{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T01:40:27Z","timestamp":1726105227562},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811592126"},{"type":"electronic","value":"9789811592133"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9213-3_42","type":"book-chapter","created":{"date-parts":[[2020,11,11]],"date-time":"2020-11-11T08:03:23Z","timestamp":1605081803000},"page":"549-564","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Blockchain-Based Distributed Machine Learning Towards Statistical Challenges"],"prefix":"10.1007","author":[{"given":"Mei","family":"Li","sequence":"first","affiliation":[]},{"given":"Qigang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wanlu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,12]]},"reference":[{"key":"42_CR1","unstructured":"Abadi, M., et al.: Tensorflow: a system for large-scale machine learning. In: USENIX Symposium on Operating Systems Design and Implementation (OSDI), pp. 265\u2013283 (2016)"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Abadi, M., Chu, A., et al.: Deep learning with differential privacy. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the 30th EuroSys Conference, pp. 1\u201315 (2018)","DOI":"10.1145\/3190508.3190538"},{"issue":"4","key":"42_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3320060","volume":"52","author":"T Ben-Nun","year":"2019","unstructured":"Ben-Nun, T., Hoefler, T.: Demystifying parallel and distributed deep learning: an in-depth concurrency analysis. ACM Comput. Surv. (CSUR) 52(4), 1\u201343 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"42_CR5","unstructured":"Bonawitz, K., Eichner, H., et al.: Towards federated learning at scale: system design. In: Proceedings of the Conference on Systems and Machine Learning (SysML) (2019)"},{"issue":"2","key":"42_CR6","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1137\/16M1080173","volume":"60","author":"L Bottou","year":"2018","unstructured":"Bottou, L., Curtis, F.E., Nocedal, J.: Optimization methods for large-scale machine learning. Siam Rev. 60(2), 223\u2013311 (2018)","journal-title":"Siam Rev."},{"key":"42_CR7","doi-asserted-by":"crossref","unstructured":"Casino, F., Dasaklis, T.K., Patsakis, C.: A systematic literature review of blockchain-based applications: current status, classification and open issues. Telemat. Inf. 36, 55\u201381 (2019)","DOI":"10.1016\/j.tele.2018.11.006"},{"key":"42_CR8","unstructured":"Chilimbi, T., Suzue, Y., Apacible, J., Kalyanaraman, K.: Project adam: building an efficient and scalable deep learning training system. In: Proceedings of OSDI 2014, pp. 571\u2013582 (2014)"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41th Annual ACM Symposium on Theory of Computing (STOC), pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"He, K., Zhang, X., Ren, S., et al.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770\u2013778 (2016)","DOI":"10.1109\/CVPR.2016.90"},{"key":"42_CR11","unstructured":"Huang, L., Yin, Y., Fu, Z., Zhang, S., Deng, H., Liu, D.: Loadaboost: loss-based adaboost federated machine learning on medical data. arXiv preprint arXiv:1811.12629 (2018)"},{"key":"42_CR12","unstructured":"Krizhevsky, A., Hinton, G.: Learning Multiple Layers of Features from Tiny Images (2009)"},{"issue":"7553","key":"42_CR13","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1038\/nature14539","volume":"521","author":"Y LeCun","year":"2015","unstructured":"LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521(7553), 436\u2013444 (2015)","journal-title":"Nature"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., et al.: Gradient-based learning applied to document recognition. In: Proceedings of the IEEE, pp. 2278\u20132324 (1998)","DOI":"10.1109\/5.726791"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Liu, T.Y., et al.: Distributed machine learning: foundations, trends, and practices. In: 26th International Conference on World Wide Web Companion (WWW), pp. 913\u2013915 (2017)","DOI":"10.1145\/3041021.3051099"},{"key":"42_CR16","unstructured":"McMahan, B., Moore, E., et al.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics (AISTATS), pp. 1273\u20131282 (2017)"},{"key":"42_CR17","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)"},{"issue":"5","key":"42_CR18","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TIFS.2017.2787987","volume":"13","author":"LT Phong","year":"2018","unstructured":"Phong, L.T., et al.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forens. Secur. 13(5), 1333\u20131345 (2018)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"42_CR19","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1310\u20131321 (2015)","DOI":"10.1145\/2810103.2813687"},{"key":"42_CR20","unstructured":"Smith, V., Chiang, C.K., Sanjabi, M., Talwalkar, A.S.: Federated multi-task learning. In: Advances in Neural Information Processing Systems (NeurIPS), pp. 4424\u20134434 (2017)"},{"key":"42_CR21","unstructured":"Wang, Q., et al.: BDML: blockchain-based distributed machine learning for model training and evolution. In: Symposium on Foundations and Applications of Blockchain (FAB) (2019)"},{"key":"42_CR22","doi-asserted-by":"crossref","unstructured":"Weng, J., et\u00a0al.: Deepchain: auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Trans. Dependable Secur. Comput. PP(99), 1 (2019)","DOI":"10.1109\/TDSC.2019.2952332"},{"issue":"2","key":"42_CR23","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang, Q., Liu, Y., Chen, T., et al.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. 10(2), 12 (2019)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"42_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, W., Wang, Q., Li, M.: Medical image collaborative training based on multi-blockchain. In: International Conference on Bioinformatics and Biomedicine (BIBM) (2019)","DOI":"10.1109\/BIBM47256.2019.8983348"},{"key":"42_CR25","unstructured":"Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., Chandra, V.: Federated learning with non-IID data. arXiv preprint arXiv:1806.00582 (2018)"},{"key":"42_CR26","doi-asserted-by":"crossref","unstructured":"Zhu, T., Philip, S.Y.: Applying differential privacy mechanism in artificial intelligence. In: International Conference on Distributed Computing Systems (ICDCS), pp. 1601\u20131609 (2019)","DOI":"10.1109\/ICDCS.2019.00159"},{"key":"42_CR27","unstructured":"Zhuo, H., et al.: Federated reinforcement learning. arXiv preprint arXiv:1901.08277 (2019)"}],"container-title":["Communications in Computer and Information Science","Blockchain and Trustworthy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9213-3_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T20:34:13Z","timestamp":1619296453000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9213-3_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811592126","9789811592133"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9213-3_42","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"12 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain and Trustworthy Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dali","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocksys2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/blocksys.info\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"100","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}