{"id":"https://openalex.org/W7128073419","doi":"https://doi.org/10.48550/arxiv.2602.05410","title":"Robust Federated Learning via Byzantine Filtering over Encrypted Updates","display_name":"Robust Federated Learning via Byzantine Filtering over Encrypted Updates","publication_year":2026,"publication_date":"2026-02-05","ids":{"openalex":"https://openalex.org/W7128073419","doi":"https://doi.org/10.48550/arxiv.2602.05410"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2602.05410","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.05410","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2602.05410","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071072753","display_name":"Adda Akram Bendoukha","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bendoukha, Adda Akram","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086710605","display_name":"Aymen Boudguiga","orcid":"https://orcid.org/0000-0001-6717-8848"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Boudguiga, Aymen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125179904","display_name":"Nesrine Kaaniche","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kaaniche, Nesrine","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125165198","display_name":"Renaud Sirdey","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sirdey, Renaud","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5125201356","display_name":"Didem Demirag","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Demirag, Didem","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5063954211","display_name":"Ty B. Palmer","orcid":"https://orcid.org/0000-0002-3811-4092"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Gambs, S\u00e9bastien","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5071072753"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.007199999876320362,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.002899999963119626,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.6140999794006348},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5135999917984009},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.48429998755455017},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4185999929904938},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.40950000286102295},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.37599998712539673},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.3662000000476837},{"id":"https://openalex.org/keywords/collaborative-filtering","display_name":"Collaborative filtering","score":0.335099995136261},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.289900004863739}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7879999876022339},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.6140999794006348},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5135999917984009},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48429998755455017},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4185999929904938},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.40950000286102295},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.37599998712539673},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3686000108718872},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.3662000000476837},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34049999713897705},{"id":"https://openalex.org/C21569690","wikidata":"https://www.wikidata.org/wiki/Q94702","display_name":"Collaborative filtering","level":3,"score":0.335099995136261},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3181999921798706},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2921999990940094},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.289900004863739},{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.28929999470710754},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.2888000011444092},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.2791999876499176},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2750000059604645},{"id":"https://openalex.org/C207609745","wikidata":"https://www.wikidata.org/wiki/Q4944086","display_name":"Bootstrapping (finance)","level":2,"score":0.274399995803833},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2639000117778778},{"id":"https://openalex.org/C551386961","wikidata":"https://www.wikidata.org/wiki/Q22666","display_name":"File sharing","level":3,"score":0.2612999975681305},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.2578999996185303},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.25780001282691956},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C17532199","wikidata":"https://www.wikidata.org/wiki/Q17083590","display_name":"Quantum Byzantine agreement","level":4,"score":0.25529998540878296},{"id":"https://openalex.org/C127705205","wikidata":"https://www.wikidata.org/wiki/Q5748245","display_name":"Heuristics","level":2,"score":0.25380000472068787},{"id":"https://openalex.org/C2780512708","wikidata":"https://www.wikidata.org/wiki/Q850661","display_name":"XQuery","level":4,"score":0.2533000111579895},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2602.05410","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.05410","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2602.05410","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2602.05410","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"aims":[3],"to":[4,34,71,133,158,222,228],"train":[5,99],"a":[6,76,100,110],"collaborative":[7],"model":[8,213],"while":[9],"preserving":[10],"data":[11,32],"privacy.":[12],"However,":[13],"the":[14,28,38,44,94,135,149,153,166,175,184,207],"distributed":[15],"nature":[16],"of":[17,30,40,102,113,127,177,209],"this":[18,67],"approach":[19,78,179],"still":[20],"raises":[21],"privacy":[22],"and":[23,37,53,122,152,163,188,200,215,225],"security":[24],"issues,":[25],"such":[26],"as":[27,58],"exposure":[29],"sensitive":[31],"due":[33],"inference":[35,217],"attacks":[36,96],"influence":[39],"Byzantine":[41,54,90,114,136,181,204],"behaviors":[42],"on":[43,105,183],"trained":[45],"model.":[46],"In":[47,66],"particular,":[48],"achieving":[49],"both":[50],"secure":[51],"aggregation":[52,85,161],"resilience":[55],"remains":[56],"challenging,":[57],"existing":[59],"solutions":[60],"often":[61],"address":[62,72],"these":[63,73,128],"aspects":[64],"independently.":[65],"work,":[68],"we":[69,98,142,170],"propose":[70,143],"challenges":[74],"through":[75,172],"novel":[77],"that":[79],"combines":[80],"homomorphic":[81,159],"encryption":[82],"for":[83,89,147,202,231],"privacy-preserving":[84],"with":[86,156],"property-inference-inspired":[87],"meta-classifiers":[88,104,129],"filtering.":[91],"First,":[92],"following":[93],"property-inference":[95],"blueprint,":[97],"set":[101],"filtering":[103,195],"labeled":[106],"shadow":[107],"updates,":[108],"reproducing":[109],"diverse":[111],"ensemble":[112],"misbehaviors":[115],"in":[116,212],"FL,":[117],"including":[118],"backdoor,":[119],"gradient-inversion,":[120],"label-flipping":[121],"shuffling":[123],"attacks.":[124],"The":[125],"outputs":[126],"are":[130],"then":[131],"used":[132],"cancel":[134],"encrypted":[137,216],"updates":[138,205],"by":[139],"reweighting.":[140],"Second,":[141],"an":[144,232],"automated":[145],"method":[146],"selecting":[148],"optimal":[150],"kernel":[151],"dimensionality":[154],"hyperparameters":[155],"respect":[157],"inference,":[160],"constraints":[162],"efficiency":[164],"over":[165],"CKKS":[167],"cryptosystem.":[168],"Finally,":[169],"demonstrate":[171],"extensive":[173],"experiments":[174],"effectiveness":[176],"our":[178,193],"against":[180],"participants":[182],"FEMNIST,":[185],"CIFAR10,":[186],"GTSRB,":[187],"acsincome":[189],"benchmarks.":[190],"More":[191],"precisely,":[192],"SVM":[194],"achieves":[196],"accuracies":[197],"between":[198],"$90$%":[199],"$94$%":[201],"identifying":[203],"at":[206],"cost":[208],"marginal":[210],"losses":[211],"utility":[214],"runtimes":[218],"ranging":[219],"from":[220,226],"$6$":[221],"$24$":[223],"seconds":[224,230],"$9$":[227],"$26$":[229],"overall":[233],"aggregation.":[234]},"counts_by_year":[],"updated_date":"2026-02-07T06:15:42.627816","created_date":"2026-02-07T00:00:00"}
