[1] Mammen, Priyanka Mary. "Federated learning: Opportunities and challenges."arxiv preprint arxiv:2101.05428(2021).
[2] Hasan, Md Mohaiminul. "Federated Learning Models for Privacy-Preserving AI In Enterprise Decision Systems."International Journal of Business and Economics Insights 5.3 (2025): 238-269.
[3] 邱晓慧, et al. "联邦学习中安全防御与隐私保护技术研究."Application Research of Computers/Jisuanji Yingyong Yanjiu39.11 (2022).
Qiu Xiaohui, et al. "Research on Security Defense and Privacy Protection Technologies in Federated Learning." Application Research of Computers / Jisuanji Yingyong Yanjiu 39.11 (2022).
[4] Zhang, Hao, et al. "Survey of federated learning in intrusion detection."Journal of Parallel and Distributed Computing195 (2025): 104976.
[5] Gong, Xueluan, et al. "Private data inference attacks against cloud: Model, technologies, and research directions." IEEE Communications Magazine60.9 (2022): 46-52.
[6] 孙爽, et al. "不同场景的联邦学习的安全与隐私保护研究综述."Application Research of Computers/Jisuanji Yingyong Yanjiu 38.12 (2021).
Sun Shuang, et al. "A Review of Security and Privacy Protection in Federated Learning for Different Scenarios." Application Research of Computers/Jisuanji Yingyong Yanjiu 38.12 (2021)
[7] Basak, Santanu, and Kakali Chatterjee. "DPAD: Data Poisoning Attack Defense Mechanism for federated learning-based system."Computers and Electrical Engineering121 (2025): 109893.
[8] Paillier, Pascal. "Paillier encryption and signature schemes."Encyclopedia of Cryptography, Security and Privacy. Cham: Springer Nature Switzerland, 2025. 1757-1759.
[9] Wang, Zhaoqi, et al. "Resisting Poisoning Attacks in Federated Learning via Dual-Domain Distance and Trust Assessment."IEEE Transactions on Information Forensics and Security(2025).
[10] Tolpegin, Vale, et al. "Data poisoning attacks against federated learning systems."Computer security–ESORICs 2020: 25th European symposium on research in computer security, ESORICs 2020, guildford, UK, September 14–18, 2020, proceedings, part i 25. Springer International Publishing, 2020.
[11] Jagielski, Matthew, et al. "Manipulating machine learning: Poisoning attacks and countermeasures for regression learning."2018 IEEE symposium on security and privacy (SP). IEEE, 2018.
[12] Lianga, Junchuan, et al. "A survey on federated learning poisoning attacks and defenses."arxiv preprint arxiv:2306.03397(2023).
[13] Sun, Gan, et al. "Data poisoning attacks on federated machine learning."IEEE Internet of Things Journal9.13 (2021): 11365-11375.
[14] Fang, Minghong, et al. "Local model poisoning attacks to {Byzantine-Robust} federated learning."29th USENIX security symposium (USENIX Security 20). 2020.
[15] Zhou, et al. "Deep model poisoning attack on federated learning."Future Internet13.3 (2021): 73.
[16] 钱汉伟, 孙伟松. "深度神经网络中的后门攻击与防御技术综述."Journal of Frontiers of Computer Science & Technology17.5 (2023).
Qian Hanwei, Sun Weisong. "A Review of Backdoor Attacks and Defense Techniques in Deep Neural Networks." Journal of Frontiers of Computer Science & Technology 17.5 (2023).
[17] Basak, Santanu, and Kakali Chatterjee. "DPAD: Data Poisoning Attack Defense Mechanism for federated learning-based system."Computers and Electrical Engineering121 (2025): 109893.
[18] Yazdinejad, Abbas, et al. "A robust privacy-preserving federated learning model against model poisoning attacks." IEEE Transactions on Information Forensics and Security(2024).
[19] Li, Hao, et al. "Review on security of federated learning and its application in healthcare."Future Generation Computer Systems144 (2023): 271-290.
[20] Xu, Runhua, et al. "Hybridalpha: An efficient approach for privacy-preserving federated learning."Proceedings of the 12th ACM workshop on artificial intelligence and security. 2019.
[21] Ma, Zhuoran, et al. "ShieldFL: Mitigating model poisoning attacks in privacy-preserving federated learning."IEEE Transactions on Information Forensics and Security17 (2022): 1639-1654.
[22] Truex, Stacey, et al. "A hybrid approach to privacy-preserving federated learning."Proceedings of the 12th ACM workshop on artificial intelligence and security. 2019.
[23] Yazdinejad, Abbas, Ali Dehghantanha, and Gautam Srivastava. "AP2FL: Auditable privacy-preserving federated learning framework for electronics in healthcare." IEEE Transactions on Consumer Electronics70.1 (2023): 2527-2535.
[24] Wang, Baocang, et al. "Ppefl: Privacy-preserving edge federated learning with local differential privacy." IEEE Internet of Things Journal 10.17 (2023): 15488-15500.
[25] Melis, Luca, et al. "Exploiting unintended feature leakage in collaborative learning." 2019 IEEE symposium on security and privacy (SP). IEEE, 2019.
[26] Zhang Z, Cao X, Jia J, et al. Fldetector: Defending federated learning against model poisoning attacks via detecting malicious clients[C]//Proceedings of the 28th ACM SIGKDD conference on knowledge discovery and data mining. 2022: 2545-2555.
|