{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T11:28:42Z","timestamp":1730201322893,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/blackseacom61746.2024.10646291","type":"proceedings-article","created":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T17:34:13Z","timestamp":1725298453000},"page":"272-275","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Federated Learning: The Framework, Applications, Security & Privacy"],"prefix":"10.1109","author":[{"given":"Ashim","family":"Saha","sequence":"first","affiliation":[{"name":"Independent University, Bangladesh (IUB),Department of Computer Science and Engineering,Dhaka,Bangladesh"}]},{"given":"Lubaina","family":"Ali","sequence":"additional","affiliation":[{"name":"Independent University, Bangladesh (IUB),Department of Computer Science and Engineering,Dhaka,Bangladesh"}]},{"given":"Rudrita","family":"Rahman","sequence":"additional","affiliation":[{"name":"Independent University, Bangladesh (IUB),Department of Computer Science and Engineering,Dhaka,Bangladesh"}]},{"given":"Md Fahad","family":"Monir","sequence":"additional","affiliation":[{"name":"Independent University, Bangladesh (IUB),Department of Computer Science and Engineering,Dhaka,Bangladesh"}]},{"given":"Tarem","family":"Ahmed","sequence":"additional","affiliation":[{"name":"Independent University, Bangladesh (IUB),Department of Computer Science and Engineering,Dhaka,Bangladesh"}]}],"member":"263","reference":[{"key":"ref1","article-title":"A Survey on Federated Learning and its Applications for Accelerating Industrial Internet of Things","volume-title":"arXiv","author":"Zhou","year":"2021"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/OJCS.2020.2992630","article-title":"Federated Learning for Vehicular Internet of Things: Recent Advances and Open Issues","volume":"1","author":"Du","year":"2020","journal-title":"IEEE Open Journal of the Computer Society"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.08.004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3030072"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2021.3058573"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3013541"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/app12199901"},{"key":"ref8","article-title":"MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning","volume-title":"arXiv","author":"Ma","year":"2022"},{"issue":"5","key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/s11704-021-0598-z","article-title":"Challenges and future directions of secure federated learning: a survey","volume":"16","author":"Zhang","year":"2021","journal-title":"Frontiers of Computer Science"},{"key":"ref10","article-title":"Threats to Federated Learning: A Survey","volume-title":"arXiv","author":"Lyu","year":"2020"},{"key":"ref11","article-title":"Privacy-Preserving Aggregation in Federated Learning: A Survey","volume-title":"arXiv","author":"Liu","year":"2022"},{"key":"ref12","article-title":"Hybrid Federated Learning: Algorithms and Implementation","volume-title":"arXiv","author":"Zhang","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3111118"},{"issue":"2","key":"ref14","doi-asserted-by":"crossref","first-page":"450","DOI":"10.3390\/s22020450","article-title":"Federated Learning in Edge Computing: A Systematic Survey","volume":"22","author":"Abreha","year":"2022","journal-title":"Sensors"},{"key":"ref15","article-title":"Asynchronous Fed-erated Learning with Differential Privacy for Edge Intelligence","volume-title":"arXiv","author":"Li","year":"2019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2021.103663"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3201876"},{"key":"ref18","article-title":"Federated Learning on Non-lID Data: A Survey","volume-title":"arXiv","author":"Zhu","year":"2021"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1109\/EMBC48229.2022.9871371","article-title":"Blockchained Federated Learning for Privacy and Security Preservation: Practical Example of Diagnosing Cerebellar Ataxia","volume-title":"IEEE Xplore","author":"Ngo","year":"2022"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3286490.3286559"},{"key":"ref21","article-title":"The Fundamental Price of Secure Aggregation in Differentially Private Federated Learning","volume-title":"arXiv","author":"Chen","year":"2022"},{"key":"ref22","article-title":"Aggregated Momentum: Stability Through Passive Damping","volume-title":"arXiv","author":"Lucas","year":"2019"},{"issue":"1","key":"ref23","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/S0377-2217(01)00226-0","article-title":"Combining expert judgment: On the performance of trimmed mean vote aggregation procedures in the pres-ence of strategic voting","author":"Hurley","year":"2002","journal-title":"European Journal of Operational Research"},{"key":"ref24","article-title":"Dim-Krum: Backdoor-Resistant Fed-erated Learning for NLP with Dimension-wise Krum-Based Ag-gregation","volume-title":"arXiv","author":"Zhang","year":"2022"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/lwc.2022.3149783"},{"key":"ref26","article-title":"FedBN: Federated Learning on Non-lID Features via Local Batch Nor-malization","volume-title":"arXiv","author":"Li","year":"2021"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1109\/PIMRC.2019.8904164","article-title":"Wireless Federated Distillation for Distributed Edge Learning with Heterogeneous Data","volume-title":"IEEE Xplore","author":"Ahn","year":"2019"},{"key":"ref28","article-title":"Communication-Efficient On-Device Machine Learning: Federated Distillation and Augmentation under Non-lID Private Data","volume-title":"arXiv","author":"Jeong","year":"2018"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.14711\/thesis-991012994506603412","article-title":"Robust Federated Learning with Attack-Adaptive Aggregation","volume-title":"arXiv","author":"Wan","year":"2021"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1109\/BigData55660.2022.10021119","article-title":"Adaptive Aggregation For Federated Learning","volume-title":"arXiv","author":"Jayaram","year":"2022"},{"issue":"1","key":"ref31","article-title":"Federated learning in cloud-edge collabo-rative architecture: key technologies, applications and challenges","volume":"11","author":"Bao","year":"2022","journal-title":"Journal of Cloud Computing"},{"key":"ref32","first-page":"1","article-title":"Federated Learning-based Anomaly Detection for loT Security Attacks","author":"Mothukuri","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref33","doi-asserted-by":"crossref","DOI":"10.1109\/SECON55815.2022.9918536","article-title":"Skunk - A Blockchain and Zero Trust Security Enabled Federated Learning Platform for 5G\/6G Network Slicing","volume-title":"IEEE Xplore","author":"Bandara","year":"2022"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4233238"},{"issue":"5","key":"ref35","doi-asserted-by":"crossref","first-page":"3394","DOI":"10.1109\/JIOT.2020.3022534","article-title":"Efficient Federated Learning Algorithm for Re-source Allocation in Wireless loT Networks","volume":"8","author":"Nguyen","year":"2021","journal-title":"IEEE Internet of Things Journal"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1145\/3551663.3558681","article-title":"Prototype of deployment of Federated Learning with loT devices","volume-title":"Proceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks on 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks","author":"Santaclara","year":"2022"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"2587","DOI":"10.1109\/BigData47090.2019.9005465","article-title":"Federated Learning with Bayesian Differential Privacy","volume-title":"2019 IEEE International Conference on Big Data (Big Data)","author":"Triastcyn","year":"2019"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1109\/ISIT44484.2020.9174426","article-title":"Wireless Federated Learning with Local Differential Privacy","volume-title":"arXiv","author":"Seif","year":"2020"},{"volume-title":"BatchCrypt: Efficient Homomorphic Encryption for Cross-Silo Federated Learning BatchCrypt: Efficient Homomor-phic Encryption for Cross-Silo Federated Learning","year":"2020","author":"Zhang","key":"ref39"},{"issue":"4","key":"ref40","doi-asserted-by":"crossref","first-page":"94","DOI":"10.3390\/fi13040094","article-title":"Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning","volume":"13","author":"Fang","year":"2021","journal-title":"Future Internet"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.1145\/237814.238015","article-title":"Adaptively secure multi-party computation","volume-title":"Proceedings of the twenty-eighth annual ACM symposium on Theory of computing - STOC 96","author":"Canetti","year":"1996"}],"event":{"name":"2024 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","start":{"date-parts":[[2024,6,24]]},"location":"Tbilisi, Georgia","end":{"date-parts":[[2024,6,27]]}},"container-title":["2024 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10646183\/10646188\/10646291.pdf?arnumber=10646291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:25:08Z","timestamp":1725513908000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10646291\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/blackseacom61746.2024.10646291","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}