Communication Efficiency

FedPerm: Private and Robust Federated Learning by Parameter Permutation

Authors: Hamid Mozaffari, Virendra J. Marathe, Dave Dice | Published: 2022-08-16
Privacy Risk Management
Poisoning
Communication Efficiency

Practical Vertical Federated Learning with Unsupervised Representation Learning

Authors: Zhaomin Wu, Qinbin Li, Bingsheng He | Published: 2022-08-13
Data Protection Method
Privacy Risk Management
Communication Efficiency

Efficient and Privacy Preserving Group Signature for Federated Learning

Authors: Sneha Kanchan, Jae Won Jang, Jun Yong Yoon, Bong Jun Choi | Published: 2022-07-12 | Updated: 2022-07-15
Group Signature
Poisoning
Communication Efficiency

Secure Aggregation for Federated Learning in Flower

Authors: Kwing Hei Li, Pedro Porto Buarque de Gusmão, Daniel J. Beutel, Nicholas D. Lane | Published: 2022-05-12
Training Protocol
Future Research
Communication Efficiency

Fusion: Efficient and Secure Inference Resilient to Malicious Servers

Authors: Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu | Published: 2022-05-06 | Updated: 2023-06-10
Privacy Enhancing Technology
Attack Method
Communication Efficiency

Federated Stochastic Primal-dual Learning with Differential Privacy

Authors: Yiwei Li, Shuai Wang, Tsung-Hui Chang, Chong-Yung Chi | Published: 2022-04-26
Privacy Protection Method
Convergence Analysis
Communication Efficiency

Mitigating Leakage from Data Dependent Communications in Decentralized Computing using Differential Privacy

Authors: Riad Ladjel, Nicolas Anciaux, Aurélien Bellet, Guillaume Scerri | Published: 2021-12-23
Data Dependency
Privacy Protection
Communication Efficiency

Reputation-based PoS for the Restriction of Illicit Activities on Blockchain: Algorand Usecase

Authors: Mayank Pandey, Rachit Agarwal, Sandeep Kumar Shukla, Nishchal Kumar Verma | Published: 2021-12-21 | Updated: 2022-08-25
Blockchain Technology
Crime Detection
Communication Efficiency

Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors

Authors: Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near | Published: 2021-12-13
Privacy Violation
Protocol Performance Evaluation
Communication Efficiency

Does Fully Homomorphic Encryption Need Compute Acceleration?

Authors: Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi | Published: 2021-12-13 | Updated: 2021-12-14
Algorithm Design
Memory Management Method
Communication Efficiency