2022
DOI: 10.1109/tifs.2022.3176191
|View full text |Cite
|
Sign up to set email alerts
|

PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(16 citation statements)
references
References 36 publications
0
16
0
Order By: Relevance
“…Additionally, researchers should explore adaptive and context-aware mechanisms that consider the unique characteristics of various application scenarios and adapt the learning process accordingly. A common limitation in secure and verifiable FL frameworks [127], [128], [129], [130], [131], [132], [133] is the reliance on trusted third parties for authentication and aggregation. This dependence could introduce security vulnerabilities and single points of failure.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, researchers should explore adaptive and context-aware mechanisms that consider the unique characteristics of various application scenarios and adapt the learning process accordingly. A common limitation in secure and verifiable FL frameworks [127], [128], [129], [130], [131], [132], [133] is the reliance on trusted third parties for authentication and aggregation. This dependence could introduce security vulnerabilities and single points of failure.…”
Section: Discussionmentioning
confidence: 99%
“…2) Homomorphic Encryption and Hash Function based Varifiability: Authors in [129], introduces PVD-FL, a secure, verifiable, and privacy-centric decentralized FL structure aimed at mitigating security threats such as privacy invasion and integrity breaches. The referenced work in [130] presents VerifyNet, a groundbreaking framework that addresses verifiability and privacy concerns in FL.…”
Section: Security and Privacy Aware Trustworthy Flmentioning
confidence: 99%
“…Since these schemes [15,16] require interaction among participants to protect privacy, the communication overhead is high. Zhao et al [17] proposed a decentralized scheme. However, this scheme requires participants to perform in sequence.…”
Section: Related Workmentioning
confidence: 99%
“…This makes them unsuitable for practical applications that require both privacy and performance. Moreover, optimizing differential privacy parameters remains a challenge in dynamic UAV-MEC environments characterized by resource constraints and potential data collection attacks [ 25 ]. This limited scope results in incomplete solutions that fail to address real systemic problems or lack versatility.…”
Section: Introductionmentioning
confidence: 99%