You are on page 1of 6

2020 IEEE International Conference on Blockchain (Blockchain)

Blockchain-orchestrated machine learning for privacy preserving federated learning


in electronic health data

Jonathan Passerat-Palmbach, Ph.D. Tyler Farnan, M.S.


ConsenSys Health ConsenSys Health
Imperial College London, UK University of California San Diego, USA
jonathan.passerat-palmbach@consensyshealth.com tyler.farnan@consensyshealth.com

Mike McCoy Justin D. Harris Sean T. Manion, Ph.D.


ConsenSys Health Microsoft Corporation ConsenSys Health
Thomas Jefferson University, USA Justin.Harris@microsoft.com https://orcid.org/0000-0002-8911-1457
mike.mccoy@consensyshealth.com

Heather Leigh Flannery Bill Gleim, M.S.


ConsenSys Health ConsenSys Health
heather.flannery@consensyshealth.com bill.gleim@consensyshealth.com

Abstract—Machine learning and blockchain technology have (f) Discarding of poor data accomplished via model poi-
been explored for potential applications in medicine with only soning attack prevention techniques
modest success to date. Focus has shifted to exploring the
intersection of these technologies along with other privacy 1. Introduction
preserving encryption techniques for better utility. This com-
bination applied to federated learning, which allows remote A number of newly emerging and rapidly advancing
execution of function and analysis without the need to move technologies have been maturing in healthcare and life
highly regulated personal health information, seems to be the science applications in recent years. This acceleration has
key to successful applications of these technologies to rapidly surged in recent months in response to the SARS-CoV-
advance evidence-based medicine. We give a brief history of 2 coronavirus pandemic. These healing edge technologies
these technologies in medicine, outlining some of the challenges include applications of blockchain and distributed ledger
with successful use. We then explore a more detailed combina- technologies (DLT), artificial intelligence advances partic-
tion of usage with an emphasis on decentralizing or federating ularly in the area of machine learning, and an array of
the learning process along with auditability and incentivization encryption and privacy preserving techniques. Much of the
blockchain can allow in the machine learning process. Based progress in applying these different technologies to health
on the cost-benefit analysis of previous efforts, we provide the has moved forward in parallel in the past. Recently there has
framework for an advanced blockchain-orchestrated machine
been increased interest in aligning these powerful tools to
learning system for privacy preserving federated learning in
create new utility that is more than just a sum of the parts.
Our work here is intended to present a novel framework
medicine and a new utility in health. Six critical elements for
pushing this integrated edge further, outlining a blockchain-
this approach in the future will be:
orchestrated machine learning platform for privacy preserv-
(a) Data and analytic processes discoverable on secure
ing federated learning intended to accelerate evidence-based
public blockchain while retaining privacy of the data and
medicine forward and improve health outcomes while ad-
analytic processes vancing patient trust in the overall learning health systems.
(b) Value fabricated by generating data/compute matches When machine learning for medicine first began to take
that were previously illegal, unethical and infeasible root in the late 1970s and early 1980s large amounts of
(c) Compute guarantees provided by federated learning data collection and storage were considered critical for any
and advanced cryptography intelligent system [1]. Early pilots from the late 1980s to
(d) Privacy guarantees provided by software (e.g., Homo- the early 2000s applied the tech to medical fields ranging
morphic Encryption, Secure Multi-Party Computation, ...) and from internal medicine [2] and histology [3] all the way to
hardware (e.g., Intel SGX and AMD SEV-SNP) cryptography unexplained phenomena in complementary medicine [4]. In
(e) Data quality incentivized via tokenized reputation-based parallel with the rise in computer use and capabilities in
rewards healthcare over the past two decades, machine learning in

978-0-7381-0495-9/20/$31.00 ©2020 IEEE 550


DOI 10.1109/Blockchain50366.2020.00080

Authorized licensed use limited to: University of Gothenburg. Downloaded on December 19,2020 at 02:33:33 UTC from IEEE Xplore. Restrictions apply.
medicine has risen exponentially over that time with a search by works in the literature using blockchain-based strategies
for the term “machine learning” in PubMed showing 24 re- [14].
sults in 1999 and growing to 511 in 2009 and 9,341 in 2019.
The applications cross almost every field of medicine with 2.1. Decentralizing the Learning Process
particular concentration in those fields with large amounts of
data and noise such as genomics [5] and mental health [6]. The main source of centralization in FL networks is the
Despite this widespread use, current challenges ranging from aggregation actor collecting the updates from each of the
health privacy regulations, limited access to and quality of participants, in order to combine them and produce a new
data for training, and lack of health data standards [7] have version of the model. This actor can be implemented by a
limited clinical utility and impact of this technology. trusted third-party, or via a central actor possessing secure
The rapid advance of blockchain and other distributed hardware such as Intel SGX. However, if the central server
ledger technologies has been much more recent, having only fails, all training is stopped. A malicious central server
been seriously explored in medicine in the last half decade. could also compute global aggregations incorrectly, censor
It has been a feverish pace of exploration and innovation individual clients’ contributions or otherwise sabotage the
since the United States Department of Health and Human training process in any number of ways.
Services hosted a white paper contest for Blockchain in Blockchains offer the ability to decentralize the coor-
Healthcare and Life Sciences in 2016 [8] boosting atten- dination process. Among existing literature, [16] maps the
tion to many of the possible medical applications including traditional elements of a blockchain to the various stages of
billing, medical supply chain and internet of things [IoT], the FL protocol: blocks represent a training round, transac-
clinical research, electronic health records and more. The tions within each block represent model updates from clients
overarching impact this distributed tech can have on trust, in that round. With this in place, each client can look up
provenance of data, and incentivization of multiple stake- the model updates in the previous communication round (i.e.
holders across complex health systems has attracted a lot all transactions recorded in the latest block) and perform the
of initial interest in many areas [9] but still only modest aggregation themselves to get the latest global model.
advances as a stand alone emerging tech in medicine [10]. Similarly, the BAFFLE protocol [17] proposes to elimi-
In the past few years there has been greater interest in the nate the central aggregator to make the process transparent,
synergy that can be achieved from using these technologies and by doing so prevent some forms of model poisoning.
together towards a coordinated goal. Efforts have begun to The authors assume that the global model copy and the
look at general use for health data [11] as well as specific associated computational state can be maintained on a smart
applications relating to IoT, sensors and medical devices contract. While the approach of chunking models to make
[12]. This includes some applications of an array of privacy them fit into a transaction and blocks is appealing from
preserving encryption techniques [13]. a decentralization point of view, it raises concerns with
We organize the following sections of this position paper regards to the privacy of the updates and the portability
as follows: Section 2 reviews the existing works combining of such a method to public blockchains from a cost and
AI and blockchain. We subsequently stress the major risks scalability perspective.
and benefits involved when deploying these solutions in a The Ethereum public blockchain is at the heart of the
healthcare context in Section 3. Finally, Section 4 sketches proposal in [18]. Here the goal is to consider the model a
the main features of a modern utility framework providing common good that is collaboratively trained and publicly
accountability, decentralized governance, and incentives for available for inference at all times. The costs of using a
AI in healthcare. public blockchain are here more justified as supported by a
wider community, with the goal to create a public and free
common good.
2. Current Applications Finally, ModelChain [19] presents an alternative applica-
tion of blockchain technology to decentralize machine learn-
In this section we will review more closely the works ing. This work introduces a proof-of-information consensus
making a joint use of both blockchain and machine learning algorithm that uses model-level metadata to determine the
solutions. A broader and systematic review on the conver- highest priority data site to be selected for the next training
gence of AI and DLTs can be found in [14]. We are focusing round. Unlike the canonical federated averaging protocol,
on the work involving the role played by blockchains in where each round’s global model is an aggregate of multiple
collaborative learning networks. sites’ training updates, ModelChain describes a sequential
The most common setting for collaborative learning learning protocol, where each round’s global model is the
networks is federated learning (FL), and in particular the result of a single site’s training update.
federated averaging (FA) protocol introduced by Google
[15]. FL ensures that data do not leave the premises of their 2.2. Auditability and Incentives
owner, only the updates to the global model do. However,
the use of the FA protocol is known not to be robust Another commonly cited weakness of FL networks is
to problems of model poisoning, centralization or lack of that data owners have no incentive to participate. An ideal
incentive. These three shortcomings have been addressed improvement would be reward participants according to the

551

Authorized licensed use limited to: University of Gothenburg. Downloaded on December 19,2020 at 02:33:33 UTC from IEEE Xplore. Restrictions apply.
value of their data. Kang et al. [20], [21] explore how on the coordinating server [26]. Typically this process of
a blockchain network could be designed to accommodate aggregation can take weeks to months to verify and become
for these constraints. Their blockchain is used to record a optimized for clinical settings. Whereas in this model, the
‘reputation’ value for each data owner based on past expe- time saved to access this information can be accomplished
riences. They suggest using a scheme such as RONI [22] in a number of days by performing local updates, commu-
or FoolsGold [23] to detect and reject malicious updates, nicating less frequently with central server addresses, and
hereby addressing the model poisoning issue at the same automating the process for all permissioned partners.
time. These decisions are recorded on the blockchain and Privacy is also key in building out FL networks. The goal
used to calculate a reputation for each client. Clients are is for each actor in this system to learn nothing more than
selected for future training rounds based on their reputation, the information needed to play their role, for example, when
and only selected clients receive rewards. an analyst needs to determine whether a particular metric
One downside of this protocol is that clients are posi- exceeds a desired clinical result in order to authorize an
tively rewarded for any update that does not get classified algorithm to end users. With federated learning, that answer
as malicious. Consequently, two clients who make the same is the only bit of information that would be available to the
number of updates will always receive the same reward, re- analyst. This means neither the training data nor the model
gardless of the relative quality of their data. This is also true parameters can be compromised, while also giving users
for clients who would have updates considered as malicious. only the output of the desired information and not forgoing
Reference [24] introduces a variation by having the miners any of the data that was needed for the training.
perform the aggregation . Other miners perform the same Every participant in the system can feel assured that no
aggregation and do not accept a block if the aggregation personal information about themselves and others will be re-
is calculated incorrectly. This protocol can only work with vealed by their participation in the network. Participants will
private blockchains as it requires modifying the algorithm be able to use this understanding to make informed choices
computed by miners. It would thus be impossible to deploy about how and whether to participate at all, representing
it to an existing public blockchain. more thoughtful and direct data that will be channeled
As of today, we are only aware of Substra [25] that can through the network.
be considered as production-level framework combining the
benefits of FL and blockchain to record an immutable and
temper-proof audit trail of the actions undertaken as part 3.2. Risks
of the learning process. Substra is used as the backbone of
an FL consortium in the healthcare industry: MELLODY
(https://www.melloddy.eu/). At the time of writing, Substra The feasibility of these networks are highly constrained
does not offer any mechanism for incentives nor advanced by the capabilities of the devices that run the algorithms
aggregation mechanisms. It is also limited to private net- to perform local training and inferencing. This may not
works without adversarial actors as it relies on the non remain a major barrier to entry as most devices, including
Byzantine fault tolerant (BFT) consensus mechanism in smartphones and IoT, are equipped with GPUs or sufficient
Hyperledger Fabric to order transactions. computing hardware to run powerful AI models. Currently it
is limiting to train a network without compromising device
performance and user experience.
3. Cost-Benefit
Training of supervised models requires distinct, labeled
These technologies have the ability to save clinicians data which may be difficult to produce without third-party
and healthcare providers the time it takes to aggregate data involvement. Designing data pipelines precisely is key so
and images, enhance the privacy of clinical data, increase that labels are captured in an implicit way.
the efficiency and effectiveness of administrative tasks for In federated learning, model convergence time takes
clinicians and create robustness for data poisoning attacks. longer in federated setups as compared to the central training
However, those solutions come at the expense of computa- models. There is a challenge with system communication
tional burdens, data uniformity and potentially adding future issues where not all devices participate in the FL process
bottlenecks for those running federated networks in the originally may have connectivity issues, different app usage
future. There also is an underlying question of bias in data, patterns, model training times, irregular updates, etc. FL
users and the experience to platform usability that can be is optimally used when the size of data and its cost for
hindered in this model. FL provides unique solutions to this aggregation from distributed sources are very high.
challenge. The potential to centrally aggregate data and create silos
by large companies for competitive advantage could be an
3.1. Benefits obstacle to adoption of FL models. Effective data protection
policies and appropriate incentives around data cooperation
Aggregation in its current state is a time-consuming can tackle these issues and develop a beneficial ecosystem.
process. When using a solution such as FA, a client can Considerable effort is needed to create FL systems that
run aggregation numbers locally, and then the updated local protect intellectual property and incentivize widespread use
models can be averaged to form the updated global model and adoption.

552

Authorized licensed use limited to: University of Gothenburg. Downloaded on December 19,2020 at 02:33:33 UTC from IEEE Xplore. Restrictions apply.
3.3. Potential Bias privacy-preserving cryptography to include the incentivized
tokenization of multiple stakeholders. We believe this utility
There are machine driven biases and social driven bi- will play a critical role in solving a myriad of previously
ases that can affect a machine learning outcome, which intractable challenges that pervade our health information
become complex in FL. For machines, results can vary due systems and have delayed widespread adoption of these new
to computational bandwidth, amount of time a device is technologies so far.
charged, node storage amounts, and network latency due to
a given geographic region. Whereas socially, if populations In the previous section we have described federated
of potential users do not own devices for socio-economic learning as a promising method that enables collective in-
reasons, they may be underrepresented in the training model, sights without centralizing or sharing data, and we have
and subsequently also under- (or un-)represented in model highlighted reasons why federated learning alone is insuf-
training and evaluation [26]. ficient for adoption in the healthcare industry. However,
It has been observed that biases in the data-generating by examining the integration of federated learning with
process can also drive unfairness in the resulting models blockchain technology and advanced cryptography, one can
learned from this data [27]. This happens due to a lack of begin to observe the potential for complementary solutions
inclusive design principles. This results in users interacting with superior properties rooted in trust, privacy and collabo-
with the product that may not express overall satisfaction. ration. Blockchain technology can enable decentralized co-
Increasing poor experiences for some groups users in ways ordination and governance of the machine learning develop-
which can be difficult to detect while maintaining privacy ment life-cycle and incentives to contribute data science re-
in a federated setting [26]. sources in cooperative environments. In addition, advanced
cryptography can enable verifiable computation and privacy
3.4. Counteracting Bias preserving techniques that provide more rigorous guarantees
Privacy and fairness meet in the context of learning and defense against the security and privacy gaps that the
data representations that are independent of some sensitive federated learning protocol alone cannot address.
attributes while preserving utility for a task of interest.
Indeed, this objective can be motivated both in terms of This utility will support secure, private, and ethical
privacy: to transform data so as to hide private attributes, collaborative machine learning systems across a broad range
and fairness: as a way to make models trained on such of use cases in both enterprise and patient-facing settings. As
representations fair with respect to the attributes, which can an enterprise example, hospitals can collaboratively conduct
combine to lessen bias representations. population studies of electronic health records to identify
FL presents an opportunity to utilize diverse data sets critical disease factors. Such settings will usually be backed
by providing efficient training protocols along with privacy by permissioned blockchain networks. The actors do not
and non-identifiability guarantees for the resulting models. necessarily trust each other and might even be competitors
This means that FL enables training on multi-institutional in some cases. As a result they are willing to possess their
data sets in many domains that previously were not possible own blockchain node to increase their trust in the network
to work together due to geographical or social constraints, and are in a position to operate it on their own premises or
resulting in a practical opportunity to leverage larger, more on a cloud infrastructure they control.
diverse data sets and explore the generalizability of models
which were previously limited to small populations [26]. In patient-facing applications, digital health and preci-
More importantly, it provides an opportunity to im- sion medicine products and services can safely scale appli-
prove the fairness of these models by combining data cations of smart wearable medical devices for continuous
across boundaries which are likely to have been correlated treatment and wellness monitoring. Patients are less pre-
with sensitive attributes. For instance, attendance at spe- pared to run their own blockchain nodes compared to large
cific health or educational institutions may be correlated institutions. Designing an architecture with a permissioned
with individuals’ ethnicity or socioeconomic status. Under- blockchain at its heart in this setting would not bring any
representation in training data is a proven driver of model benefits to the patients, as the node operators would have
unfairness. a disproportionate amount of power on the decentralized
Future FL research can help improve diversity in a ledger. Public blockchains/DLTs are thus required when
federated training setting, while allowing the fairness of the conceiving patient-facing networks in order to establish trust
resulting model to be increased. This includes learning and in the ledger across all stakeholders. These networks might
quantifies the interplay between diversity, fairness, privacy, not be ready to scale up to a large user base at at present,
and performance for optimal diversity in data aggregation. yet the ambitious road maps exposed by forefront level 1
projects, as well as the constant progress made in increasing
4. Advanced Framework throughput and reducing network fees via level 2 solutions
lead us to believe public blockchain for AI networks will
We are building foundational utility infrastructure to become practical in the near future. Ultimately, we aim to
enable solutions that emerge from the convergence of feder- transform the healthcare system to be more trusted, acces-
ated machine learning, blockchain technology, and advanced sible, collaborative and patient-centric.

553

Authorized licensed use limited to: University of Gothenburg. Downloaded on December 19,2020 at 02:33:33 UTC from IEEE Xplore. Restrictions apply.
5. Conclusion [2] K. P. Adlassnig and G. Kolarz, “Representation and semiau-
tomatic acquisition of medical knowledge in CADIAG-1 and
CADIAG-2,” Computers and Biomedical Research, an International
Incentive mechanisms for contributing quality data will Journal, vol. 19, no. 1, pp. 63–79, Feb. 1986, tex.ids: adlass-
be important in developing decentralized FL applications nig representation 1986-1.
that can train on private data. In non-FL systems, people [3] P. H. Bartels, J. E. Weber, and L. Duckstein, “Machine learning in
were incentivized to share data with centralized services quantitative histopathology,” Analytical and Quantitative Cytology
in exchange for storage and improved machine learning and Histology, vol. 10, no. 4, pp. 299–306, Aug. 1988, tex.ids:
models based on their data. Now with FL, your data is only bartels machine 1988-1.
stored on your devices and the model gets updated based [4] I. Kononenko, “Machine learning for medical diagnosis: history, state
on others’ data and your data directly on your device. One of the art and perspective,” Artificial Intelligence in Medicine, vol. 23,
no. 1, pp. 89–109, Aug. 2001, tex.ids: kononenko machine 2001-1.
Nash equilibrium in a typical FL setting is for no one to
actually share model updates with others in the network. [5] J. Wu and Y. Zhao, “Machine learning technology in the application
of genome analysis: A systematic review,” Gene, vol. 705, pp. 149–
To encourage active participation in the network, incentives 156, Jul. 2019, tex.ids: wu machine 2019-1.
for good quality data should be introduced. The quality of
[6] A. B. R. Shatte, D. M. Hutchinson, and S. J. Teague, “Machine learn-
one’s data to the network can be determined in several ing in mental health: a scoping review of methods and applications,”
ways, more research and simulations should be done to Psychological Medicine, vol. 49, no. 9, pp. 1426–1448, 2019, tex.ids:
find incentive mechanisms that benefit contributors while shatte machine 2019-1.
improving a model’s quality and avoiding bias. This is es- [7] Z. Zhang and E. Sejdić, “Radiological images and machine
pecially important in healthcare where a patient’s life can be learning: trends, perspectives, and prospects,” Computers in biology
saved if a model is able to learn from the experience of other and medicine, vol. 108, pp. 354–370, May 2019, tex.ids:
zhang radiological 2019-1 tex.pmcid: PMC6531364. [Online].
patients. Using a blockchain to track these incentives and Available: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6531364/
model contributions is essential for security and persistence.
[8] Use of Blockchain in Health IT and Health-related Research
Six critical elements for this approach in the future will Challenge. [Online]. Available: https://www.cccinnovationcenter.
be: com/challenges/block-chain-challenge/view-winners/
(a) Data and analytic processes discoverable on secure [9] S. Abdullah, S. Rothenberg, E. Siegel, and W. Kim, “School of Block-
public blockchain while retaining privacy of the data and Review of Blockchain for the Radiologists,” Academic Radiology,
analytic processes vol. 27, no. 1, pp. 47–57, 2020, tex.ids: abdullah school 2020-1.
(b) Value fabricated by generating data/compute matches [10] H. M. Hussien, S. M. Yasin, S. N. I. Udzir, A. A. Zaidan, and
that were previously illegal, unethical and infeasible B. B. Zaidan, “A Systematic Review for Enabling of Develop a
(c) Compute guarantees provided by federated learning Blockchain Technology in Healthcare Application: Taxonomy, Sub-
stantially Analysis, Motivations, Challenges, Recommendations and
and advanced cryptography Future Direction,” Journal of Medical Systems, vol. 43, no. 10, p.
(d) Privacy guarantees provided by software (e.g., Ho- 320, Sep. 2019, tex.ids: hussien systematic 2019-1.
momorphic Encryption, Secure Multi-Party Computation, [11] M. Jones, M. Johnson, M. Shervey, J. T. Dudley, and N. Zimmerman,
...) and hardware (e.g., Intel SGX and AMD SEV-SNP) “Privacy-Preserving Methods for Feature Engineering Using
cryptography Blockchain: Review, Evaluation, and Proof of Concept,” Journal
of Medical Internet Research, vol. 21, no. 8, Aug. 2019, tex.ids:
(e) Data quality incentivized via tokenized reputation- jones privacy-preserving 2019-1 tex.pmcid: PMC6712958. [Online].
based rewards Available: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6712958/
(f) Discarding of poor data accomplished via model [12] H. Mrabet, S. Belguith, A. Alhomoud, and A. Jemai, “A
poisoning attack prevention techniques Survey of IoT Security Based on a Layered Architecture of
We continue to explore and advance this framework with Sensing and Data Analysis,” Sensors, vol. 20, no. 13, p.
public and private partners to iteratively advance the model 3625, Jan. 2020, tex.ids: mrabet survey 2020-1 tex.copyright:
http://creativecommons.org/licenses/by/3.0/. [Online]. Available:
leading to a fundamental transformation of learning and https://www.mdpi.com/1424-8220/20/13/3625
improvements in evidence-based medicine and improved
[13] J. Passerat-Palmbach, T. Farnan, R. Miller, M. S. Gross, H. L.
health outcomes in global healthcare. Flannery, and B. Gleim, “A blockchain-orchestrated Federated
Learning architecture for healthcare consortia,” arXiv:1910.12603
[cs], Oct. 2019. [Online]. Available: http://arxiv.org/abs/1910.12603
Acknowledgments
[14] K. D. Pandl, S. Thiebes, M. Schmidt-Kraepelin, and
A. Sunyaev, “On the Convergence of Artificial Intelligence
The authors would like to thank Robert Miller of Con- and Distributed Ledger Technology: A Scoping Review and
senSys Health and Marielle S. Gross, MD, MBE of the Future Research Agenda,” IEEE Access, vol. 8, pp. 57 075–57 095,
Johns Hopkins Berman Institute of Bioethics for their con- 2020, tex.ids: pandl convergence 2020, pandl convergence 2020-1.
tribution to the discussion of these concepts. [Online]. Available: https://ieeexplore.ieee.org/document/9039606/
[15] H. B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y.
Arcas, “Communication-Efficient Learning of Deep Networks from
References Decentralized Data,” arXiv:1602.05629 [cs], Feb. 2017. [Online].
Available: http://arxiv.org/abs/1602.05629
[1] “Ascent of machine learning in medicine,” Nature Materials, [16] H. Kim, J. Park, M. Bennis, and S.-L. Kim, “Blockchained
vol. 18, no. 5, pp. 407–407, May 2019. [Online]. Available: On-Device Federated Learning,” arXiv:1808.03949 [cs, math], Jul.
https://doi.org/10.1038/s41563-019-0360-1 2019. [Online]. Available: http://arxiv.org/abs/1808.03949

554

Authorized licensed use limited to: University of Gothenburg. Downloaded on December 19,2020 at 02:33:33 UTC from IEEE Xplore. Restrictions apply.
[17] P. Ramanan and K. Nakayama, “BAFFLE : Blockchain Based
Aggregator Free Federated Learning,” arXiv:1909.07452 [cs, stat],
May 2020. [Online]. Available: http://arxiv.org/abs/1909.07452
[18] J. D. Harris and B. Waggoner, “Decentralized and Collabora-
tive AI on Blockchain,” in 2019 IEEE International Conference
on Blockchain (Blockchain), Jul. 2019, pp. 368–375, tex.ids: har-
ris decentralized 2019-2.
[19] T.-T. Kuo and L. Ohno-Machado, “Modelchain: Decentralized
privacy-preserving healthcare predictive modeling framework on pri-
vate blockchain networks,” arXiv preprint arXiv:1802.01746, 2018.
[20] J. Kang, Z. Xiong, D. Niyato, S. Xie, and J. Zhang, “Incentive
Mechanism for Reliable Federated Learning: A Joint Optimization
Approach to Combining Reputation and Contract Theory,” IEEE
Internet of Things Journal, vol. 6, no. 6, pp. 10 700–10 714, Dec.
2019.
[21] J. Kang, Z. Xiong, D. Niyato, H. Yu, Y.-C. Liang, and D. I.
Kim, “Incentive Design for Efficient Federated Learning in Mobile
Networks: A Contract Theory Approach,” arXiv:1905.07479 [cs],
Oct. 2019. [Online]. Available: http://arxiv.org/abs/1905.07479
[22] M. Barreno, B. Nelson, A. D. Joseph, and J. D. Tygar,
“The security of machine learning,” Machine Learning, vol. 81,
no. 2, pp. 121–148, Nov. 2010. [Online]. Available: https:
//doi.org/10.1007/s10994-010-5188-5
[23] C. Fung, C. J. M. Yoon, and I. Beschastnikh, “Mitigating Sybils
in Federated Learning Poisoning,” arXiv:1808.04866 [cs, stat], May
2019. [Online]. Available: http://arxiv.org/abs/1808.04866
[24] Y. Zhao, J. Zhao, L. Jiang, R. Tan, and D. Niyato, “Mobile Edge
Computing, Blockchain and Reputation-based Crowdsourcing IoT
Federated Learning: A Secure, Decentralized and Privacy-preserving
System,” arXiv:1906.10893 [cs, eess], Apr. 2020. [Online]. Available:
http://arxiv.org/abs/1906.10893
[25] M. N. Galtier and C. Marini, “Substra: a framework for
privacy-preserving, traceable and collaborative Machine Learning,”
arXiv:1910.11567 [cs], Oct. 2019. [Online]. Available: http:
//arxiv.org/abs/1910.11567
[26] P. Kairouz, H. B. McMahan, B. Avent, A. Bellet, M. Bennis, A. N.
Bhagoji, K. Bonawitz, Z. Charles, G. Cormode, R. Cummings,
R. G. L. D’Oliveira, S. E. Rouayheb, D. Evans, J. Gardner,
Z. Garrett, A. Gascón, B. Ghazi, P. B. Gibbons, M. Gruteser,
Z. Harchaoui, C. He, L. He, Z. Huo, B. Hutchinson, J. Hsu,
M. Jaggi, T. Javidi, G. Joshi, M. Khodak, J. Konečný, A. Korolova,
F. Koushanfar, S. Koyejo, T. Lepoint, Y. Liu, P. Mittal, M. Mohri,
R. Nock, A. Özgür, R. Pagh, M. Raykova, H. Qi, D. Ramage,
R. Raskar, D. Song, W. Song, S. U. Stich, Z. Sun, A. T. Suresh,
F. Tramèr, P. Vepakomma, J. Wang, L. Xiong, Z. Xu, Q. Yang,
F. X. Yu, H. Yu, and S. Zhao, “Advances and Open Problems
in Federated Learning,” arXiv:1912.04977 [cs, stat], Dec. 2019.
[Online]. Available: http://arxiv.org/abs/1912.04977
[27] L. Eckhouse, K. Lum, C. Conti-Cook, and J. Ciccolini, “Layers of
Bias: A Unified Approach for Understanding Problems With Risk
Assessment,” Criminal Justice and Behavior, vol. 46, no. 2, pp. 185–
209, Feb. 2019, tex.ids: eckhouse layers 2018 tex.copyright: 
c 2018
International Association for Correctional and Forensic Psychology.
[Online]. Available: https://doi.org/10.1177/0093854818811379

555

Authorized licensed use limited to: University of Gothenburg. Downloaded on December 19,2020 at 02:33:33 UTC from IEEE Xplore. Restrictions apply.

You might also like