[HTML][HTML] Achieving security and privacy in federated learning systems: Survey, research challenges and future directions

A Blanco-Justicia, J Domingo-Ferrer, S Martínez… - … Applications of Artificial …, 2021 - Elsevier
Federated learning (FL) allows a server to learn a machine learning (ML) model across
multiple decentralized clients that privately store their own training data. In contrast with …

An overview of implementing security and privacy in federated learning

K Hu, S Gong, Q Zhang, C Seng, M Xia… - Artificial Intelligence …, 2024 - Springer
Federated learning has received a great deal of research attention recently, with privacy
protection becoming a key factor in the development of artificial intelligence. Federated …

Secure and privacy-preserving federated learning via co-utility

J Domingo-Ferrer, A Blanco-Justicia… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The decentralized nature of federated learning, that often leverages the power of edge
devices, makes it vulnerable to attacks against privacy and security. The privacy risk for a …

Co-utile P2P ridesharing via decentralization and reputation management

D Sánchez, S Martínez, J Domingo-Ferrer - Transportation Research Part C …, 2016 - Elsevier
Ridesharing has the potential to bring a wealth of benefits both to the actors directly involved
in the shared trip (eg, shared travel costs or access to high-occupancy vehicle facilities) and …

Co-utility: self-enforcing protocols for the mutual benefit of participants

J Domingo-Ferrer, S Martínez, D Sánchez… - … Applications of Artificial …, 2017 - Elsevier
Protocols govern the interactions between agents, both in the information society and in the
society at large. Protocols based on mutually beneficial cooperation are especially …

[图书][B] Technologies for modern digital entrepreneurship

AN Turi - 2020 - Springer
The fourth industrial revolution has created big tech winners and monopolistic companies
that lead the digital economy space today. The unfolding mount in the digital economy is …

Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model

MB Shareh, H Navidi, HHS Javadi… - Information Sciences, 2019 - Elsevier
Abstract In cooperative Peer-to-Peer (P2P) networks, a number of users, called Free-riders,
try to receive service from others without cooperating with them. Some others, called Sybil …

Co-utile peer-to-peer decentralized computing

J Domingo-Ferrer, A Blanco-Justicia… - 2020 20th IEEE/ACM …, 2020 - ieeexplore.ieee.org
Outsourcing computation allows wielding huge computational power. Even though cloud
computing is the most usual type of outsourcing, resorting to idle edge devices for …

Collaborative and efficient privacy-preserving critical incident management system

A Qureshi, V Garcia-Font, H Rifà-Pous… - Expert Systems with …, 2021 - Elsevier
When a critical incident occurs, timely location-based status messages (known as alerts)
conveyed by a witness present at the incident site to the competent authority constitute a key …

Managing trust and detecting malicious groups in peer-to-peer iot networks

A Alhussain, H Kurdi, L Altoaimy - Sensors, 2021 - mdpi.com
Peer-to-peer (P2P) networking is becoming prevalent in Internet of Thing (IoT) platforms due
to its low-cost low-latency advantages over cloud-based solutions. However, P2P …