{"id":"https://openalex.org/W2921000198","doi":"https://doi.org/10.5220/0007571705440551","title":"Machine Learning for All: A More Robust Federated Learning Framework","display_name":"Machine Learning for All: A More Robust Federated Learning Framework","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2921000198","doi":"https://doi.org/10.5220/0007571705440551","mag":"2921000198"},"language":"en","primary_location":{"id":"doi:10.5220/0007571705440551","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007571705440551","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0007571705440551","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5097494687","display_name":"Chamatidis Ilias","orcid":null},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Chamatidis Ilias","raw_affiliation_strings":["Department of Computer Science and Biomedical Informatics, University of Thessaly and Greece, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Biomedical Informatics, University of Thessaly and Greece, --- Select a Country ---","institution_ids":["https://openalex.org/I145722265"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112421961","display_name":"Spathoulas Georgios","orcid":null},"institutions":[{"id":"https://openalex.org/I145722265","display_name":"University of Thessaly","ror":"https://ror.org/04v4g9h31","country_code":"GR","type":"education","lineage":["https://openalex.org/I145722265"]},{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["GR","NO"],"is_corresponding":false,"raw_author_name":"Spathoulas Georgios","raw_affiliation_strings":["Department of Computer Science and Biomedical Informatics, University of Thessaly, Greece, Center for Cyber and Information Security, Norwegian University of Science and Technology, Gjovik and Norway, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Biomedical Informatics, University of Thessaly, Greece, Center for Cyber and Information Security, Norwegian University of Science and Technology, Gjovik and Norway, --- Select a Country ---","institution_ids":["https://openalex.org/I145722265","https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5097494687"],"corresponding_institution_ids":["https://openalex.org/I145722265"],"apc_list":null,"apc_paid":null,"fwci":1.5913,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.87481852,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.785019040107727},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5353620052337646},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.49467965960502625}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.785019040107727},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5353620052337646},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.49467965960502625}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0007571705440551","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007571705440551","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:ir.lib.uth.gr:11615/74019","is_oa":false,"landing_page_url":"http://hdl.handle.net/11615/74019","pdf_url":null,"source":{"id":"https://openalex.org/S4306400243","display_name":"University of Thessaly Institutional Repository (University of Thessaly)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145722265","host_organization_name":"University of Thessaly","host_organization_lineage":["https://openalex.org/I145722265"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"conferenceItem"}],"best_oa_location":{"id":"doi:10.5220/0007571705440551","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0007571705440551","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W60927318","https://openalex.org/W2091432990","https://openalex.org/W2117130368","https://openalex.org/W2150341604","https://openalex.org/W2311607323","https://openalex.org/W2591882872","https://openalex.org/W2620512600","https://openalex.org/W2630997112","https://openalex.org/W2771532190","https://openalex.org/W2788246026"],"related_works":["https://openalex.org/W2961085424","https://openalex.org/W4306674287","https://openalex.org/W3046775127","https://openalex.org/W3107602296","https://openalex.org/W3170094116","https://openalex.org/W4386462264","https://openalex.org/W4364306694","https://openalex.org/W4312192474","https://openalex.org/W4283697347","https://openalex.org/W4210805261"],"abstract_inverted_index":{"Machine":[0],"learning":[1,5,28,90,104],"and":[2,23,44,94,148,176,186],"especially":[3],"deep":[4],"are":[6,129],"appropriate":[7],"for":[8,169],"solving":[9],"multiple":[10,38],"problems":[11],"in":[12,120,173],"various":[13],"domains.":[14],"Training":[15],"such":[16],"models":[17],"though,":[18],"demands":[19],"significant":[20,62],"processing":[21,63,115],"power":[22,64,116],"requires":[24],"large":[25],"data-sets.":[26],"Federated":[27],"is":[29,71,106,140],"an":[30],"approach":[31],"that":[32,88],"merely":[33],"solves":[34],"these":[35],"problems,":[36],"as":[37,76,142],"users":[39,170],"constitute":[40],"a":[41,50,100],"distributed":[42],"network":[43,57],"each":[45],"one":[46],"of":[47],"them":[48],"trains":[49],"model":[51,133],"locally":[52],"with":[53],"his":[54],"data.":[55,137],"This":[56],"can":[58],"cumulatively":[59],"sum":[60],"up":[61],"to":[65,73,122,131,171,177],"conduct":[66],"training":[67,134],"efficiently,":[68],"while":[69,156],"it":[70,84],"easier":[72],"preserve":[74],"privacy,":[75],"data":[77,111],"does":[78],"not":[79],"leave":[80],"its":[81],"owner.":[82],"Nevertheless,":[83],"has":[85],"been":[86],"proven":[87],"federated":[89,103],"also":[91],"faces":[92],"privacy":[93],"integrity":[95],"issues.":[96],"In":[97],"this":[98],"paper":[99],"general":[101],"enhanced":[102],"framework":[105],"presented.":[107],"Users":[108],"may":[109],"provide":[110,165],"or":[112,117],"the":[113,146,149,158,166,174],"required":[114,167],"participate":[118,172],"just":[119],"order":[121],"train":[123],"their":[124],"models.":[125],"Homomorphic":[126],"encryption":[127],"algorithms":[128],"employed":[130],"enable":[132],"on":[135],"encrypted":[136],"Blockchain":[138],"technology":[139],"used":[141],"smart":[143],"contracts":[144],"coordinate":[145],"work-flow":[147],"commitments":[150],"made":[151],"between":[152,163],"all":[153],"participating":[154],"nodes,":[155],"at":[157],"same":[159],"time,":[160],"tokens":[161],"exchanges":[162],"nodes":[164],"incentives":[168],"scheme":[175],"act":[178],"legitimately.":[179],"\u00a9":[180],"2019":[181],"by":[182],"SCITEPRESS":[183],"-":[184],"Science":[185],"Technology":[187],"Publications,":[188],"Lda.":[189]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
