{"id":"https://openalex.org/W7110783303","doi":"https://doi.org/10.48550/arxiv.2512.06467","title":"Formalisation of Security for Federated Learning with DP and Attacker Advantage in IIIf for Satellite Swarms -- Extended Version","display_name":"Formalisation of Security for Federated Learning with DP and Attacker Advantage in IIIf for Satellite Swarms -- Extended Version","publication_year":2025,"publication_date":"2025-12-06","ids":{"openalex":"https://openalex.org/W7110783303","doi":"https://doi.org/10.48550/arxiv.2512.06467"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2512.06467","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.06467","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2512.06467","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Kamm\u00fcller, Florian","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kamm\u00fcller, Florian","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.5117999911308289,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.5117999911308289,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.04690000042319298,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.0421999990940094,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.7628999948501587},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6650999784469604},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.4291999936103821},{"id":"https://openalex.org/keywords/distributed-learning","display_name":"Distributed learning","score":0.3952000141143799},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3549000024795532},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3434999883174896},{"id":"https://openalex.org/keywords/satellite","display_name":"Satellite","score":0.3357999920845032},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.33250001072883606}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8274999856948853},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.7628999948501587},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6650999784469604},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44850000739097595},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.4291999936103821},{"id":"https://openalex.org/C2779582901","wikidata":"https://www.wikidata.org/wiki/Q21013010","display_name":"Distributed learning","level":2,"score":0.3952000141143799},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3930000066757202},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3549000024795532},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34369999170303345},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3434999883174896},{"id":"https://openalex.org/C19269812","wikidata":"https://www.wikidata.org/wiki/Q26540","display_name":"Satellite","level":2,"score":0.3357999920845032},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.33250001072883606},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32100000977516174},{"id":"https://openalex.org/C2985583900","wikidata":"https://www.wikidata.org/wiki/Q722617","display_name":"Formal description","level":2,"score":0.29120001196861267},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.29010000824928284},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.28999999165534973},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.2883000075817108},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2791000008583069},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2761000096797943},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.26919999718666077},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.2612999975681305},{"id":"https://openalex.org/C94461902","wikidata":"https://www.wikidata.org/wiki/Q2762418","display_name":"Formal proof","level":3,"score":0.25859999656677246},{"id":"https://openalex.org/C2780821482","wikidata":"https://www.wikidata.org/wiki/Q25381721","display_name":"Crowdsensing","level":2,"score":0.2531000077724457}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2512.06467","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.06467","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2512.06467","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.06467","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.673668384552002}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0,89],"distributed":[1,107],"applications,":[2],"like":[3],"swarms":[4],"of":[5,43,81,86,101,116,138],"satellites,":[6],"machine":[7,135],"learning":[8,27],"can":[9],"be":[10],"efficiently":[11],"applied":[12],"even":[13],"on":[14,72,97],"small":[15],"devices":[16],"by":[17,29],"using":[18],"Federated":[19,105],"Learning":[20,106],"(FL).":[21],"This":[22,120],"allows":[23],"to":[24,33,113],"reduce":[25],"the":[26,34,38,41,90,114,117,126,134,143],"complexity":[28],"transmitting":[30],"only":[31],"updates":[32],"general":[35],"model":[36],"in":[37,40,45],"server":[39],"form":[42],"differences":[44],"stochastic":[46],"gradient":[47],"descent.":[48],"FL":[49],"naturally":[50],"supports":[51],"differential":[52],"privacy":[53],"but":[54,76,157],"new":[55],"attacks,":[56],"so":[57],"called":[58],"Data":[59],"Leakage":[60],"from":[61],"Gradient":[62],"(DLG)":[63],"have":[64],"been":[65,70],"discovered":[66],"recently.":[67],"There":[68],"has":[69],"work":[71,96],"defenses":[73],"against":[74],"DLG":[75],"there":[77],"is":[78,122],"a":[79,98,153,160],"lack":[80],"foundation":[82],"and":[83,110,129,140],"rigorous":[84],"evaluation":[85],"their":[87],"security.":[88],"current":[91],"work,":[92],"we":[93],"extend":[94],"existing":[95],"formal":[99],"notion":[100,115],"Differential":[102],"Privacy":[103],"for":[104],"dynamic":[108],"systems":[109,149],"relate":[111],"it":[112],"attacker":[118],"advantage.":[119],"formalisation":[121],"carried":[123],"out":[124],"within":[125,142],"Isabelle":[127],"Insider":[128],"Infrastructure":[130],"framework":[131],"(IIIf)":[132],"allowing":[133],"supported":[136],"verification":[137],"theory":[139],"applications":[141],"proof":[144],"assistant":[145],"Isabelle.":[146],"Satellite":[147],"swarm":[148],"are":[150],"used":[151],"as":[152,159],"motivating":[154],"use":[155],"case":[156,162],"also":[158],"validation":[161],"study.":[163]},"counts_by_year":[],"updated_date":"2025-12-10T02:49:46.989445","created_date":"2025-12-10T00:00:00"}
