{"id":"https://openalex.org/W4390188492","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361333","title":"EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge Computing","display_name":"EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge Computing","publication_year":2023,"publication_date":"2023-11-14","ids":{"openalex":"https://openalex.org/W4390188492","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361333"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361333","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018382726","display_name":"Jaouhara Bouamama","orcid":null},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Jaouhara Bouamama","raw_affiliation_strings":["C3S Laboratory, ESTC, Hassan II University of Casablanca, Morocco"],"affiliations":[{"raw_affiliation_string":"C3S Laboratory, ESTC, Hassan II University of Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088370359","display_name":"Yahya Benkaouz","orcid":null},"institutions":[{"id":"https://openalex.org/I126477371","display_name":"Mohammed V University","ror":"https://ror.org/00r8w8f84","country_code":"MA","type":"education","lineage":["https://openalex.org/I126477371"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Yahya Benkaouz","raw_affiliation_strings":["CS Department, Faculty of sciences, Mohammed V University in Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"CS Department, Faculty of sciences, Mohammed V University in Rabat, Morocco","institution_ids":["https://openalex.org/I126477371"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052021792","display_name":"Mohammed Ouzzif","orcid":"https://orcid.org/0000-0003-1100-0228"},"institutions":[{"id":"https://openalex.org/I99297268","display_name":"University of Hassan II Casablanca","ror":"https://ror.org/001q4kn48","country_code":"MA","type":"education","lineage":["https://openalex.org/I99297268"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohammed Ouzzif","raw_affiliation_strings":["C3S Laboratory, ESTC, Hassan II University of Casablanca, Morocco"],"affiliations":[{"raw_affiliation_string":"C3S Laboratory, ESTC, Hassan II University of Casablanca, Morocco","institution_ids":["https://openalex.org/I99297268"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":69},"biblio":{"volume":null,"issue":null,"first_page":"0375","last_page":"0382"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":0.9902,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7679019},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated Learning","score":0.616496},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.56941056},{"id":"https://openalex.org/keywords/privacy-preserving-computation","display_name":"Privacy-Preserving Computation","score":0.560167},{"id":"https://openalex.org/keywords/secure-computation","display_name":"Secure Computation","score":0.547527},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure Multi-party Computation","score":0.546507},{"id":"https://openalex.org/keywords/location-privacy","display_name":"Location Privacy","score":0.509433},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.46718553}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8254932},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7679019},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.68531203},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6608137},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6081492},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5871118},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.56941056},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5647768},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5481818},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5097911},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.46718553},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.28306633},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23977989},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13896662},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10307562},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.05929762},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy59711.2023.10361333","pdf_url":null,"source":{"id":"https://openalex.org/S4363605881","display_name":"2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":26,"referenced_works":["https://openalex.org/W1490838413","https://openalex.org/W1610688607","https://openalex.org/W1788452017","https://openalex.org/W1885156594","https://openalex.org/W2078590992","https://openalex.org/W2113929724","https://openalex.org/W2117797270","https://openalex.org/W2132172731","https://openalex.org/W2141420453","https://openalex.org/W2168970529","https://openalex.org/W2170561193","https://openalex.org/W2416799949","https://openalex.org/W2767079719","https://openalex.org/W2911978475","https://openalex.org/W2969231791","https://openalex.org/W3014517104","https://openalex.org/W3082551002","https://openalex.org/W3137762252","https://openalex.org/W3168496996","https://openalex.org/W3173969732","https://openalex.org/W3180608480","https://openalex.org/W4226319939","https://openalex.org/W4281477281","https://openalex.org/W4285506551","https://openalex.org/W4295548135","https://openalex.org/W4297687186"],"related_works":["https://openalex.org/W4322761281","https://openalex.org/W4313526662","https://openalex.org/W4313463379","https://openalex.org/W4312996489","https://openalex.org/W4238233472","https://openalex.org/W4205963435","https://openalex.org/W3216099748","https://openalex.org/W3214037210","https://openalex.org/W3111395152","https://openalex.org/W3106131444"],"abstract_inverted_index":{"Due":[0],"to":[1,26,50],"the":[2,36,51,104,118,126],"increased":[3],"adoption":[4],"of":[5,38,108],"edge":[6,43,76,87,122],"computing,":[7],"and":[8,55,95,101,106],"growing":[9],"concern":[10],"about":[11],"data":[12,29],"privacy,":[13],"Federated":[14],"Learning":[15],"(FL)":[16],"frameworks":[17],"have":[18],"gained":[19],"significant":[20,47],"attention":[21],"as":[22,130],"a":[23,46,64,90],"promising":[24],"approach":[25,66],"leverage":[27],"distributed":[28],"while":[30,124],"protecting":[31],"user":[32],"privacy.":[33],"However,":[34],"ensuring":[35],"privacy":[37,53,94],"model":[39,82],"updates":[40,83],"from":[41,86],"multiple":[42],"devices":[44,88,123],"is":[45],"challenge":[48],"due":[49],"potential":[52],"breaches":[54],"security":[56,99],"vulnerabilities.":[57],"In":[58],"this":[59],"paper,":[60],"we":[61],"propose":[62],"EdgeSA":[63,78],"novel":[65],"that":[67,80,92,114],"leverages":[68],"secure":[69],"aggregation":[70],"for":[71],"privacy-preserving":[72],"federated":[73,132],"learning":[74,133],"in":[75,89],"computing.":[77],"ensures":[79],"local":[81],"are":[84],"gathered":[85],"way":[91],"respects":[93],"integrity.":[96],"Our":[97],"comprehensive":[98],"analysis":[100],"experiments,":[102],"demonstrate":[103],"effectiveness":[105],"efficiency":[107],"EdgeSA.":[109],"The":[110],"implementation":[111],"results":[112],"show":[113],"our":[115],"scheme":[116],"reduces":[117],"computational":[119],"overhead":[120],"on":[121],"achieving":[125],"same":[127],"training":[128],"accuracy":[129],"traditional":[131],"schemes.":[134]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4390188492","counts_by_year":[],"updated_date":"2024-11-22T20:24:52.382717","created_date":"2023-12-26"}