[9]
D. Jatain, V. Singh, and N. Dahiya, "A contemplative perspective on federated machine learning: Taxonomy, threats & vulnerability assessment and challenges", J. King Saud Univ.-. Comput. Inform. Sci., vol. 34, no. 9, pp. 6681-6698, 2022.
[12]
V. Smith, C-K. Chiang, M. Sanjabi, and A Talwalkar, "Federated multi-task learning", arXiv, 2017.
[14]
W. Du, and M.J. Atallah, "Privacy-preserving cooperative statistical analysis", Electr. Eng. Comput. Sci., vol. 14, pp. 1-10, 2001.
[17]
P. Schoppmann, B. Balle, J. Doerner, S. Zahur, and D. Evans, "Secure linear regression on vertically partitioned datasets", IACR Cryptol. ePrint Arch., p. 892, 2016.
[51]
I. Wagner, and D. Eckhoff, "Technical privacy metrics: A systematic survey", ACM Comput. Surv., vol. 51, p. 57, 2018.
[56]
B.D. Rouhani, M.S. Riazi, and F. Koushanfar, "Deepsecure: Scalable provably-secure deep learning", In Proceedings of the 55th annual design automation conference, 2018.
[57]
B. Ghazi, R. Pagh, and A. Velingker, "Scalable and differentially private distributed aggregation in the shuffled model", arXiv preprint arXiv:1906.08320, 2019.
[58]
R.C. Geyer, T. Klein, and M. Nabi, "Differentially private federated learning: A client level perspective", preprint arXiv:1712.07557, 2017.
[59]
O. Thakkar, G. Andrew, and H.B. McMahan, "Differentially private learning with adaptive clipping", Adv. Neural Inform. Process. Syst., vol. 34, pp. 17455-17466, 2021.
[60]
J. Li, M. Khodak, S. Caldas, and A. Talwalkar, "Differentially-private gradient-based meta-learning", Technical Report, 2019.
[61]
N. Agarwal, A.T. Suresh, F.X.X. Yu, S. Kumar, and B. McMahan, ‘cpSGD: Communication-efficient and differentially-private distributed sgd’, In. Advances in Neural Information Processing Systems, 2018.
[62]
W. Stallings, Cryptography and Network Security Principles and Practices., 7th ed Pearson Education, Inc., 2017.
[64]
R.L. Rivest, L. Adleman, and M.L. Dertouzos, "On data banks and privacy homomorphisms", Found. Sec. Comput., vol. 11, no. 4, pp. 169-179, 1978.
[65]
R. Li, Y. Xiao, C. Zhang, T. Song, and C. Hu, "Cryptographic algorithms for privacy-preserving online applications", Math. Found. Comput., vol. 311, 2018.
[66]
M. Van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan, "Fully homomorphic encryption over the integers", Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 24-43, 2010.
[68]
A.C. Yao, "Protocols for secure computations", Proceedings of the Annual Symposium on Foundations of Computer Science, pp. 160-164, 1982.
[69]
C. Dwork, and A. Roth, "The Algorithmic foundations of differential privacy", Found. Trends Theor. Comput. Sci., pp. 211-407, 2014.
[79]
Y. Zhao, M. Li, L. Lai, N. Suda, D. Civin, and V. Chandra, "Federated learning with non-iid data", arXiv, 1806.00582, 2018.
[81]
C. Valêncio, N.A. Jos, N.A. Eacute, C.D. Freitas, and W. Tenório, "Analysing research collaboration through co-authorship networks in a big data environment: An efficient parallel approach", Int. J. Comput. Sci. Eng., vol. 21, no. 3, pp. 364-374, 2020.
[85]
P. Kairouz, and B. McMahan, "Advances and open problems in federated learning", arXiv, 2019.
[86]
V. Paul, A. Bellet, and M. Tommasi, "Decentralized Collaborative Learning of Personalized Models over Networks Paul Vanhaesebrouck, Aurélien Bellet, Marc Tommasi", In Artificial Intelligence and Statistics, PMLR, pp. 509-517, 2013.
[92]
K. Hsieh, A. Phanishayee, O. Mutlu, and P. Gibbons, "The non-IID data quagmire of decentralized machine learning", In. Proceedings of the 37th International Conference on Machine Learning, Online, PMLR, vol. 119, 2020.
[93]
Collaborative Deep Learning in Fixed Topology Networks, Zhanhong Jiang., Aditya Balu, Chinmay Hegde, Soumik Sarkar, 2017.
[94]
GossipGraD, Scalable Deep Learning using Gossip Communication based Asynchronous Gradient Descent., Jeff Daily, Abhinav Vishnu, Charles Siegel, Thomas Warfel, Vinay Amatya, 2018.
[97]
B. McMahan, E. Moore, D. Ramage, S. Hampson, and B.A. Arcas, Communication-efficient learning of deep networks from decentralized data. Artificial intelligence and statistics., PMLR, 2017, pp. 1273-1282.
[103]
W. Shi, S. Zhou, and Z. Niu, "Device scheduling with fast convergence for wireless federated learning", In. ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1-6, 2020.
[104]
G. Severi, M. Jagielski, G. Yar, Y. Wang, A. Oprea, and C. Nita-Rotaru, "Network-Level Adversaries in Federated Learning", In. 2022 IEEE Conference on Communications and Network Security (CNS), IEEE, pp. 19-27, 2022.
[107]
Z. Zhang, A. Panda, L. Song, Y. Yang, M. Mahoney, and P. Mittal, "Neurotoxin: durable backdoors in federated learning", In. Proceedings of the 39th International Conference on Machine Learning, PMLR, pp. 26429-26446, 2022.
[114]
Iraj Sadegh Amiri, "Introduction to photonics: Principles and the most recent applicationsofmicrostructures", Micromachines 9.9, p. 452, 2018.