{"id":"https://openalex.org/W4390546126","doi":"https://doi.org/10.1007/978-981-99-9614-8_3","title":"Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System","display_name":"Privacy-Preserving Authenticated Federated Learning Scheme for Smart Healthcare System","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4390546126","doi":"https://doi.org/10.1007/978-981-99-9614-8_3"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-99-9614-8_3","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"book series"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"book-chapter","type_crossref":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085854367","display_name":"Jun Tu","orcid":"https://orcid.org/0000-0002-4974-9077"},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Tu","raw_affiliation_strings":["School of Computer Science, Hubei University of Technology, Wuhan, 430068, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Hubei University of Technology, Wuhan, 430068, China","institution_ids":["https://openalex.org/I74525822"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052110962","display_name":"Gang Shen","orcid":"https://orcid.org/0000-0002-2783-0907"},"institutions":[{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Shen","raw_affiliation_strings":["School of Computer Science, Hubei University of Technology, Wuhan, 430068, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Hubei University of Technology, Wuhan, 430068, China","institution_ids":["https://openalex.org/I74525822"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":85},"biblio":{"volume":null,"issue":null,"first_page":"38","last_page":"57"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Security Challenges in Cloud Computing","score":0.9935,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6539211},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated Learning","score":0.599635},{"id":"https://openalex.org/keywords/privacy-preserving-computation","display_name":"Privacy-Preserving Computation","score":0.537568},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure Multi-party Computation","score":0.53637},{"id":"https://openalex.org/keywords/secure-computation","display_name":"Secure Computation","score":0.523649},{"id":"https://openalex.org/keywords/searchable-encryption","display_name":"Searchable Encryption","score":0.505081},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.48997346}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.73288095},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.71868503},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.658298},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6539211},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5064515},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.48997346},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17220515},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.15459698},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-99-9614-8_3","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"book series"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1798609567","https://openalex.org/W2070991879","https://openalex.org/W2088492763","https://openalex.org/W2095708839","https://openalex.org/W2132172731","https://openalex.org/W2172174332","https://openalex.org/W2591882872","https://openalex.org/W2912023992","https://openalex.org/W2912213068","https://openalex.org/W2963456518","https://openalex.org/W2969462307","https://openalex.org/W2970606380","https://openalex.org/W3048448986","https://openalex.org/W3088247060","https://openalex.org/W3103245149","https://openalex.org/W3141585064","https://openalex.org/W4220992641","https://openalex.org/W4323793447","https://openalex.org/W4379011606"],"related_works":["https://openalex.org/W4320017490","https://openalex.org/W4313300189","https://openalex.org/W4256358502","https://openalex.org/W3012147850","https://openalex.org/W2956355137","https://openalex.org/W2949835517","https://openalex.org/W2771047361","https://openalex.org/W2625655658","https://openalex.org/W2539930818","https://openalex.org/W2403663234"],"abstract_inverted_index":{"With":[0],"the":[1,24,36,52,56,60,106,110,126,138,144,159,166],"rapid":[2],"advancement":[3],"of":[4,100,148,169],"artificial":[5],"intelligence":[6],"and":[7,19,30,71,102,137,146,154],"network":[8],"technology,":[9],"smart":[10,41,88],"healthcare":[11,42,89],"system":[12,43],"provides":[13],"patients":[14],"with":[15,118],"satisfactory":[16],"medical":[17,28],"experience":[18],"clinical":[20],"diagnosis,":[21],"thus":[22],"alleviating":[23],"imbalance":[25],"between":[26,68],"limited":[27],"resources":[29],"a":[31,81,94,134],"large":[32],"patient":[33,37],"population.":[34],"However,":[35],"privacy":[38],"security":[39,145],"in":[40,55,105],"is":[44,93],"still":[45],"facing":[46],"severe":[47],"challenges.":[48],"Additionally,":[49],"due":[50],"to":[51,76,124,142],"signal":[53],"interruption":[54],"federated":[57,84,96,122],"learning":[58,85,97],"mechanism,":[59],"model":[61,150],"parameters":[62],"can":[63,115,162],"not":[64,163],"be":[65],"transmitted":[66],"normally":[67],"local":[69,149],"user":[70],"central":[72],"server.":[73],"In":[74,109,130],"response":[75],"these":[77],"issues,":[78],"we":[79,132],"propose":[80],"privacy-preserving":[82],"authenticated":[83],"scheme":[86,161],"for":[87,121],"system.":[90],"Specifically,":[91],"there":[92],"hybrid":[95],"framework":[98],"composed":[99],"peer-to-peer":[101],"server-client":[103],"architecture":[104],"proposed":[107,111,160],"scheme.":[108],"scheme,":[112],"data":[113,127,170],"owners":[114],"interact":[116],"directly":[117],"each":[119],"other":[120],"training":[123],"overcome":[125],"silos":[128],"issue.":[129],"addition,":[131],"leverage":[133],"homomorphic":[135],"cryptosystem":[136],"Schnorr":[139],"signature":[140],"algorithm":[141],"ensure":[143],"integrity":[147],"parameters.":[151],"Security":[152],"analysis":[153],"experimental":[155],"results":[156],"show":[157],"that":[158],"only":[164],"protect":[165],"sensitive":[167],"information":[168],"owners,":[171],"but":[172],"also":[173],"has":[174],"high":[175],"efficiency.":[176]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4390546126","counts_by_year":[],"updated_date":"2024-11-23T22:56:08.659664","created_date":"2024-01-04"}