|
[1] C. Ma, J. Li, M. Ding, H. H. Yang, F. Shu, T. Q. Quek, and H. V. Poor, “On safeguarding privacy and security in the framework of federated learning,” IEEE Network, vol. 34, no. 4, pp. 242–248, 2020. [2] Y. Li, S. Wang, C.-Y. Chi, and T. Q. Quek, “Differentially private federated learning in edge networks: The perspective of noise reduction,” IEEE Network, vol. 36, no. 5, pp. 167–172, 2022. [3] Y. Li, T.-H. Chang, and C.-Y. Chi, “Secure federated averaging algorithm with differential privacy,” in Proc. IEEE International Workshop on Machine Learning for Signal Processing (MLSP), 2020, pp. 1–6. [4] Y. Li, S. Wang, T.-H. Chang, and C.-Y. Chi, “Federated stochastic primaldual learning with differential privacy,” arXiv preprint arXiv:2204.12284, 2022. [5] A. Triastcyn and B. Faltings, “Federated learning with Bayesian differential privacy,” in Proc. IEEE International Conference on Big Data, 2019, pp. 2587–2596. [6] P. Mohassel and Y. Zhang, “Secureml: A system for scalable privacypreserving machine learning,” in Proc. 2017 IEEE Symposium on Security and Privacy, 2017, pp. 19–38. 44 [7] I. Giacomelli, S. Jha, M. Joye, C. D. Page, and K. Yoon, “Privacy-preserving ridge regression with only linearly-homomorphic encryption,” in Proc. International Conference on Applied Cryptography and Network Security, 2018, pp. 243–261. [8] K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H. B. McMahan, S. Patel, D. Ramage, A. Segal, and K. Seth, “Practical secure aggregation for privacy-preserving machine learning,” in Proc. ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 1175–1191. [9] C. Dwork, A. Roth et al., “The algorithmic foundations of differential privacy,” Foundations and Trends® in Theoretical Computer Science, vol. 9, no. 3–4, pp. 211–407, 2014. [10] C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, “Our data, ourselves: Privacy via distributed noise generation,” in Proc. Springer Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 2006, pp. 486–503. [11] A. Girgis, D. Data, S. Diggavi, P. Kairouz, and A. T. Suresh, “Shuffled model of differential privacy in federated learning,” in Proc. International Conference on Artificial Intelligence and Statistics, 2021, pp. 2521–2529. [12] V. Feldman, I. Mironov, K. Talwar, and A. Thakurta, “Privacy amplification by iteration,” in Porc. IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS), 2018, pp. 521–532. [13] B. Balle, G. Barthe, and M. Gaboardi, “Privacy amplification by subsampling: Tight analyses via couplings and divergences,” in Proc. ACM Neural Information Processing Systems (NIPS), 2018, pp. 6277–6287. 45 [ 14] T. Steinke, “Composition of differential privacy & privacy amplification by subsampling,” arXiv preprint arXiv:2210.00597, 2022. [15] ´U. Erlingsson, V. Feldman, I. Mironov, A. Raghunathan, K. Talwar, and A. Thakurta, “Amplification by shuffling: From local to central differential privacy via anonymity,” in Proc. ACM-SIAM Symposium on Discrete Algorithms, 2019, pp. 2468–2479. [16] B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. Y Arcas, “Communication-efficient learning of deep networks from decentralized data,” in Proc. Artificial Intelligence and Statistics, 2017, pp. 1273–1282. [17] Y. Li, S. Wang, C.-Y. Chi, and T. Q. Quek, “Differentially private federated clustering over non-iid data,” arXiv preprint arXiv:2301.00955, 2023. [18] C. Dwork, G. N. Rothblum, and S. Vadhan, “Boosting and differential privacy,” in Proc. IEEE Symposium on Foundations of Computer Science, 2010, pp. 51–60. [19] X. Li, K. Huang, W. Yang, S. Wang, and Z. Zhang, “On the convergence of FedAvg on non-IID data,” in Proc. International Conference on Learning Representations (ICLR), 2020, pp. 1–26. [20] C. L. Blake and C. J. Merz, “UCI repository of machine learning databases,” 1998, [http://www.ics.uci.edu/rvmlearnIMLRepository.html]. Irvine. CA: University of California, Department of Information and Computer Science. [21] M. S. E. Mohamed, W.-T. Chang, and R. Tandon, “Privacy amplification for federated learning via user sampling and wireless aggregation,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 12, pp. 3821–3835, 2021. |