606},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5608082413673401},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5570394992828369},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.527308464050293},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.5238295197486877},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.508188009262085},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.484425812959671},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.4493909776210785},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.445929616689682},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.43894654512405396},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.41656625270843506},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19908148050308228},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.12424466013908386},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.08776599168777466},{"id":"https://openalex.org/C40700","wikidata":"https://www.wikidata.org/wiki/Q1411783","display_name":"Industrial organization","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3654823.3654854","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3654823.3654854","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3654823.3654854","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3654823.3654854","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3654823.3654854","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3654823.3654854","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4399120444.pdf"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W2051267297","https://openalex.org/W2591882872","https://openalex.org/W2701059868","https://openalex.org/W2757528734","https://openalex.org/W2897830718","https://openalex.org/W2927692314","https://openalex.org/W2930926105","https://openalex.org/W2963456518","https://openalex.org/W2964162474","https://openalex.org/W2970606380","https://openalex.org/W2974175488","https://openalex.org/W3102360395","https://openalex.org/W3103245149","https://openalex.org/W3201919447","https://openalex.org/W3203780767","https://openalex.org/W4285126476"],"related_works":["https://openalex.org/W2101582069","https://openalex.org/W4304208041","https://openalex.org/W2127814706","https://openalex.org/W4315488958","https://openalex.org/W3176515490","https://openalex.org/W3185918024","https://openalex.org/W3138333794","https://openalex.org/W2773408865","https://openalex.org/W4226426276","https://openalex.org/W2083287929"],"abstract_inverted_index":{"With":[0],"the":[1,116,162,170,174,182,204,229],"proliferation":[2],"of":[3,12,92,118,158,177,193,201,231],"information":[4,95],"technologies,":[5],"data":[6,19,21,25,28,38,49,79,223],"has":[7],"become":[8],"a":[9,46,60,73,81,130,189,197,215,220],"fundamental":[10],"driver":[11],"societal":[13],"development.":[14],"However,":[15,84],"issues":[16],"related":[17],"to":[18,31,70,80,89,141,151],"regulation,":[20],"rights":[22],"confirmation,":[23],"and":[24,34,40,51,154,196,209,225],"protection":[26,53,227],"hinder":[27],"circulation,":[29],"leading":[30],"\"data":[32],"islands\"":[33],"raising":[35],"concerns":[36,86],"about":[37],"privacy":[39,52,85,108,117,143,226],"security.":[41],"In":[42],"this":[43],"context,":[44],"achieving":[45,219],"balance":[47,221],"between":[48,222],"circulation":[50,224],"is":[54,59,149],"crucial.":[55],"Federated":[56],"Learning":[57],"(FL)":[58],"distributed":[61],"machine":[62],"learning":[63],"methodology":[64],"that":[65,133],"allows":[66],"multiple":[67],"client":[68],"devices":[69],"collaboratively":[71],"construct":[72],"model":[74],"without":[75,144],"transmitting":[76],"their":[77,97,119],"local":[78,120],"cloud":[82],"server.":[83],"persist":[87],"due":[88],"potential":[90,156],"disclosure":[91],"clients\u2019":[93],"private":[94],"through":[96],"submitted":[98],"updates.":[99],"To":[100],"mitigate":[101],"these":[102],"risks,":[103],"researchers":[104],"have":[105],"integrated":[106],"differential":[107],"(DP)":[109],"techniques":[110],"into":[111],"FL,":[112],"where":[113],"clients":[114],"enhance":[115],"parameter":[121],"updates":[122],"by":[123],"introducing":[124],"random":[125],"noise.":[126],"This":[127,212],"paper":[128],"presents":[129],"novel":[131],"approach":[132,148,168],"combines":[134],"Secure":[135],"Multi-Party":[136],"Computation":[137],"(MPC)":[138],"with":[139],"DP":[140],"ensure":[142],"compromising":[145],"accuracy.":[146],"Our":[147,186],"resilient":[150],"collusion":[152],"attacks":[153],"eliminates":[155],"leakage":[157],"any":[159,178],"input":[160],"in":[161,228],"output.":[163],"Unlike":[164],"previous":[165],"solutions,":[166],"our":[167],"prevents":[169],"server":[171],"from":[172],"inferring":[173],"noisy":[175],"weights":[176],"specific":[179],"user,":[180],"making":[181],"system":[183],"fully":[184],"private.":[185],"contributions":[187],"include":[188],"more":[190],"practical":[191],"assumption":[192],"network":[194],"connectivity":[195],"simplified":[198],"communication":[199,207],"structure":[200],"MPC,":[202],"reducing":[203],"required":[205],"MPC":[206],"overhead":[208],"enhancing":[210],"efficiency.":[211],"work":[213],"provides":[214],"significant":[216],"step":[217],"towards":[218],"era":[230],"big":[232],"data.":[233]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
