{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T13:23:49Z","timestamp":1725024229189},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T00:00:00Z","timestamp":1662336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972241"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972094"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["22ZR1427100"],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["18ZR1417300"],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Luo-Zhaorao College Student Science and Technology Innovation Foundation of Shanghai Ocean University","award":["A1-2004-21-201311"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s12083-022-01377-6","type":"journal-article","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T08:04:10Z","timestamp":1662365050000},"page":"2457-2473","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["MP-BADNet$$^+$$: Secure and effective backdoor attack detection and mitigation protocols among multi-participants in private DNNs"],"prefix":"10.1007","volume":"15","author":[{"given":"Congcong","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0243-9995","authenticated-orcid":false,"given":"Lifei","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ya","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Jianting","family":"Ning","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,5]]},"reference":[{"issue":"1","key":"1377_CR1","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/s11263-015-0812-2","volume":"119","author":"X Zhu","year":"2016","unstructured":"Zhu X, Vondrick C, Fowlkes C, Ramanan D (2016) Do we need more training data? Int J Comput Vision 119(1):76\u201392. https:\/\/doi.org\/10.1007\/s11263-015-0812-2","journal-title":"Int J Comput Vision"},{"key":"1377_CR2","unstructured":"Stoica I, Song D, Popa A, Patterson D, Mahoney M, Katz R, Joseph A, Jordan M, Hellerstein J, Gonzalez J, et\u00a0al. (2017) A berkeley view of systems challenges for ai. arXiv preprint arXiv:1712.05855"},{"key":"1377_CR3","doi-asserted-by":"publisher","unstructured":"Mohassel P, Zhang Y (2017) Secureml: A system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), IEEE, Piscataway, NJ, pp 19\u201338. https:\/\/doi.org\/10.1109\/SP.2017.12","DOI":"10.1109\/SP.2017.12"},{"key":"1377_CR4","doi-asserted-by":"publisher","unstructured":"Yao A (1986) How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), IEEE, Piscataway, NJ, pp 162\u2013167. https:\/\/doi.org\/10.1109\/SFCS.1986.25","DOI":"10.1109\/SFCS.1986.25"},{"key":"1377_CR5","doi-asserted-by":"publisher","first-page":"26","DOI":"10.2478\/popets-2019-0035","volume":"3","author":"S Wagh","year":"2019","unstructured":"Wagh S, Gupta D (2019) Chandran N (2019) Securenn: 3-party secure computation for neural network training. Proceedings on Privacy Enhancing Technologies 3:26\u201349. https:\/\/doi.org\/10.2478\/popets-2019-0035","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"1377_CR6","doi-asserted-by":"publisher","unstructured":"Chaudhari H, Choudhury A, Patra A, Suresh A (2019) Astra: High throughput 3pc over rings with application to secure prediction. In: Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, Association for Computing Machinery, New York, pp 81\u201392. https:\/\/doi.org\/10.1145\/3338466.3358922","DOI":"10.1145\/3338466.3358922"},{"key":"1377_CR7","doi-asserted-by":"publisher","unstructured":"Patra A, Suresh A (2020) Blaze: blazing fast privacy-preserving machine learning. Proceedings 2020 Network and Distributed System Security Symposium. https:\/\/doi.org\/10.14722\/ndss.2020.24202","DOI":"10.14722\/ndss.2020.24202"},{"key":"1377_CR8","doi-asserted-by":"publisher","first-page":"188","DOI":"10.2478\/popets-2021-0011","volume":"1","author":"S Wagh","year":"2021","unstructured":"Wagh S, Tople S, Benhamouda F, Kushilevitz E, Mittal P (2021) Rabin T (2021) Falcon: Honest-majority maliciously secure framework for private deep learning. Proceedings on Privacy Enhancing Technologies 1:188\u2013208. https:\/\/doi.org\/10.2478\/popets-2021-0011","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"1377_CR9","doi-asserted-by":"publisher","unstructured":"Wang B, Yao Y, Shan S, Li H, Viswanath B, Zheng H, Zhao B (2019) Neural cleanse: Identifying and mitigating backdoor attacks in neural networks. In: 2019 IEEE Symposium on Security and Privacy (SP), IEEE, Piscataway, NJ, pp 707\u2013723. https:\/\/doi.org\/10.1109\/SP.2019.00031","DOI":"10.1109\/SP.2019.00031"},{"key":"1377_CR10","doi-asserted-by":"crossref","unstructured":"Liu Y, Ma S, Aafer Y, Lee WC, Zhang X (2017a) Trojaning attack on neural networks. In: Network and Distributed System Security Symposium","DOI":"10.14722\/ndss.2018.23291"},{"key":"1377_CR11","doi-asserted-by":"publisher","first-page":"47230","DOI":"10.1109\/ACCESS.2019.2909068","volume":"7","author":"T Gu","year":"2019","unstructured":"Gu T, Liu K, Dolan-Gavitt B, Garg S (2019) Badnets: Evaluating backdooring attacks on deep neural networks. IEEE Access 7:47230\u201347244. https:\/\/doi.org\/10.1109\/ACCESS.2019.2909068","journal-title":"IEEE Access"},{"key":"1377_CR12","doi-asserted-by":"publisher","unstructured":"Huang L, Joseph A, Nelson B, Rubinstein B, Tygar D (2011) Adversarial machine learning. In: Proceedings of the 4th ACM workshop on Security and artificial intelligence, Association for Computing Machinery, New York, NY, USA, pp 43\u201358. https:\/\/doi.org\/10.1145\/2046684.2046692","DOI":"10.1145\/2046684.2046692"},{"key":"1377_CR13","doi-asserted-by":"publisher","unstructured":"Chen C, Wei L, Zhang L, Ning J (2021) MP-BADNet: A Backdoor-Attack Detection and Identification Protocol among Multi-Participants in Private Deep Neural Networks, Association for Computing Machinery, New York, NY, USA, p 104-109. https:\/\/doi.org\/10.1145\/3472634.3472660","DOI":"10.1145\/3472634.3472660"},{"key":"1377_CR14","unstructured":"Chen X, Liu C, Li B, Lu K, Song D (2017) Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526"},{"key":"1377_CR15","doi-asserted-by":"publisher","first-page":"11957","DOI":"10.1609\/aaai.v34i07.6871","volume":"34","author":"A Saha","year":"2020","unstructured":"Saha A, Subramanya A, Pirsiavash H (2020) Hidden trigger backdoor attacks. Proceedings of the AAAI Conference on Artificial Intelligence 34:11957\u201311965","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"1377_CR16","unstructured":"Shokri R, et\u00a0al. (2020) Bypassing backdoor detection algorithms in deep learning. In: 2020 IEEE European Symposium on Security and Privacy (EuroS &P), IEEE, pp 175\u2013183"},{"key":"1377_CR17","unstructured":"Salem A, Backes M, Zhang Y (2020) Don\u2019t trigger me! a triggerless backdoor attack against deep neural networks. arXiv preprint arXiv:2010.03282"},{"key":"1377_CR18","unstructured":"Bagdasaryan E, Shmatikov V (2021) Blind backdoors in deep learning models. In: 30th USENIX Security Symposium (USENIX Security 21), pp 1505\u20131521"},{"key":"1377_CR19","doi-asserted-by":"publisher","unstructured":"Liu Y, Xie Y, Srivastava A (2017b) Neural trojans. In: 2017 IEEE International Conference on Computer Design (ICCD), IEEE, Piscataway, NJ, pp 45\u201348. https:\/\/doi.org\/10.1109\/ICCD.2017.16","DOI":"10.1109\/ICCD.2017.16"},{"key":"1377_CR20","doi-asserted-by":"publisher","unstructured":"Liu K, Dolan-Gavitt B, Garg S (2018) Fine-pruning: Defending against backdooring attacks on deep neural networks. In: International Symposium on Research in Attacks, Intrusions, and Defenses, Springer, Springer International Publishing, Cham, pp 273\u2013294. https:\/\/doi.org\/10.1007\/978-3-030-00470-5_13","DOI":"10.1007\/978-3-030-00470-5_13"},{"key":"1377_CR21","doi-asserted-by":"publisher","unstructured":"Liu Y, Lee W, Tao G, Ma S, Aafer Y, Zhang X (2019) Abs: Scanning neural networks for back-doors by artificial brain stimulation. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, New York, NY, USA, pp 1265\u20131282. https:\/\/doi.org\/10.1145\/3319535.3363216","DOI":"10.1145\/3319535.3363216"},{"key":"1377_CR22","doi-asserted-by":"publisher","unstructured":"Gao Y, Xu C, Wang D, Chen S, Ranasinghe DC, Nepal S (2019) Strip: A defence against trojan attacks on deep neural networks. In: Proceedings of the 35th Annual Computer Security Applications Conference, Association for Computing Machinery, New York, NY, USA, pp 113\u2013125. https:\/\/doi.org\/10.1145\/3359789.3359790","DOI":"10.1145\/3359789.3359790"},{"key":"1377_CR23","doi-asserted-by":"crossref","unstructured":"Chen H, Fu C, Zhao J, Koushanfar F (2019) Deepinspect: A black-box trojan detection and mitigation framework for deep neural networks. In: IJCAI, pp 4658\u20134664","DOI":"10.24963\/ijcai.2019\/647"},{"key":"1377_CR24","unstructured":"Guo W, Wang L, Xing X, Du M, Song D (2019) Tabor: A highly accurate approach to inspecting and restoring trojan backdoors in ai systems. arXiv preprint arXiv:1908.01763"},{"key":"1377_CR25","doi-asserted-by":"crossref","unstructured":"Demmler D, Schneider T, Zohner M (2015) Aby-a framework for efficient mixed-protocol secure two-party computation. In: NDSS, San Diego, CA","DOI":"10.14722\/ndss.2015.23113"},{"key":"1377_CR26","doi-asserted-by":"publisher","unstructured":"Mohassel P, Rindal P (2018) Aby3: A mixed protocol framework for machine learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, New York, NY, USA, pp 35\u201352. https:\/\/doi.org\/10.1145\/3243734.3243760","DOI":"10.1145\/3243734.3243760"},{"key":"1377_CR27","unstructured":"Gilad-Bachrach R, Dowlin N, Laine K, Lauter K, Naehrig M, Wernsing J (2016) Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. International Conference on Machine Learning, New York, New York, USA 48:201\u2013210"},{"key":"1377_CR28","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1515\/popets-2018-0024","volume":"3","author":"E Hesamifard","year":"2018","unstructured":"Hesamifard E, Takabi H, Ghasemi M (2018) Wright R (2018) Privacy-preserving machine learning as a service. Proceedings on Privacy Enhancing Technologies 3:123\u2013142. https:\/\/doi.org\/10.1515\/popets-2018-0024","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"1377_CR29","doi-asserted-by":"publisher","unstructured":"Boemer F, Cammarota R, Demmler D, Schneider T, Yalame H (2020) Mp2ml: a mixed-protocol machine learning framework for private inference. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, Association for Computing Machinery, New York, NY, USA, pp 1\u201310. https:\/\/doi.org\/10.1145\/3407023.3407045","DOI":"10.1145\/3407023.3407045"},{"key":"1377_CR30","unstructured":"Juvekar C, Vaikuntanathan V, Chandrakasan A (2018) $$\\{$$GAZELLE$$\\}$$: A low latency framework for secure neural network inference. In: 27th $$\\{$$USENIX$$\\}$$ Security Symposium ($$\\{$$USENIX$$\\}$$ Security 18), $$\\{$$USENIX$$\\}$$ Association, Baltimore, MD, pp 1651\u20131669. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/juvekar"},{"key":"1377_CR31","unstructured":"Guo J, Kong Z, Liu C (2020) Poishygiene: Detecting and mitigating poisoning attacks in neural networks. arXiv preprint arXiv:2003.11110"},{"key":"1377_CR32","doi-asserted-by":"publisher","unstructured":"Araki T, Furukawa J, Lindell Y, Nof A, Ohara K (2016) High-throughput semi-honest secure three-party computation with an honest majority. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Association for Computing Machinery, New York, NY, USA, pp 805\u2013817. https:\/\/doi.org\/10.1145\/2976749.2978331","DOI":"10.1145\/2976749.2978331"},{"key":"1377_CR33","unstructured":"Kingma D, Ba J (2014) Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980"},{"issue":"346","key":"1377_CR34","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1080\/01621459.1974.10482962","volume":"69","author":"F Hampel","year":"1974","unstructured":"Hampel F (1974) The influence curve and its role in robust estimation. J Am Stat Assoc 69(346):383\u2013393. https:\/\/doi.org\/10.1080\/01621459.1974.10482962","journal-title":"J Am Stat Assoc"},{"issue":"1","key":"1377_CR35","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R Canetti","year":"2000","unstructured":"Canetti R (2000) Security and composition of multiparty cryptographic protocols. J Cryptol 13(1):143\u2013202","journal-title":"J Cryptol"},{"key":"1377_CR36","doi-asserted-by":"crossref","unstructured":"Canetti R (2001) Universally composable security: A new paradigm for cryptographic protocols. In: Proceedings 42nd IEEE Symposium on Foundations of Computer Science, IEEE, pp 136\u2013145","DOI":"10.1109\/SFCS.2001.959888"},{"key":"1377_CR37","doi-asserted-by":"publisher","unstructured":"Goldreich O, Micali S, Wigderson A (2019) How to Play Any Mental Game, or a Completeness Theorem for Protocols with Honest Majority, Association for Computing Machinery, New York, NY, USA, p 307-328. https:\/\/doi.org\/10.1145\/3335741.3335755","DOI":"10.1145\/3335741.3335755"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01377-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01377-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01377-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T09:41:57Z","timestamp":1667900517000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01377-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,5]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["1377"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01377-6","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,5]]},"assertion":[{"value":"26 January 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}