{"@context":{"@vocab":"https://cir.nii.ac.jp/schema/1.0/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/","foaf":"http://xmlns.com/foaf/0.1/","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","datacite":"https://schema.datacite.org/meta/kernel-4/","ndl":"http://ndl.go.jp/dcndl/terms/","jpcoar":"https://github.com/JPCOAR/schema/blob/master/2.0/"},"@id":"https://cir.nii.ac.jp/crid/1363388844463399552.json","@type":"Article","productIdentifier":[{"identifier":{"@type":"DOI","@value":"10.1109/tifs.2019.2929409"}},{"identifier":{"@type":"URI","@value":"http://xplorestaging.ieee.org/ielx7/10206/8833568/08765347.pdf?arnumber=8765347"}}],"dc:title":[{"@value":"VerifyNet: Secure and Verifiable Federated Learning"}],"creator":[{"@id":"https://cir.nii.ac.jp/crid/1383388844463399556","@type":"Researcher","foaf:name":[{"@value":"Guowen Xu"}]},{"@id":"https://cir.nii.ac.jp/crid/1383388844463399555","@type":"Researcher","foaf:name":[{"@value":"Hongwei Li"}]},{"@id":"https://cir.nii.ac.jp/crid/1383388844463399553","@type":"Researcher","foaf:name":[{"@value":"Sen Liu"}]},{"@id":"https://cir.nii.ac.jp/crid/1383388844463399552","@type":"Researcher","foaf:name":[{"@value":"Kan Yang"}]},{"@id":"https://cir.nii.ac.jp/crid/1383388844463399554","@type":"Researcher","foaf:name":[{"@value":"Xiaodong Lin"}]}],"publication":{"publicationIdentifier":[{"@type":"PISSN","@value":"15566013"},{"@type":"EISSN","@value":"15566021"}],"prism:publicationName":[{"@value":"IEEE Transactions on Information Forensics and Security"}],"dc:publisher":[{"@value":"Institute of Electrical and Electronics Engineers (IEEE)"}],"prism:publicationDate":"2020","prism:volume":"15","prism:startingPage":"911","prism:endingPage":"926"},"reviewed":"false","dc:rights":["https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html","https://doi.org/10.15223/policy-029","https://doi.org/10.15223/policy-037"],"url":[{"@id":"http://xplorestaging.ieee.org/ielx7/10206/8833568/08765347.pdf?arnumber=8765347"}],"createdAt":"2019-07-17","modifiedAt":"2022-04-27","relatedProduct":[{"@id":"https://cir.nii.ac.jp/crid/1360025430665519488","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"BalancedSecAgg: Toward Fast Secure Aggregation for Federated Learning"}]},{"@id":"https://cir.nii.ac.jp/crid/1360290617657378944","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Federated Learning for Vehicular Internet of Things: Recent Advances and Open Issues"}]},{"@id":"https://cir.nii.ac.jp/crid/1360294643833176704","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"RanSAP: An open dataset of ransomware storage access patterns for training machine learning models"}]},{"@id":"https://cir.nii.ac.jp/crid/1360302865748533504","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Privacy-Preserving Image Classification Using ConvMixer with Adaptative Permutation Matrix and Block-Wise Scrambled Image Encryption"}]},{"@id":"https://cir.nii.ac.jp/crid/1360306906076582784","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"On the Security of Learnable Image Encryption for Privacy-Preserving Deep Learning"}]},{"@id":"https://cir.nii.ac.jp/crid/1360849945230583296","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles"}]},{"@id":"https://cir.nii.ac.jp/crid/1360853567818180736","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Achieving reliable timestamp in the bitcoin platform"}]},{"@id":"https://cir.nii.ac.jp/crid/1360865815688110464","@type":"Article","resourceType":"学術雑誌論文(journal article)","relationType":["isReferencedBy"],"jpcoar:relatedTitle":[{"@value":"Byzantine-Resilient Secure Federated Learning on Low-Bandwidth Networks"}]}],"dataSourceIdentifier":[{"@type":"CROSSREF","@value":"10.1109/tifs.2019.2929409"},{"@type":"CROSSREF","@value":"10.1109/jiot.2019.2938008_references_DOI_GYR7BQC7EzZ5Ws3hBjoEWb7zWua"},{"@type":"CROSSREF","@value":"10.1109/access.2024.3491779_references_DOI_O00vdTpozgJan1zw8LaRUF6gA6w"},{"@type":"CROSSREF","@value":"10.1016/j.fsidi.2021.301314_references_DOI_GYR7BQC7EzZ5Ws3hBjoEWb7zWua"},{"@type":"CROSSREF","@value":"10.1109/ojcs.2020.2992630_references_DOI_GYR7BQC7EzZ5Ws3hBjoEWb7zWua"},{"@type":"CROSSREF","@value":"10.3390/jimaging9040085_references_DOI_GYR7BQC7EzZ5Ws3hBjoEWb7zWua"},{"@type":"CROSSREF","@value":"10.1109/access.2024.3454199_references_DOI_GYR7BQC7EzZ5Ws3hBjoEWb7zWua"},{"@type":"CROSSREF","@value":"10.1007/s12083-020-00905-6_references_DOI_GYR7BQC7EzZ5Ws3hBjoEWb7zWua"},{"@type":"CROSSREF","@value":"10.1109/access.2023.3277858_references_DOI_GYR7BQC7EzZ5Ws3hBjoEWb7zWua"}]}