{"id":"https://openalex.org/W4399418899","doi":"https://doi.org/10.1145/3651671.3651710","title":"FedMCT: A Federated Framework for Intellectual Property Protection and Malicious Client Tracking","display_name":"FedMCT: A Federated Framework for Intellectual Property Protection and Malicious Client Tracking","publication_year":2024,"publication_date":"2024-02-02","ids":{"openalex":"https://openalex.org/W4399418899","doi":"https://doi.org/10.1145/3651671.3651710"},"language":"en","primary_location":{"id":"doi:10.1145/3651671.3651710","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3651671.3651710","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038410647","display_name":"Qianyi Chen","orcid":"https://orcid.org/0009-0009-9318-7735"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qianyi Chen","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, China"],"raw_orcid":"https://orcid.org/0009-0009-9318-7735","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069998992","display_name":"Peijia Zheng","orcid":"https://orcid.org/0000-0003-0979-8613"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peijia Zheng","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, China"],"raw_orcid":"https://orcid.org/0000-0003-0979-8613","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090767157","display_name":"Yusong Du","orcid":"https://orcid.org/0000-0002-3387-6864"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yusong Du","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, China"],"raw_orcid":"https://orcid.org/0000-0002-3387-6864","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102785655","display_name":"Weiqi Luo","orcid":"https://orcid.org/0000-0002-8999-6064"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiqi Luo","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, China"],"raw_orcid":"https://orcid.org/0000-0002-8999-6064","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100377013","display_name":"Hongmei Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongmei Liu","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University, China"],"raw_orcid":"https://orcid.org/0000-0002-9091-7992","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5038410647"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":1.3245,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83036411,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"80","last_page":"86"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8362252712249756},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.699648380279541},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.6095706820487976},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5952407121658325},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.5580791234970093},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5428590178489685},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5413280725479126},{"id":"https://openalex.org/keywords/intellectual-property","display_name":"Intellectual property","score":0.5378161668777466},{"id":"https://openalex.org/keywords/tracking","display_name":"Tracking (education)","score":0.451454758644104},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.4391283392906189},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.4270109534263611},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4222133457660675},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.36502599716186523},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.16841331124305725}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8362252712249756},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.699648380279541},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.6095706820487976},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5952407121658325},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.5580791234970093},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5428590178489685},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5413280725479126},{"id":"https://openalex.org/C34974158","wikidata":"https://www.wikidata.org/wiki/Q131257","display_name":"Intellectual property","level":2,"score":0.5378161668777466},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.451454758644104},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.4391283392906189},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.4270109534263611},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4222133457660675},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.36502599716186523},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.16841331124305725},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C19417346","wikidata":"https://www.wikidata.org/wiki/Q7922","display_name":"Pedagogy","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3651671.3651710","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3651671.3651710","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 16th International Conference on Machine Learning and Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2787075213","https://openalex.org/W2964162474","https://openalex.org/W2967862025","https://openalex.org/W3087931608","https://openalex.org/W3105676597","https://openalex.org/W3158675315","https://openalex.org/W3168768313","https://openalex.org/W3185271965","https://openalex.org/W3204946808","https://openalex.org/W3215453688","https://openalex.org/W4205721253","https://openalex.org/W4387331442","https://openalex.org/W6771536673","https://openalex.org/W6797362055"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"In":[0],"the":[1,34,47,73,146],"era":[2],"of":[3,36,49,87],"big":[4],"data,":[5,20],"federated":[6],"learning":[7],"(FL)":[8],"emerges":[9],"as":[10],"a":[11,66,80,119,137],"solution":[12],"to":[13,24,46,83,180],"train":[14],"models":[15,25],"collectively":[16],"without":[17],"exposing":[18],"individual":[19],"maintaining":[21,162],"similar":[22],"accuracy":[23],"trained":[26],"on":[27,128],"shared":[28],"datasets.":[29],"However,":[30],"challenges":[31,71],"arise":[32],"with":[33],"advent":[35],"privacy":[37,48],"inference":[38],"attacks":[39],"and":[40,90,140,149,168],"model":[41,115,132,164],"theft,":[42],"posing":[43],"significant":[44],"threats":[45],"FL":[50,74,88],"models,":[51,111],"especially":[52],"regarding":[53],"intellectual":[54],"property":[55],"(IP)":[56],"protection.":[57],"This":[58],"paper":[59],"introduces":[60],"FedMCT":[61,77],"(Federated":[62],"Malicious":[63],"Client":[64],"Tracking),":[65],"novel":[67],"framework":[68,78],"addressing":[69],"these":[70],"in":[72,97,106,161],"context.":[75],"The":[76],"is":[79],"new":[81],"approach":[82],"protect":[84,114],"IP":[85],"rights":[86],"clients":[89,126],"track":[91],"cheaters,":[92],"which":[93,144],"can":[94,113],"improve":[95],"efficiency":[96,178],"resource-heterogeneous":[98],"environments.":[99],"By":[100],"embedding":[101],"unique":[102],"watermarks":[103],"or":[104],"fingerprints":[105],"Deep":[107],"Neural":[108],"Network":[109],"(DNN)":[110],"we":[112],"IP.":[116],"We":[117,134],"employ":[118],"configuration":[120],"round":[121],"before":[122],"watermark":[123,166],"embedding,":[124],"segmenting":[125],"based":[127],"performance":[129],"for":[130],"tiered":[131,138],"watermarking.":[133],"also":[135],"propose":[136],"watermarking":[139],"traitor":[141,152,176],"tracking":[142,147,153],"mechanism,":[143],"reduces":[145],"time":[148],"ensures":[150],"high":[151],"efficiency.":[154],"Extensive":[155],"experiments":[156],"validate":[157],"our":[158],"solution\u2019s":[159],"efficacy":[160],"original":[163],"performance,":[165],"privacy,":[167],"detectability,":[169],"robust":[170],"against":[171],"various":[172],"attacks,":[173],"demonstrating":[174],"superior":[175],"tracing":[177],"compared":[179],"existing":[181],"frameworks.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
