{"id":"https://openalex.org/W4400947846","doi":"https://doi.org/10.1145/3672919.3672947","title":"Research on federal learning privacy protection based on secure multi-party computing","display_name":"Research on federal learning privacy protection based on secure multi-party computing","publication_year":2024,"publication_date":"2024-03-01","ids":{"openalex":"https://openalex.org/W4400947846","doi":"https://doi.org/10.1145/3672919.3672947"},"language":"en","primary_location":{"id":"doi:10.1145/3672919.3672947","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3672919.3672947","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031597660","display_name":"Bin Liu","orcid":"https://orcid.org/0009-0002-0490-2151"},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]},{"id":"https://openalex.org/I75867142","display_name":"Xiamen University of Technology","ror":"https://ror.org/01285e189","country_code":"CN","type":"education","lineage":["https://openalex.org/I75867142"]}],"countries":["CN","PH"],"is_corresponding":true,"raw_author_name":"Bin Liu","raw_affiliation_strings":["School of Information Technology, Mapua University, Philippines and \rSchool of Software Engineering, Xiamen University of Technology, China"],"raw_orcid":"https://orcid.org/0009-0002-0490-2151","affiliations":[{"raw_affiliation_string":"School of Information Technology, Mapua University, Philippines and \rSchool of Software Engineering, Xiamen University of Technology, China","institution_ids":["https://openalex.org/I137967721","https://openalex.org/I75867142"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027459129","display_name":"Eric Blancaflor","orcid":"https://orcid.org/0000-0002-7189-3040"},"institutions":[{"id":"https://openalex.org/I137967721","display_name":"Map\u00faa University","ror":"https://ror.org/040rd2b57","country_code":"PH","type":"facility","lineage":["https://openalex.org/I137967721"]}],"countries":["PH"],"is_corresponding":false,"raw_author_name":"Eric B. Blancaflor","raw_affiliation_strings":["School of Information Technology, Mapua University, Philippines"],"raw_orcid":"https://orcid.org/0000-0002-7189-3040","affiliations":[{"raw_affiliation_string":"School of Information Technology, Mapua University, Philippines","institution_ids":["https://openalex.org/I137967721"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031597660"],"corresponding_institution_ids":["https://openalex.org/I137967721","https://openalex.org/I75867142"],"apc_list":null,"apc_paid":null,"fwci":0.3311,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.63962772,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"142","last_page":"147"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9598000049591064,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6947192549705505},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.6436296701431274},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5930535793304443},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.537966251373291},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5264989733695984}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6947192549705505},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.6436296701431274},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5930535793304443},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.537966251373291},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5264989733695984}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3672919.3672947","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3672919.3672947","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W3012382439","https://openalex.org/W3012501605","https://openalex.org/W3086590218","https://openalex.org/W3091870957","https://openalex.org/W3100779497","https://openalex.org/W3122679952","https://openalex.org/W3167578067","https://openalex.org/W3215776046","https://openalex.org/W4206632690","https://openalex.org/W4220698464","https://openalex.org/W4220985235","https://openalex.org/W4281669142","https://openalex.org/W4285222486","https://openalex.org/W4287092816","https://openalex.org/W4296045111","https://openalex.org/W4297968295","https://openalex.org/W4308213849","https://openalex.org/W4313068580","https://openalex.org/W4352977741","https://openalex.org/W4365128754","https://openalex.org/W4367397315","https://openalex.org/W4378697089","https://openalex.org/W4379659765","https://openalex.org/W4380033533","https://openalex.org/W4382655559","https://openalex.org/W4383502492","https://openalex.org/W4385517044","https://openalex.org/W4385800918","https://openalex.org/W4386583854","https://openalex.org/W4387010806","https://openalex.org/W4387088011","https://openalex.org/W4387517746","https://openalex.org/W4388037947","https://openalex.org/W4388621252","https://openalex.org/W4388642370","https://openalex.org/W4388756035","https://openalex.org/W4388878683","https://openalex.org/W4389820298","https://openalex.org/W4391216281","https://openalex.org/W4391235346","https://openalex.org/W4391249105"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W2538581760","https://openalex.org/W3195097297","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W4225340788","https://openalex.org/W4318485713"],"abstract_inverted_index":{"Federated":[0],"learning":[1,72,84,131],"(FL)":[2],"exchanges":[3],"model":[4,42,59,118],"changes":[5],"without":[6],"sharing":[7,91,98],"raw":[8],"data.":[9],"As":[10],"an":[11],"innovative":[12],"approach":[13],"to":[14,154],"solving":[15],"data":[16,30,39,62,102],"security":[17,111,124,195],"and":[18,41,46,64,112,123,196],"privacy":[19,63,68,137,157],"protection":[20,69,138],"issues,":[21],"it":[22,95,174],"has":[23,73,163,184],"recently":[24],"become":[25,74],"popular.":[26],"In":[27],"federated":[28,71,83,130],"learning,":[29],"remains":[31],"in":[32,129,167,181],"the":[33,58,67,78,89,97,142,178],"hands":[34],"of":[35,57,70,82,92,99,110],"various":[36],"institutions":[37],"or":[38,103],"owners,":[40],"parameters":[43],"are":[44,85],"exchanged":[45],"shared":[47],"among":[48],"parties":[49],"through":[50,172],"encryption":[51],"technology,":[52],"which":[53,106],"enables":[54],"collaborative":[55],"training":[56],"while":[60,115,193],"protecting":[61],"security.":[65],"Therefore,":[66,114],"very":[75],"important.":[76],"However,":[77],"existing":[79,191],"research":[80],"schemes":[81,192],"all":[86],"based":[87,140],"on":[88,141],"open":[90],"data,":[93,105],"whether":[94],"is":[96,125,175],"plain":[100],"text":[101],"encrypted":[104],"brings":[107],"about":[108],"issues":[109],"efficiency.":[113],"maintaining":[116],"sufficient":[117],"accuracy,":[119],"improving":[120],"computational":[121,187],"efficiency":[122,188],"a":[126,136],"major":[127],"challenge":[128],"research.":[132],"This":[133],"paper":[134,183],"proposes":[135],"scheme":[139,180],"SPDZ":[143],"protocol":[144],"for":[145],"secure":[146,160],"multi-party":[147,161],"computation,":[148],"using":[149],"Chi-square":[150],"binning":[151],"related":[152],"technologies":[153],"achieve":[155],"better":[156],"protection.":[158],"Meanwhile,":[159],"computation":[162],"more":[164],"obvious":[165],"advantages":[166],"complex":[168],"application":[169],"scenarios.":[170],"Finally,":[171],"experiments,":[173],"proved":[176],"that":[177],"proposed":[179],"this":[182],"significantly":[185],"improved":[186],"compared":[189],"with":[190],"ensuring":[194],"basic":[197],"accuracy.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
