Towards practical data alignment in production federated learning

Yexuan SHI, Wei YU, Yuanyuan ZHANG, Chunbo XUE, Yuxiang ZENG, Zimu ZHOU, Manxue GUO, Lun XIN, Wenjing NIE

PDF(1250 KB)
PDF(1250 KB)
Front. Comput. Sci. ›› 2025, Vol. 19 ›› Issue (1) : 191603. DOI: 10.1007/s11704-024-3936-0
Information Systems
LETTER

Towards practical data alignment in production federated learning

Author information +
History +

Graphical abstract

Cite this article

Download citation ▾
Yexuan SHI, Wei YU, Yuanyuan ZHANG, Chunbo XUE, Yuxiang ZENG, Zimu ZHOU, Manxue GUO, Lun XIN, Wenjing NIE. Towards practical data alignment in production federated learning. Front. Comput. Sci., 2025, 19(1): 191603 https://doi.org/10.1007/s11704-024-3936-0

References

[1]
Yang Q, Liu Y, Chen T, Tong Y . Federated machine learning: concept and applications. ACM Transactions on Intelligent Systems and Technology, 2019, 10( 2): 12
[2]
Zhang K, Song X, Zhang C, Yu S . Challenges and future directions of secure federated learning: a survey. Frontiers of Computer Science, 2022, 16( 5): 165817
[3]
Liu F, Zheng Z, Shi Y, Tong Y, Zhang Y . A survey on federated learning: a perspective from multi-party computation. Frontiers of Computer Science, 2024, 18( 1): 181336
[4]
Kolesnikov V, Kumaresan R, Rosulek M, Trieu N. Efficient batched oblivious PRF with applications to private set intersection. In: Proceedings of 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016, 818−829
[5]
Chase M, Miao P. Private set intersection in the internet setting from lightweight oblivious PRF. In: Proceedings of the 40th Annual International Cryptology Conference on Advances in Cryptology. 2020, 34−63
[6]
Pinkas B, Rosulek M, Trieu N, Yanai A. SpOT-light: lightweight private set intersection from sparse OT extension. In: Proceedings of the 39th Annual International Cryptology Conference on Advances in Cryptology. 2019, 401−431
[7]
Chen H, Laine K, Rindal P. Fast private set intersection from homomorphic encryption. In: Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017, 1243−1255

Acknowledgements

This work was partially supported by the National Natural Science Foundation of China (Grant Nos. U21A20516, 62076017, and 6233000216), the Beihang University Basic Research Funding (No. YWF-22-L-531), and the CCF-Huawei Populus Grove Fund (CCF-HuaweiDB202310).

Competing interests

The authors declare that they have no competing interests or financial conflicts to disclose.

Electronic supplementary material

Supplementary material is available in the online version of this article at journal.hep.com.cn and link.springer.com.

RIGHTS & PERMISSIONS

2025 Higher Education Press
AI Summary AI Mindmap
PDF(1250 KB)

Accesses

Citations

Detail

Sections
Recommended

/