{"id":4901,"date":"2023-07-14T16:58:58","date_gmt":"2023-07-14T08:58:58","guid":{"rendered":"https:\/\/inventec2.mjitec.tw\/?page_id=4901"},"modified":"2024-01-17T11:06:12","modified_gmt":"2024-01-17T03:06:12","slug":"fedtrust","status":"publish","type":"page","link":"https:\/\/inventec2.mjitec.tw\/en\/ai\/fedtrust\/","title":{"rendered":"FedTrust"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221;][vc_column]<div id=\"rs-space-69e10d021ea34\" class=\"rs-space\">\r\n                <div class=\"rs-space-data\" data-conf=\"{&quot;uqid&quot;:&quot;69e10d021ea34&quot;,&quot;space_lg&quot;:&quot;150&quot;,&quot;space_md&quot;:&quot;80&quot;,&quot;space_sm&quot;:&quot;60&quot;,&quot;space_xs&quot;:&quot;60&quot;}\"><\/div>\t\t\t\r\n\t\t\t<\/div>[vc_row_inner el_class=&#8221;md-full-col&#8221;][vc_column_inner el_class=&#8221;m_p&#8221; width=&#8221;1\/2&#8243;]\n        <div class=\"rs-heading    \">\n        \t<div class=\"title-inner\"  data-border-color=\"\">\n        \t\t\n\t            \n\t            <h2 class=\"title \" style=\"color: #333333\">FedTrust: Towards Building<br \/>\nSecure Robust and Trustworthy Moderators for Federated Learning <\/h2>\n\t        <\/div><\/div>[vc_column_text css=&#8221;.vc_custom_1689325188509{margin-bottom: 20px !important;}&#8221;]<\/p>\n<div>\n<p>IEEE International Conference on Multimedia Information Processing and Retrieval (IEEE MIPR 2021)<\/p>\n<\/div>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1689327011743{margin-bottom: 5px !important;}&#8221;]<\/p>\n<div>\n<h6>Authors<\/h6>\n<\/div>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1689325197392{margin-bottom: 20px !important;}&#8221;]<\/p>\n<div>\n<p>Chih-Fan Hsu, Jing-Lun Huang, Feng-Hao Liu, Ming-Ching Chang, and Wei-Chao Chen<\/p>\n<\/div>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1689327021247{margin-bottom: 5px !important;}&#8221;]<\/p>\n<div>\n<h6>Published<\/h6>\n<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<div>\n<p>2022\/9\/8<\/p>\n<\/div>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;m_p&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;5044&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column]<div id=\"rs-space-69e10d021eb56\" class=\"rs-space\">\r\n                <div class=\"rs-space-data\" data-conf=\"{&quot;uqid&quot;:&quot;69e10d021eb56&quot;,&quot;space_lg&quot;:&quot;150&quot;,&quot;space_md&quot;:&quot;80&quot;,&quot;space_sm&quot;:&quot;60&quot;,&quot;space_xs&quot;:&quot;60&quot;}\"><\/div>\t\t\t\r\n\t\t\t<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_row_inner content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1657794580528{margin-bottom: 20px !important;}&#8221;][vc_column_inner el_class=&#8221;m_p paragraph_title&#8221; width=&#8221;1\/3&#8243;]\n        <div class=\"rs-heading   vc_custom_1689327035254  \">\n        \t<div class=\"title-inner\"  data-border-color=\"\">\n        \t\t\n\t            \n\t            <h2 class=\"title \" style=\"color: #333333\">Abstract <\/h2>\n\t        <\/div><\/div>[\/vc_column_inner][vc_column_inner el_class=&#8221;m_p&#8221; width=&#8221;2\/3&#8243;][vc_column_text]Most Federated Learning (FL) systems are built upon a strong assumption of trust&#8212;clients fully trust the centralized moderator, which might not be feasible in practice.<br \/>\nThis work aims to mitigate the assumption by using appropriate cryptographic tools.<br \/>\nParticularly, we examine various scenarios with different trust demands in FL, and then design the corresponding practical protocols with lightweight cryptographic tools.<br \/>\nThree solutions for secure and trustworthy aggregation are proposed with increasing sophistication: (1) a single verifiable moderator, (2) a single secure and verifiable moderator, and (3) multiple secure and verifiable moderators, which can handle adversarial behaviors with different levels.<br \/>\nWe evaluate the performances of all our proposed protocols on the test accuracy and the training time, showing that our protocols maintain the accuracy with time overhead from 30% to 156% depending on the secure and trustworthy levels. The protocols can be deployed in many practical FL settings with appropriate optimizations.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column]<div id=\"rs-space-69e10d021ec0a\" class=\"rs-space\">\r\n                <div class=\"rs-space-data\" data-conf=\"{&quot;uqid&quot;:&quot;69e10d021ec0a&quot;,&quot;space_lg&quot;:&quot;80&quot;,&quot;space_md&quot;:&quot;80&quot;,&quot;space_sm&quot;:&quot;60&quot;,&quot;space_xs&quot;:&quot;60&quot;}\"><\/div>\t\t\t\r\n\t\t\t<\/div>[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/3&#8243; el_class=&#8221;m_p keyword_title&#8221;][vc_column_text]<\/p>\n<h2>Keywords<\/h2>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;2\/3&#8243; el_class=&#8221;m_p keyword&#8221;][vc_row_inner content_placement=&#8221;middle&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDdWwlMjBjbGFzcyUzRCUyMnN0eWxlbGlzdGluZyUyMiUzRSUwQSUyMCUwOSUzQ2xpJTIwc3R5bGUlM0QlMjJsaW5lLWhlaWdodCUzQTM0cHglM0IlMjIlM0VGZWRlcmF0ZWQlMjBMZWFybmluZyUzQyUyRmxpJTNFJTBBJTNDJTJGdWwlM0U=[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDdWwlMjBjbGFzcyUzRCUyMnN0eWxlbGlzdGluZyUyMiUzRSUwQSUyMCUwOSUzQ2xpJTIwc3R5bGUlM0QlMjJsaW5lLWhlaWdodCUzQTM0cHglM0IlMjIlM0VNdWx0aS1QYXJ0eSUyMENvbXB1dGF0aW9uJTNDJTJGbGklM0UlMEElM0MlMkZ1bCUzRQ==[\/vc_raw_html][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_raw_html]JTNDdWwlMjBjbGFzcyUzRCUyMnN0eWxlbGlzdGluZyUyMiUzRSUwQSUyMCUwOSUzQ2xpJTIwc3R5bGUlM0QlMjJsaW5lLWhlaWdodCUzQTM0cHglM0IlMjIlM0VIb21vbW9ycGhpYyUyMEVuY3J5cHRpb24lM0MlMkZsaSUzRSUwQSUzQyUyRnVsJTNF[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column]<div id=\"rs-space-69e10d021ec45\" class=\"rs-space\">\r\n                <div class=\"rs-space-data\" data-conf=\"{&quot;uqid&quot;:&quot;69e10d021ec45&quot;,&quot;space_lg&quot;:&quot;80&quot;,&quot;space_md&quot;:&quot;80&quot;,&quot;space_sm&quot;:&quot;60&quot;,&quot;space_xs&quot;:&quot;60&quot;}\"><\/div>\t\t\t\r\n\t\t\t<\/div>[\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;bg&#8221; css=&#8221;.vc_custom_1657248474326{padding-top: 50px !important;padding-bottom: 50px !important;}&#8221;][vc_column][vc_column_text css=&#8221;.vc_custom_1689327063310{margin-bottom: 20px !important;}&#8221;]<\/p>\n<h3 style=\"text-align: center; color: #fff;\">Download<\/h3>\n<p>[\/vc_column_text][vc_row_inner content_placement=&#8221;middle&#8221;][vc_column_inner el_class=&#8221;download_btn_wrap&#8221;][vc_btn title=&#8221;PDF&#8221; style=&#8221;flat&#8221; color=&#8221;white&#8221; align=&#8221;center&#8221; link=&#8221;url:https%3A%2F%2Fieeexplore.ieee.org%2Fdocument%2F9874673|target:_blank&#8221; el_class=&#8221;download_btn&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_row_inner el_class=&#8221;md-full-col&#8221;][vc_column_inner el_class=&#8221;m_p&#8221; width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1689325188509{margin-bottom: 20px !important;}&#8221;] IEEE International Conference on Multimedia Information Processing and Retrieval (IEEE MIPR 2021) [\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1689327011743{margin-bottom: 5px !important;}&#8221;] Authors [\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1689325197392{margin-bottom: 20px !important;}&#8221;] Chih-Fan Hsu, Jing-Lun Huang, Feng-Hao Liu, Ming-Ching Chang, and Wei-Chao Chen [\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1689327021247{margin-bottom: 5px !important;}&#8221;] Published [\/vc_column_text][vc_column_text] 2022\/9\/8 [\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;m_p&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;5044&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221;][vc_column][vc_row_inner content_placement=&#8221;top&#8221; css=&#8221;.vc_custom_1657794580528{margin-bottom:&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":4975,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4901","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/inventec2.mjitec.tw\/en\/wp-json\/wp\/v2\/pages\/4901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inventec2.mjitec.tw\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/inventec2.mjitec.tw\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/inventec2.mjitec.tw\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inventec2.mjitec.tw\/en\/wp-json\/wp\/v2\/comments?post=4901"}],"version-history":[{"count":0,"href":"https:\/\/inventec2.mjitec.tw\/en\/wp-json\/wp\/v2\/pages\/4901\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/inventec2.mjitec.tw\/en\/wp-json\/wp\/v2\/pages\/4975"}],"wp:attachment":[{"href":"https:\/\/inventec2.mjitec.tw\/en\/wp-json\/wp\/v2\/media?parent=4901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}