{"id":"https://openalex.org/W6910371358","doi":"https://doi.org/10.4233/uuid:b226b59e-c7b8-45f9-bd71-8f2b4d0d7b55","title":"Secure and resilient federated learning","display_name":"Secure and resilient federated learning","publication_year":2024,"publication_date":"2024-05-16","ids":{"openalex":"https://openalex.org/W6910371358","doi":"https://doi.org/10.4233/uuid:b226b59e-c7b8-45f9-bd71-8f2b4d0d7b55"},"language":"en","primary_location":{"id":"pmh:oai:tudelft.nl:uuid:b226b59e-c7b8-45f9-bd71-8f2b4d0d7b55","is_oa":false,"landing_page_url":"http://resolver.tudelft.nl/uuid:b226b59e-c7b8-45f9-bd71-8f2b4d0d7b55","pdf_url":null,"source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"doctoral thesis"},"type":"dissertation","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.4233/uuid:b226b59e-c7b8-45f9-bd71-8f2b4d0d7b55","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Wang, R.","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wang, R.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.955299973487854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.955299973487854,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.0044999998062849045,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.0026000000070780516,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.2775999903678894},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.243599995970726},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.24210000038146973},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.2401999980211258},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.23510000109672546}],"concepts":[{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.2775999903678894},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.243599995970726},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.24210000038146973},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.2401999980211258},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.23510000109672546},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23029999434947968},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.21539999544620514},{"id":"https://openalex.org/C2777158700","wikidata":"https://www.wikidata.org/wiki/Q1419356","display_name":"Hyporeflexia","level":3,"score":0.2117999941110611},{"id":"https://openalex.org/C147494362","wikidata":"https://www.wikidata.org/wiki/Q2078905","display_name":"Troubleshooting","level":2,"score":0.2020999938249588},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.19949999451637268}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:tudelft.nl:uuid:b226b59e-c7b8-45f9-bd71-8f2b4d0d7b55","is_oa":false,"landing_page_url":"http://resolver.tudelft.nl/uuid:b226b59e-c7b8-45f9-bd71-8f2b4d0d7b55","pdf_url":null,"source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"doctoral thesis"},{"id":"doi:10.4233/uuid:b226b59e-c7b8-45f9-bd71-8f2b4d0d7b55","is_oa":true,"landing_page_url":"https://doi.org/10.4233/uuid:b226b59e-c7b8-45f9-bd71-8f2b4d0d7b55","pdf_url":null,"source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"thesis"}],"best_oa_location":{"id":"doi:10.4233/uuid:b226b59e-c7b8-45f9-bd71-8f2b4d0d7b55","is_oa":true,"landing_page_url":"https://doi.org/10.4233/uuid:b226b59e-c7b8-45f9-bd71-8f2b4d0d7b55","pdf_url":null,"source":{"id":"https://openalex.org/S4306400906","display_name":"Research Repository (Delft University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98358874","host_organization_name":"Delft University of Technology","host_organization_lineage":["https://openalex.org/I98358874"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"thesis"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"is":[3,280],"a":[4,96,161,177,184,234,266],"revolutionary":[5],"approach":[6],"to":[7,70,98,136,292,298],"machine":[8],"learning":[9,260],"that":[10,198],"enables":[11],"collaborative":[12],"model":[13,81,99],"training":[14,139],"among":[15],"multiple":[16],"parties":[17],"without":[18],"exposing":[19],"sensitive":[20,75],"data.":[21],"Introduced":[22],"by":[23,35],"Google":[24],"in":[25,141,250],"2016,":[26],"FL":[27,60,128,135,192,232,248,284,310],"taps":[28],"into":[29,285],"the":[30,55,71,78,121,131,142,152,222,228,259,263,303,306],"wealth":[31],"of":[32,57,73,80,123,134,144,224,231,244,269,309],"data":[33],"generated":[34],"edge":[36],"devices":[37],"while":[38],"prioritizing":[39],"user":[40],"privacy":[41,67],"and":[42,54,126,129,172,180,296],"minimizing":[43],"communication":[44,175],"costs.":[45],"Its":[46],"applications":[47],"span":[48],"diverse":[49,312],"sectors":[50],"like":[51],"healthcare,":[52],"finance,":[53],"Internet":[56],"Things.":[58],"While":[59],"offers":[61],"significant":[62,185],"benefits,":[63],"it":[64],"grapples":[65],"with":[66,252],"concerns":[68],"due":[69],"risk":[72],"revealing":[74],"information":[76],"during":[77],"exchange":[79],"updates.":[82],"Security":[83],"issues":[84,279],"also":[85],"arise,":[86],"as":[87],"some":[88],"clients":[89,256,270],"may":[90,257],"behave":[91],"unpredictably":[92],"or":[93,101],"maliciously,":[94],"posing":[95],"threat":[97],"accuracy":[100],"introducing":[102],"vulnerabilities.":[103],"Although":[104],"various":[105],"efforts":[106],"have":[107],"tackled":[108],"these":[109,276,300],"challenges,":[110,194,301],"new":[111],"technical":[112],"hurdles":[113],"persist,":[114],"requiring":[115],"innovative":[116,294],"solutions.":[117],"This":[118,289],"thesis":[119,153,290],"explores":[120],"practicality":[122],"privacy-preserving":[124,149],"horizontal":[125,150],"vertical":[127,191],"enhances":[130],"Byzantine":[132,229],"robustness":[133,230],"ensure":[137],"effective":[138],"even":[140],"presence":[143],"malicious":[145,267],"clients.":[146,245],"In":[147,208,246,273],"investigating":[148],"FL,":[151],"uncovers":[154],"practical":[155],"issues.":[156],"Encryption-based":[157],"solutions,":[158],"reliant":[159],"on":[160,188],"Trusted":[162],"Third":[163],"Party":[164],"(TTP)":[165],"for":[166,205,265,282,305],"key":[167],"distribution,":[168],"involve":[169],"frequent,":[170],"costly,":[171],"potentially":[173],"unreliable":[174],"between":[176],"central":[178],"server":[179],"distributed":[181],"clients,":[182],"placing":[183],"computational":[186],"burden":[187],"FL.":[189],"Privacy-preserving":[190],"faces":[193],"particularly":[195],"when":[196],"assuming":[197],"only":[199],"one":[200],"client":[201],"possesses":[202],"all":[203,206],"labels":[204],"samples.":[207],"real-world":[209],"healthcare":[210],"scenarios,":[211],"where":[212,255],"diagnoses":[213],"are":[214],"spread":[215],"across":[216,311],"different":[217],"hospitals,":[218],"label":[219],"inconsistencies":[220],"question":[221],"feasibility":[223],"this":[225],"assumption.":[226],"Addressing":[227],"raises":[233],"critical":[235],"consideration":[236],"many":[237],"existing":[238],"systems":[239],"assume":[240],"an":[241],"honest":[242],"majority":[243,268],"reality,":[247],"operates":[249],"environments":[251],"competing":[253],"interests,":[254],"manipulate":[258],"process.":[261],"Recognizing":[262],"potential":[264],"becomes":[271],"crucial.":[272],"essence,":[274],"resolving":[275],"three":[277],"core":[278],"essential":[281],"integrating":[283],"real":[286],"world":[287],"scenarios.":[288],"aims":[291],"contribute":[293],"methods":[295],"tools":[297],"overcome":[299],"paving":[302],"way":[304],"widespread":[307],"adoption":[308],"domains.":[313]},"counts_by_year":[],"updated_date":"2026-02-09T09:26:11.010843","created_date":"2025-10-10T00:00:00"}
