{"id":"https://openalex.org/W4407938167","doi":"https://doi.org/10.5220/0013237500003899","title":"An Alternative Approach to Federated Learning for Model Security and Data Privacy","display_name":"An Alternative Approach to Federated Learning for Model Security and Data Privacy","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4407938167","doi":"https://doi.org/10.5220/0013237500003899"},"language":"en","primary_location":{"id":"doi:10.5220/0013237500003899","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0013237500003899","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0013237500003899","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061774356","display_name":"William Briguglio","orcid":"https://orcid.org/0000-0002-2357-3966"},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"William Briguglio","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada","institution_ids":["https://openalex.org/I212119943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005433757","display_name":"Waleed A. Yousef","orcid":"https://orcid.org/0000-0001-9669-7241"},"institutions":[{"id":"https://openalex.org/I84058292","display_name":"Helwan University","ror":"https://ror.org/00h55v928","country_code":"EG","type":"education","lineage":["https://openalex.org/I84058292"]},{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA","EG"],"is_corresponding":false,"raw_author_name":"Waleed Yousef","raw_affiliation_strings":["Department of CS, HCILab, Helwan University, Cairo, Egypt","Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada"],"affiliations":[{"raw_affiliation_string":"Department of CS, HCILab, Helwan University, Cairo, Egypt","institution_ids":["https://openalex.org/I84058292"]},{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada","institution_ids":["https://openalex.org/I212119943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041277719","display_name":"Issa Traor\u00e9","orcid":"https://orcid.org/0000-0003-2987-8047"},"institutions":[{"id":"https://openalex.org/I212119943","display_name":"University of Victoria","ror":"https://ror.org/04s5mat29","country_code":"CA","type":"education","lineage":["https://openalex.org/I212119943"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Issa Traor\u00e9","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, Canada","institution_ids":["https://openalex.org/I212119943"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056921549","display_name":"Mohammad Mamun","orcid":"https://orcid.org/0000-0002-4045-8687"},"institutions":[{"id":"https://openalex.org/I4210098097","display_name":"Research and Productivity Council","ror":"https://ror.org/00yeap462","country_code":"CA","type":"government","lineage":["https://openalex.org/I4210098097"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Mohammad Mamun","raw_affiliation_strings":["National Research Council of Canada, Fredericton, NB, Canada"],"affiliations":[{"raw_affiliation_string":"National Research Council of Canada, Fredericton, NB, Canada","institution_ids":["https://openalex.org/I4210098097"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059820577","display_name":"Sherif Saad","orcid":"https://orcid.org/0000-0002-5506-5261"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Sherif Saad","raw_affiliation_strings":["Department of Computer Science, University of Windsor, Windsor, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Windsor, Windsor, ON, Canada","institution_ids":["https://openalex.org/I74413500"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5061774356"],"corresponding_institution_ids":["https://openalex.org/I212119943"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01386328,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"291","last_page":"301"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.75253826379776},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5543286204338074},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.533382773399353},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.48745250701904297},{"id":"https://openalex.org/keywords/data-modeling","display_name":"Data modeling","score":0.44598662853240967},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.4148520827293396},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.1325315535068512},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1055869460105896}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.75253826379776},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5543286204338074},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.533382773399353},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.48745250701904297},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.44598662853240967},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.4148520827293396},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.1325315535068512},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1055869460105896}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0013237500003899","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0013237500003899","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:cisti-icist.nrc-cnrc.ca:cistinparc:96f2e1e2-a1f9-4247-8497-7ab80a91fe20","is_oa":true,"landing_page_url":"https://nrc-publications.canada.ca/eng/view/object/?id=96f2e1e2-a1f9-4247-8497-7ab80a91fe20","pdf_url":"https://nrc-publications.canada.ca/eng/view/accepted/?id=96f2e1e2-a1f9-4247-8497-7ab80a91fe20","source":{"id":"https://openalex.org/S7407055245","display_name":"NPARC","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.5220/0013237500003899","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0013237500003899","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W2905822832","https://openalex.org/W2240244939"],"abstract_inverted_index":{"Federated":[0],"learning":[1,5,61],"(FL)":[2],"enables":[3],"machine":[4],"on":[6],"data":[7,24,39,90,166],"held":[8],"across":[9],"multiple":[10],"clients":[11],"without":[12,129],"exchanging":[13,17],"private":[14],"data.":[15],"However,":[16],"information":[18],"for":[19,59],"model":[20,36,108,128,155],"training":[21,79],"can":[22,32,121],"compromise":[23],"privacy.":[25],"Further,":[26],"participants":[27],"may":[28],"be":[29,110],"untrustworthy":[30],"and":[31,44,91,96,147,150],"attempt":[33],"to":[34,81,93,109,112,141,154],"sabotage":[35],"performance.":[37],"Also,":[38],"that":[40,161],"is":[41],"not":[42,101],"independently":[43],"identically":[45],"distributed":[46,111],"(IID)":[47],"impede":[48],"the":[49,106,118,126,130],"convergence":[50],"of":[51,72,105,125,132],"FL":[52,143],"techniques.":[53],"We":[54,137],"present":[55],"a":[56,103],"general":[57],"framework":[58],"federated":[60],"via":[62],"aggregating":[63,119],"multivariate":[64],"estimated":[65],"densities":[66],"(FLAMED).":[67],"FLAMED":[68,99,162],"aggregates":[69],"density":[70],"estimations":[71],"clients\u2019":[73],"data,":[74],"from":[75,88],"which":[76],"it":[77],"simulates":[78],"datasets":[80,149],"perform":[82],"centralized":[83],"learning,":[84],"bypassing":[85],"problems":[86],"arising":[87],"non-IID":[89,165],"contributing":[92],"addressing":[94],"privacy":[95],"security":[97],"concerns.":[98],"does":[100],"require":[102],"copy":[104],"global":[107,127],"each":[113],"participant":[114],"during":[115],"training,":[116],"meaning":[117],"server":[120],"retain":[122],"sole":[123],"proprietorship":[124],"use":[131],"resource-intensive":[133],"homomorphic":[134],"encrypti":[135],"on.":[136],"compared":[138],"its":[139,152],"performance":[140],"standard":[142],"approaches":[144],"using":[145],"synthetic":[146],"real":[148],"evaluated":[151],"resilience":[153],"poisoning":[156],"attacks.":[157],"Our":[158],"results":[159],"indicate":[160],"effectively":[163],"handles":[164],"in":[167],"many":[168],"settings":[169],"while":[170],"also":[171],"being":[172],"more":[173],"secure.":[174]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
