Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning
暂无分享,去创建一个
[1] Xiang Li,et al. On the Convergence of FedAvg on Non-IID Data , 2019, ICLR.
[2] Hubert Eichner,et al. APPLIED FEDERATED LEARNING: IMPROVING GOOGLE KEYBOARD QUERY SUGGESTIONS , 2018, ArXiv.
[3] Martin Hirt,et al. Perfectly-Secure MPC with Linear Communication Complexity , 2008, TCC.
[4] Michael J. Fischer,et al. Scalable Bias-Resistant Distributed Randomness , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[5] Sarvar Patel,et al. Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..
[6] Ananda Theertha Suresh,et al. Can You Really Backdoor Federated Learning? , 2019, ArXiv.
[7] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[8] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[9] Rachid Guerraoui,et al. Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent , 2017, NIPS.
[10] Wei Zhang,et al. Can Decentralized Algorithms Outperform Centralized Algorithms? A Case Study for Decentralized Parallel Stochastic Gradient Descent , 2017, NIPS.
[11] Mario A. Storti,et al. MPI for Python , 2005, J. Parallel Distributed Comput..
[12] Claude Castelluccia,et al. I Have a DREAM! (DiffeRentially privatE smArt Metering) , 2011, Information Hiding.
[13] Mehryar Mohri,et al. Agnostic Federated Learning , 2019, ICML.
[14] Tara Javidi,et al. Peer-to-peer Federated Learning on Graphs , 2019, ArXiv.
[15] Amos Beimel,et al. Secret-Sharing Schemes: A Survey , 2011, IWCC.
[16] Xenofontas A. Dimitropoulos,et al. SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics , 2010, USENIX Security Symposium.
[17] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[18] Suman Nath,et al. Differentially private aggregation of distributed time-series with transformation and encryption , 2010, SIGMOD Conference.
[19] Kannan Ramchandran,et al. Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates , 2018, ICML.
[20] Jakub Konecný,et al. Federated Learning with Autotuned Communication-Efficient Secure Aggregation , 2019, 2019 53rd Asilomar Conference on Signals, Systems, and Computers.
[21] Nathan Srebro,et al. Semi-Cyclic Stochastic Gradient Descent , 2019, ICML.
[22] Thomas M. Cover,et al. Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing) , 2006 .
[23] Jun Zhang,et al. Edge-Assisted Hierarchical Federated Learning with Non-IID Data , 2019, ArXiv.
[24] Tian Li,et al. Fair Resource Allocation in Federated Learning , 2019, ICLR.
[25] Refik Molva,et al. Private and Dynamic Time-Series Data Aggregation with Trust Relaxation , 2014, CANS.
[26] Song Han,et al. Deep Leakage from Gradients , 2019, NeurIPS.
[27] Hubert Eichner,et al. Towards Federated Learning at Scale: System Design , 2019, SysML.
[28] Adi Shamir,et al. How to share a secret , 1979, CACM.
[29] Sarvar Patel,et al. Practical Secure Aggregation for Federated Learning on User-Held Data , 2016, ArXiv.
[30] Amir Salman Avestimehr,et al. Lagrange Coded Computing: Optimal Design for Resiliency, Security and Privacy , 2018, AISTATS.
[31] Christopher Umans,et al. Fast Polynomial Factorization and Modular Composition , 2011, SIAM J. Comput..
[32] Minghong Fang,et al. Local Model Poisoning Attacks to Byzantine-Robust Federated Learning , 2019, USENIX Security Symposium.
[33] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[34] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[35] Vladimir Kolesnikov,et al. A Pragmatic Introduction to Secure Multi-Party Computation , 2019, Found. Trends Priv. Secur..
[36] Nam Sung Kim,et al. Pipe-SGD: A Decentralized Pipelined SGD Framework for Distributed Deep Net Training , 2018, NeurIPS.
[37] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[38] Ji Liu,et al. Central Server Free Federated Learning over Single-sided Trust Social Networks , 2019, ArXiv.
[39] Anit Kumar Sahu,et al. Federated Learning: Challenges, Methods, and Future Directions , 2019, IEEE Signal Processing Magazine.
[40] Martin Jaggi,et al. COLA: Decentralized Linear Learning , 2018, NeurIPS.
[41] Prateek Mittal,et al. Analyzing Federated Learning through an Adversarial Lens , 2018, ICML.
[42] Richard Nock,et al. Advances and Open Problems in Federated Learning , 2019, Found. Trends Mach. Learn..
[43] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[44] Blaise Agüera y Arcas,et al. Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.
[45] Tassilo Klein,et al. Differentially Private Federated Learning: A Client Level Perspective , 2017, ArXiv.
[46] Yang Song,et al. Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning , 2018, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[47] Peter Richtárik,et al. Federated Learning: Strategies for Improving Communication Efficiency , 2016, ArXiv.
[48] Jonas Geiping,et al. Inverting Gradients - How easy is it to break privacy in federated learning? , 2020, NeurIPS.
[49] Yehuda Lindell,et al. Secure Computation on the Web: Computing without Simultaneous Interaction , 2011, IACR Cryptol. ePrint Arch..
[50] Ameet Talwalkar,et al. Federated Multi-Task Learning , 2017, NIPS.
[51] H. Brendan McMahan,et al. Learning Differentially Private Recurrent Language Models , 2017, ICLR.