2022
DOI: 10.1016/j.dcan.2021.11.006
|View full text |Cite
|
Sign up to set email alerts
|

Safeguarding cross-silo federated learning with local differential privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 40 publications
(17 citation statements)
references
References 25 publications
0
17
0
Order By: Relevance
“…Considering that blockchain is essentially a distributed data structure, many scholars have studied the privacy issues in distributed systems [8][9][10][11]. Wu et al [12] propose an efcient identity-based equal test encryption scheme with bilinear pairings to solve the problem of efciently searching encrypted data outsourced to the cloud.…”
Section: Introductionmentioning
confidence: 99%
“…Considering that blockchain is essentially a distributed data structure, many scholars have studied the privacy issues in distributed systems [8][9][10][11]. Wu et al [12] propose an efcient identity-based equal test encryption scheme with bilinear pairings to solve the problem of efciently searching encrypted data outsourced to the cloud.…”
Section: Introductionmentioning
confidence: 99%
“…In order to avoid threats and violations of users' rights and interests and personal privacy, it is very important to study effective privacy protection methods. Wang et al [ 3 ] proposed the framework for cross-silo Federated Learning with Local Differential Privacy (LDP) mechanism, which can provide strong data privacy protection while still retaining user data statistics to preserve its high utility. Radoglou-Grammatikis et al [ 4 ] applied machine learning and reinforcement learning to the modeling of intrusion detection and prevention system, which effectively improved the detection accuracy.…”
Section: Related Workmentioning
confidence: 99%
“…It can successfully defend against switching attacks (CCS 2007, Boldyreva et al [8]) and reordering attacks (ISPEC 2007, Shao [9]). In recent years, the combination of signature scheme and blockchain technology [10][11][12], federated learning technology [13], 6G network [14], homomorphic learning [15], network routing protocol [16], edge computing [17], vehicular ad hoc networks [18], and software-defned vehicular network [19][20][21] by applying signature algorithms and encryption algorithms to the experimental scheme to further strengthen the security of the scheme and improve the privacy protection capability of the scheme is also a hot topic. In the blockchain, the digital signature is one of the three basic technologies, and its importance is self-evident.…”
Section: Related Workmentioning
confidence: 99%