Abstract
Data privacy is a very important issue. Especially in fields like medicine, it is paramount to abide by the existing privacy regulations to preserve patients’ anonymity. However, data is required for research and training machine learning models that could help gain insight into complex correlations or personalised treatments that may otherwise stay undiscovered. Those models generally scale with the amount of data available, but the current situation often prohibits building large databases across sites. So it would be beneficial to be able to combine similar or related data from different sites all over the world while still preserving data privacy. Federated learning has been proposed as a solution for this, because it relies on the sharing of machine learning models, instead of the raw data itself. That means private data never leaves the site or device it was collected on. Federated learning is an emerging research area, and many domains have been identified for the application of those methods. This systematic literature review provides an extensive look at the concept of and research into federated learning and its applicability for confidential healthcare datasets.
- Mohammad Mohammadi Amiri and Deniz Gündüz. 2019. Federateds learning over wireless fading channels. CoRR abs/1907.09769. arXiv:1907.09769 http://arxiv.org/abs/1907.09769.Google Scholar
- Muhammad Ammad-ud-din, Elena Ivannikova, Suleiman A. Khan, Were Oyomno, Qiang Fu, Kuan Eeik Tan, and Adrian Flanagan. 2019. Federated collaborative filtering for privacy-preserving personalized recommendation system. CoRR abs/1901.09888. arXiv:1901.09888 http://arxiv.org/abs/1901.09888.Google Scholar
- Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2018. How to backdoor federated learning. CoRR abs/1807.00459 (2018). arXiv:1807.00459 http://arxiv.org/abs/1807.00459.Google Scholar
- Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, and Seraphin Calo. 2019. Analyzing federated learning through an adversarial lens. In Proceedings of the 36th International Conference on Machine Learning (Proceedings of Machine Learning Research), Kamalika Chaudhuri and Ruslan Salakhutdinov (Eds.), Vol. 97. PMLR, Long Beach, CA, 634–643. Retrieved from http://proceedings.mlr.press/v97/bhagoji19a.html.Google Scholar
- Abhishek Bhowmick, John Duchi, Julien Freudiger, Gaurav Kapoor, and Ryan Rogers. 2018. Protection against reconstruction and its applications in private federated learning. arXiv preprint arXiv:1812.00984 (2018).Google Scholar
- Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, and Karn Seth. 2017. Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’17). ACM, New York, NY, 1175–1191. DOI:DOI:https://doi.org/10.1145/3133956.3133982Google Scholar
Digital Library
- T. S. Brisimi, R. Chen, T. Mela, A. Olshevsky, I. C. Paschalidis, and W. Shi. 2018. Federated learning of predictive models from federated Electronic Health Records. Int. J. Med. Inform. 112 (04 2018), 59–67. Google Scholar
Digital Library
- Sebastian Caldas, Jakub Konecný, H. Brendan McMahan, and Ameet Talwalkar. 2018. CoRR abs/1812.07210 (2018). CoRR abs/1812.07210 (2018). arXiv:1812.07210 http://arxiv.org/abs/1812.07210.Google Scholar
- Di Chai, Leye Wang, Kai Chen, and Qiang Yang. 2019. Secure federated matrix factorization. CoRR abs/1906.05108 (2019). arXiv:1906.05108 http://arxiv.org/abs/1906.05108.Google Scholar
- Fei Chen, Zhenhua Dong, Zhenguo Li, and Xiuqiang He. 2018. Federated meta-learning for recommendation. CoRR abs/1802.07876 (2018). arXiv:1802.07876 http://arxiv.org/abs/1802.07876. Google Scholar
Digital Library
- Yang Chen, Xiaoyan Sun, and Yaochu Jin. 2019. Communication-efficient federated deep learning with asynchronous model update and temporally weighted aggregation. CoRR abs/1903.07424 (2019). arXiv:1903.07424 http://arxiv.org/abs/1903.07424. Google Scholar
Digital Library
- Yiqiang Chen, Jindong Wang, Chaohui Yu, Wen Gao, and Xin Qin. 2019. FedHealth: A federated transfer learning framework for wearable healthcare. CoRR abs/1907.09173 (2019). arXiv:1907.09173 http://arxiv.org/abs/1907.09173.Google Scholar
- Kewei Cheng, Tao Fan, Yilun Jin, Yang Liu, Tianjian Chen, and Qiang Yang. 2019. SecureBoost: A lossless federated learning framework. CoRR abs/1901.08755 (2019). arXiv:1901.08755 http://arxiv.org/abs/1901.08755. Google Scholar
Digital Library
- Luca Corinzia and Joachim M. Buhmann. 2019. Variational federated multi-task learning. CoRR abs/1906.06268 (2019). arXiv:1906.06268 http://arxiv.org/abs/1906.06268.Google Scholar
- Moming Duan. 2019. Astraea: Self-balancing federated learning for improving classification accuracy of mobile deep learning applications. CoRR abs/1907.01132 (2019). arXiv:1907.01132 http://arxiv.org/abs/1907.01132. Google Scholar
Digital Library
- Hubert Eichner, Tomer Koren, H. Brendan McMahan, Nathan Srebro, and Kunal Talwar. 2019. Semi-cyclic stochastic gradient descent. CoRR abs/1904.10120 (2019). arXiv:1904.10120 http://arxiv.org/abs/1904.10120. Google Scholar
Digital Library
- Shaohan Feng, Dusit Niyato, Ping Wang, Dong In Kim, and Ying-Chang Liang. 2018. Joint service pricing and cooperative relay communication for federated learning. CoRR abs/1811.12082 (2018). arXiv:1811.12082 http://arxiv.org/abs/1811.12082. Google Scholar
Digital Library
- Clement Fung, Jamie Koerner, Stewart Grant, and Ivan Beschastnikh. 2018. Dancing in the dark: Private multi-party machine learning in an untrusted setting. CoRR abs/1811.09712 (2018). arXiv:1811.09712 http://arxiv.org/abs/1811.09712.Google Scholar
- Clement Fung, Chris J. M. Yoon, and Ivan Beschastnikh. 2018. Mitigating sybils in federated learning poisoning. CoRR abs/1808.04866 (2018). arXiv:1808.04866 http://arxiv.org/abs/1808.04866. Google Scholar
Digital Library
- S. Gade and N. H. Vaidya. 2018. Privacy-preserving distributed learning via obfuscated stochastic gradients. In Proceedings of the IEEE Conference on Decision and Control (CDC’18). 184–191. DOI:DOI:https://doi.org/10.1109/CDC.2018.8619133Google Scholar
- Robin C. Geyer, Tassilo Klein, and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. CoRR abs/1712.07557 (2017). arXiv:1712.07557 http://arxiv.org/abs/1712.07557.Google Scholar
- Neel Guha, Ameet Talwalkar, and Virginia Smith. 2019. One-shot federated learning. CoRR abs/1902.11175 (2019). arXiv:1902.11175 http://arxiv.org/abs/1902.11175.Google Scholar
- M. Hao, H. Li, G. Xu, S. Liu, and H. Yang. 2019. Towards efficient and privacy-preserving federated deep learning. In Proceedings of the IEEE International Conference on Communications (ICC’19). 1–6. DOI:DOI:https://doi.org/10.1109/ICC.2019.8761267Google Scholar
- Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Richard Nock, Giorgio Patrini, Guillaume Smith, and Brian Thorne. 2017. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. CoRR abs/1711.10677 (2017). arXiv:1711.10677 http://arxiv.org/abs/1711.10677.Google Scholar
- Valentin Hartmann, Konark Modi, Josep M. Pujol, and Robert West. 2019. Privacy-preserving classification with secret vector machines. CoRR abs/1907.03373 (2019). arXiv:1907.03373 http://arxiv.org/abs/1907.03373.Google Scholar
- X. He, Q. Ling, and T. Chen. 2019. Byzantine-robust stochastic gradient descent for distributed low-rank matrix completion. In Proceedings of the IEEE Data Science Workshop (DSW’19). 322–326. DOI:DOI:https://doi.org/10.1109/DSW.2019.8755575 Google Scholar
Digital Library
- Briland Hitaj, Giuseppe Ateniese, and Fernando Pérez-Cruz. 2017. Deep models under the GAN: Information leakage from collaborative deep learning. CoRR abs/1702.07464 (2017). arXiv:1702.07464 http://arxiv.org/abs/1702.07464. Google Scholar
Digital Library
- B. Hu, Y. Gao, L. Liu, and H. Ma. 2018. Federated region-learning: An edge computing based framework for urban environment sensing. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’18). 1–7. DOI:DOI:https://doi.org/10.1109/GLOCOM.2018.8647649Google Scholar
- Yao Hu, Xiaoyan Sun, Yang Chen, and Zishuai Lu. 2019. Model and feature aggregation based federated learning for multi-sensor time series trend following. In Advances in Computational Intelligence, Ignacio Rojas, Gonzalo Joya, and Andreu Catala (Eds.). Springer International Publishing, Cham, 233–246. Google Scholar
- Li Huang and Dianbo Liu. 2019. Patient clustering improves efficiency of federated machine learning to predict mortality and hospital stay time using distributed electronic medical records. CoRR abs/1903.09296 (2019). arXiv:1903.09296 http://arxiv.org/abs/1903.09296.Google Scholar
- Li Huang, Yifeng Yin, Zeng Fu, Shifa Zhang, Hao Deng, and Dianbo Liu. 2018. LoAdaBoost: Loss-based adaboost federated machine learning on medical data. CoRR abs/1811.12629 (2018). arXiv:1811.12629 http://arxiv.org/abs/1811.12629.Google Scholar
- Shaoxiong Ji, Shirui Pan, Guodong Long, Xue Li, Jing Jiang, and Zi Huang. 2018. Learning private neural language modeling with attentive aggregation. CoRR abs/1812.07108 (2018). arXiv:1812.07108 http://arxiv.org/abs/1812.07108.Google Scholar
- Eugene Kharitonov. 2019. Federated online learning to rank with evolution strategies. In Proceedings of the 12th ACM International Conference on Web Search and Data Mining (WSDM’19). ACM, New York, NY, 249–257. DOI:DOI:https://doi.org/10.1145/3289600.3290968 Google Scholar
Digital Library
- Jakub Konecný, Brendan McMahan, and Daniel Ramage. 2015. Federated optimization: Distributed optimization beyond the datacenter. CoRR abs/1511.03575 (2015). arXiv:1511.03575 http://arxiv.org/abs/1511.03575.Google Scholar
- Jakub Konecný, H. Brendan McMahan, Daniel Ramage, and Peter Richtárik. 2016. Federated optimization: Distributed machine learning for on-device intelligence. CoRR abs/1610.02527 (2016). arXiv:1610.02527 http://arxiv.org/abs/1610.02527.Google Scholar
- Jakub Konecný, H. Brendan McMahan, Felix X. Yu, Peter Richtárik, Ananda Theertha Suresh, and Dave Bacon. 2016. Federated learning: Strategies for improving communication efficiency. CoRR abs/1610.05492 (2016). arXiv:1610.05492 http://arxiv.org/abs/1610.05492. Google Scholar
Digital Library
- Jakub Konecný and Peter Richtárik. 2016. Randomized distributed mean estimation: Accuracy vs. communication. CoRR abs/1611.07555 (2016). arXiv:1611.07555 http://arxiv.org/abs/1611.07555.Google Scholar
- Antti Koskela and Antti Honkela. 2018. Learning rate adaptation for federated and differentially private learning descent. CoRR abs/1809.03832 (2018). arXiv:1809.03832 http://arxiv.org/abs/1809.03832. Google Scholar
Digital Library
- Junghye Lee, Jimeng Sun, Fei Wang, Shuang Wang, Chi-Hyuck Jun, and Xiaoqian Jiang. 2018. Privacy-preserving patient similarity learning in a federated environment: Development and analysis. JMIR Med. Inform. 6, 2 (13 Apr. 2018), e20. DOI:DOI:https://doi.org/10.2196/medinform.7744Google Scholar
- David Leroy, Alice Coucke, Thibaut Lavril, Thibault Gisselbrecht, and Joseph Dureau. 2019. Federated learning for keyword spotting. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’19). IEEE, 6341–6345. Google Scholar
Digital Library
- Tian Li, Maziar Sanjabi, and Virginia Smith. 2019. Fair resource allocation in federated learning. CoRR abs/1905.10497 (2019). arXiv:1905.10497 http://arxiv.org/abs/1905.10497.Google Scholar
- Y. Li, X. Jiang, S. Wang, H. Xiong, and L. Ohno-Machado. 2016. VERTIcal Grid lOgistic regression (VERTIGO). J. Amer. Med. Inform. Assoc. 23, 3 (05 2016), 570–579.Google Scholar
Cross Ref
- Yujun Lin, Song Han, Huizi Mao, Yu Wang, and William J. Dally. 2017. Deep gradient compression: Reducing the communication bandwidth for distributed training. CoRR abs/1712.01887 (2017).Google Scholar
- Dianbo Liu, Timothy Miller, Raheel Sayeed, and Kenneth D. Mandl. 2018. FADL: Federated-autonomous deep learning for distributed electronic health record. CoRR abs/1811.11400 (2018). arXiv:1811.11400 http://arxiv.org/abs/1811.11400.Google Scholar
- Yang Liu, Tianjian Chen, and Qiang Yang. 2018. Secure federated transfer learning. CoRR abs/1812.03337 (2018). arXiv:1812.03337 http://arxiv.org/abs/1812.03337.Google Scholar
- Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, and Robert H. Deng. 2019. Boosting privately: Privacy-preserving federated extreme boosting for mobile crowdsensing. CoRR abs/1907.10218 (2019). arXiv:1907.10218 http://arxiv.org/abs/1907.10218.Google Scholar
- H. Brendan McMahan, Eider Moore, Daniel Ramage, and Blaise Agüera y Arcas. 2016. Federated learning of deep networks using model averaging. CoRR abs/1602.05629 (2016). arXiv:1602.05629 http://arxiv.org/abs/1602.05629.Google Scholar
- H. Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. 2017. Learning differentially private language models without losing accuracy. CoRR abs/1710.06963 (2017). arXiv:1710.06963 http://arxiv.org/abs/1710.06963.Google Scholar
- Luca Melis, Congzheng Song, Emiliano De Cristofaro, and Vitaly Shmatikov. 2019. Exploiting unintended feature leakage in collaborative learning. In Proceedings of the IEEE Symposium on Security and Privacy. 691–706. DOI:DOI:https://doi.org/10.1109/SP.2019.00029Google Scholar
Cross Ref
- Mehryar Mohri, Gary Sivek, and Ananda Theertha Suresh. 2019. Agnostic federated learning. CoRR abs/1902.00146 (2019). arXiv:1902.00146 http://arxiv.org/abs/1902.00146.Google Scholar
- M. Nasr, R. Shokri, and A. Houmansadr. 2019. Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. In Proceedings of the IEEE Symposium on Security and Privacy (SP’19). IEEE Computer Society, Los Alamitos, CA, 1021–1035. DOI:DOI:https://doi.org/10.1109/SP.2019.00065Google Scholar
- Takayuki Nishio and Ryo Yonetani. 2018. Client selection for federated learning with heterogeneous resources in mobile edge. CoRR abs/1804.08333 (2018). arXiv:1804.08333 http://arxiv.org/abs/1804.08333.Google Scholar
- Richard Nock, Stephen Hardy, Wilko Henecka, Hamish Ivey-Law, Giorgio Patrini, Guillaume Smith, and Brian Thorne. 2018. Entity resolution and federated learning get a federated resolution. CoRR abs/1803.04035 (2018). arXiv:1803.04035 http://arxiv.org/abs/1803.04035.Google Scholar
- Tribhuvanesh Orekondy, Seong Joon Oh, Bernt Schiele, and Mario Fritz. 2018. Understanding and controlling user linkability in decentralized learning. CoRR abs/1805.05838 (2018). arXiv:1812.06127 http://arxiv.org/abs/1812.06127.Google Scholar
- Anit Kumar Sahu, Tian Li, Maziar Sanjabi, Manzil Zaheer, Ameet Talwalkar, and Virginia Smith. 2018. Federated optimization for heterogeneous networks. CoRR abs/1812.06127 (2018). arXiv:1812.06127 http://arxiv.org/abs/1812.06127.Google Scholar
- Sunny Sanyal, Dapeng Wu, and Boubakr Nour. 2019. A federated filtering framework for Internet of medical things. CoRR abs/1905.01138 (2019). arXiv:1905.01138 http://arxiv.org/abs/1905.01138.Google Scholar
- Felix Sattler, Simon Wiedemann, Klaus-Robert Müller, and Wojciech Samek. 2019. Robust and communication-efficient federated learning from non-IID data. CoRR abs/1903.02891 (2019). arXiv:1903.02891 http://arxiv.org/abs/1903.02891.Google Scholar
- Micah J. Sheller, G. Anthony Reina, Brandon Edwards, Jason Martin, and Spyridon Bakas. 2019. Multi-institutional deep learning modeling without sharing patient data: A feasibility study on brain tumor segmentation. In Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries, Alessandro Crimi, Spyridon Bakas, Hugo Kuijf, Farahani Keyvan, Mauricio Reyes, and Theo van Walsum (Eds.). Springer International Publishing, Cham, 92–104. Google Scholar
- Virginia Smith, Chao-Kai Chiang, Maziar Sanjabi, and Ameet S. Talwalkar. 2017. Federated multi-task learning. In Advances in Neural Information Processing Systems 30, I. Guyon, U. V. Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.). Curran Associates, Inc., 4424–4434. Retrieved from http://papers.nips.cc/paper/7029-federated-multi-task-learning.pdf.Google Scholar
Digital Library
- K. Sozinov, V. Vlassov, and S. Girdzijauskas. 2018. Human activity recognition using federated learning. In Proceedings of the IEEE International Conference on Parallel Distributed Processing with Applications, Ubiquitous Computing Communications, Big Data Cloud Computing, Social Computing Networking, Sustainable Computing Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom’18). 1103–1111. DOI:DOI:https://doi.org/10.1109/BDCloud.2018.00164Google Scholar
- Xudong Sun, Andrea Bommert, Florian Pfisterer, Jörg Rahnenführer, Michel Lang, and Bernd Bischl. 2019. High dimensional restrictive federated model selection with multi-objective Bayesian optimization over shifted distributions. CoRR abs/1902.08999 (2019). arXiv:1902.08999 http://arxiv.org/abs/1902.08999.Google Scholar
- Ananda Theertha Suresh, Felix X. Yu, Sanjiv Kumar, and H. Brendan McMahan. 2017. Distributed mean estimation with limited communication. In Proceedings of the 34th International Conference on Machine Learning (Proceedings of Machine Learning Research), Doina Precup and Yee Whye Teh (Eds.), Vol. 70. PMLR, International Convention Centre, Sydney, Australia, 3329–3337. Retrieved from http://proceedings.mlr.press/v70/suresh17a.html.Google Scholar
- N. H. Tran, W. Bao, A. Zomaya, M. N. H. Nguyen, and C. S. Hong. 2019. Federated learning over wireless networks: Optimization model design and analysis. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’19). 1387–1395. DOI:DOI:https://doi.org/10.1109/INFOCOM.2019.8737464Google Scholar
- Stacey Truex, Nathalie Baracaldo, Ali Anwar, Thomas Steinke, Heiko Ludwig, and Rui Zhang. 2018. A hybrid approach to privacy-preserving federated learning. CoRR abs/1812.03224 (2018). arXiv:1812.03224 http://arxiv.org/abs/1812.03224.Google Scholar
- Praneeth Vepakomma, Otkrist Gupta, Tristan Swedish, and Ramesh Raskar. 2018. Split learning for health: Distributed deep learning without sharing raw patient data. CoRR abs/1812.00564 (2018).Google Scholar
- J. Wang, B. Cao, P. Yu, L. Sun, W. Bao, and X. Zhu. 2018. Deep learning towards mobile applications. In Proceedings of the IEEE 38th International Conference on Distributed Computing Systems (ICDCS’18). 1385–1393. DOI:DOI:https://doi.org/10.1109/ICDCS.2018.00139Google Scholar
- L. Wang, W. Wang, and B. LI. 2019. CMFL: Mitigating communication overhead for federated learning. In Proceedings of the IEEE 39th International Conference on Distributed Computing Systems (ICDCS’19). 954–964. DOI:DOI:https://doi.org/10.1109/ICDCS.2019.00099Google Scholar
Cross Ref
- Shiqiang Wang, Tiffany Tuor, Theodoros Salonidis, Kin K. Leung, Christian Makaya, Ting He, and Kevin Chan. 2018. Adaptive federated learning in resource constrained edge computing systems. CoRR abs/1804.05271 (2018).Google Scholar
- Zhibo Wang, Mengkai Song, Zhifei Zhang, Yang Song, Qian Wang, and Hairong Qi. 2018. Beyond inferring class representatives: User-level privacy leakage from federated learning. CoRR abs/1812.00535 (2018). arXiv:1812.00535 http://arxiv.org/abs/1812.00535.Google Scholar
- Cong Xie, Sanmi Koyejo, and Indranil Gupta. 2019. Asynchronous federated optimization. CoRR abs/1903.03934 (2019). arXiv:1903.03934 http://arxiv.org/abs/1903.03934.Google Scholar
- Kele Xu, Haibo Mi, Dawei Feng, Huaimin Wang, Chuan Chen, Zibin Zheng, and Xu Lan. 2018. Collaborative deep learning across multiple data centers. CoRR abs/1810.06877 (2018). arXiv:1810.06877 http://arxiv.org/abs/1810.06877.Google Scholar
- Zichen Xu, Li Li, and Wenting Zou. 2019. Exploring federated learning on battery-powered devices. In Proceedings of the ACM Turing Celebration Conference - China (ACM TURC’19). Association for Computing Machinery, New York, NY. DOI:DOI:https://doi.org/10.1145/3321408.3323080Google Scholar
Digital Library
- Kai Yang, Tao Jiang, Yuanming Shi, and Zhi Ding. 2018. Federated learning via over-the-air computation. CoRR abs/1812.11750 (2018). arXiv:1812.11750 http://arxiv.org/abs/1812.11750.Google Scholar
- Qiang Yang, Yang Liu, Tianjian Chen, and Yongxin Tong. 2019. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. 10, 2 (Jan. 2019). DOI:DOI:https://doi.org/10.1145/3298981Google Scholar
Digital Library
- X. Yao, C. Huang, and L. Sun. 2018. Two-stream federated learning: Reduce the communication costs. In Proceedings of the IEEE Visual Communications and Image Processing (VCIP’18). 1–4. DOI:DOI:https://doi.org/10.1109/VCIP.2018.8698609Google Scholar
- X. Zhang, S. Ji, H. Wang, and T. Wang. 2017. Private, yet practical, multiparty deep learning. In Proceedings of the IEEE 37th International Conference on Distributed Computing Systems (ICDCS’17). 1442–1452. DOI:DOI:https://doi.org/10.1109/ICDCS.2017.215Google Scholar
- Yue Zhao, Meng Li, Liangzhen Lai, Naveen Suda, Damon Civin, and Vikas Chandra. 2018. Federated learning with non-IID data. CoRR abs/1806.00582 (2018). arXiv:1806.00582 http://arxiv.org/abs/1806.00582.Google Scholar
- W. Zhou, Y. Li, S. Chen, and B. Ding. 2018. Real-time data processing architecture for multi-robots based on differential federated learning. In Proceedings of the IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computing, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI’18). 462–471. DOI:DOI:https://doi.org/10.1109/SmartWorld.2018.00106Google Scholar
- Hangyu Zhu and Yaochu Jin. 2018. Multi-objective evolutionary federated learning. CoRR abs/1812.07478 (2018). arXiv:1812.07478 http://arxiv.org/abs/1812.07478.Google Scholar
- Y. Zou, S. Feng, D. Niyato, Y. Jiao, S. Gong, and W. Cheng. 2019. Mobile device training strategies in federated learning: An evolutionary game approach. In Proceedings of the International Conference on Internet of Things (iThings’19) and IEEE Green Computing and Communications (GreenCom’19) and IEEE Cyber, Physical and Social Computing (CPSCom’19) and IEEE Smart Data (SmartData’19). 874–879. DOI:DOI:https://doi.org/10.1109/iThings/GreenCom/CPSCom/SmartData.2019.00157Google Scholar
- [n.d.]. DICOM Standard. Retrieved from https://www.dicomstandard.org/.Google Scholar
- [n.d.]. eICU Collaborative Research Database. Retrieved from https://eicu-crd.mit.edu/.Google Scholar
- [n.d.]. Index - FHIR v4.0.1. Retrieved from https://www.hl7.org/fhir/.Google Scholar
- [n.d.]. LEAF. Retrieved from https://leaf.cmu.edu/.Google Scholar
- [n.d.]. MHEALTH Data Set. Retrieved from https://archive.ics.uci.edu/ml/datasets/MHEALTH+Dataset.Google Scholar
- [n.d.]. MIMIC Critical Care Database. Retrieved from https://mimic.physionet.org/.Google Scholar
- Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’16). ACM, New York, NY, 308–318. DOI:DOI:https://doi.org/10.1145/2976749.2978318Google Scholar
Digital Library
- K. Y. E. Aryanto, M. Oudkerk, and P. M. A. van Ooijen. 2015. Free DICOM de-identification tools in clinical research: Functioning and safety of patient privacy. Eur. Radiol. 25, 12 (12 2015), 3685–3695.Google Scholar
- B. A. Kitchenham and Stuart Charters. 2007. Guidelines for performing systematic literature reviews in software engineering. 2 (01 2007).Google Scholar
- Marco Barreno, Blaine Nelson, Anthony D. Joseph, and J. D. Tygar. 2010. The security of machine learning. Mach. Learn. 81, 2 (2010), 121–148.Google Scholar
Digital Library
- Battista Biggio, Blaine Nelson, and Pavel Laskov. 2012. Poisoning attacks against support vector machines. In Proceedings of the 29th International Coference on International Conference on Machine Learning (ICML’12). Omnipress, 1467–1474. Retrieved from http://dl.acm.org/citation.cfm?id=3042573.3042761.Google Scholar
Digital Library
- Battista Biggio and Fabio Roli. 2018. Wild patterns: Ten years after the rise of adversarial machine learning. Pattern Recog. 84 (2018), 317–331. DOI:DOI:https://doi.org/10.1016/j.patcog.2018.07.023Google Scholar
Digital Library
- John S. Breese, David Heckerman, and Carl Kadie. 1998. Empirical analysis of predictive algorithms for collaborative filtering. In Proceedings of the 14th Conference on Uncertainty in Artificial Intelligence (UAI’98). Morgan Kaufmann Publishers Inc., San Francisco, CA, 43–52. Retrieved from http://dl.acm.org/citation.cfm?id=2074094.2074100.Google Scholar
Digital Library
- Chris Culnane, Benjamin I. P. Rubinstein, and Vanessa Teague. 2017. Health data in an open world. CoRR abs/1712.05627 (2017). arXiv:1712.05627 http://arxiv.org/abs/1712.05627.Google Scholar
- John R. Douceur. 2002. The Sybil attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems (IPTPS’01). Springer-Verlag, Berlin, 251–260. Google Scholar
- T. Elgamal. 1985. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. 31, 4 (July 1985), 469–472. DOI:DOI:https://doi.org/10.1109/TIT.1985.1057074Google Scholar
Digital Library
- Matt Fredrikson, Somesh Jha, and Thomas Ristenpart. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). Association for Computing Machinery, New York, NY, 1322–1333. DOI:DOI:https://doi.org/10.1145/2810103.2813677Google Scholar
Digital Library
- Milena A. Gianfrancesco, Suzanne Tamang, Jinoos Yazdany, and Gabriela Schmajuk. 2018. Potential biases in machine learning algorithms using electronic health record data. JAMA Internal Med. 178, 11 (11 2018), 1544–1547.Google Scholar
- Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in Neural Information Processing Systems 27, Z. Ghahramani, M. Welling, C. Cortes, N. D. Lawrence, and K. Q. Weinberger (Eds.). Curran Associates, Inc., 2672–2680. Retrieved from http://papers.nips.cc/paper/5423-generative-adversarial-nets.pdf.Google Scholar
Digital Library
- Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2014. Explaining and Harnessing Adversarial Examples. arxiv:stat.ML/1412.6572 (2014).Google Scholar
- S. Haykin and B. Widrow. 2003. Least-mean-Square Adaptive Filters. Wiley. 2003041161Retrieved from https://books.google.de/books?id=U8X3mJtawUkC.Google Scholar
- Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, and Bo Li. 2018. Manipulating machine learning: Poisoning attacks and countermeasures for regression learning. CoRR abs/1804.00308 (2018).Google Scholar
- Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Keith Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D’Oliveira, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaid Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson, Justin Hsu, Martin Jaggi, Tara Javidi, Gauri Joshi, Mikhail Khodak, Jakub Konečný, Aleksandra Korolova, Farinaz Koushanfar, Sanmi Koyejo, Tancrède Lepoint, Yang Liu, Prateek Mittal, Mehryar Mohri, Richard Nock, Ayfer Özgür, Rasmus Pagh, Mariana Raykova, Hang Qi, Daniel Ramage, Ramesh Raskar, Dawn Song, Weikang Song, Sebastian U. Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tramèr, Praneeth Vepakomma, Jianyu Wang, Li Xiong, Zheng Xu, Qiang Yang, Felix X. Yu, Han Yu, and Sen Zhao. 2019. Advances and Open Problems in Federated Learning. arxiv:cs.LG/1912.04977 (2019).Google Scholar
- Alex Krizhevsky and Geoffrey Hinton. 2009. Learning Multiple Layers of Features from Tiny Images. Technical Report. Citeseer.Google Scholar
- Yann LeCun, Y. Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature 521 (05 2015), 436–44. DOI:DOI:https://doi.org/10.1038/nature14539Google Scholar
- Bradley Malin and Latanya Sweeney. 2004. How (not) to protect genomic data privacy in a distributed network: Using trail re-identification to evaluate and design anonymity protection systems. J. Biomed. Inform. 37, 3 (2004), 179–192. DOI:DOI:https://doi.org/10.1016/j.jbi.2004.04.005Google Scholar
Digital Library
- Frank D. McSherry. 2009. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD’09). ACM, New York, NY, 19–30. DOI:DOI:https://doi.org/10.1145/1559845.1559850Google Scholar
Digital Library
- Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, and Nikos Triandopoulos. 2019. Privacy-preserving hierarchical clustering: Formal security and efficient approximation. CoRR abs/1904.04475 (2019).Google Scholar
- David Moher, Alessandro Liberati, Jennifer Tetzlaff, Douglas G. Altman, and The PRISMA Group. 2009. Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. PLOS Med. 6, 7 (07 2009), 1–6. DOI:DOI:https://doi.org/10.1371/journal.pmed.1000097Google Scholar
- E. Monteiro, C. Costa, and J. L. Oliveira. 2015. A machine learning methodology for medical imaging anonymization. In Proceedings of the 37th International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC’15). 1381–1384. DOI:DOI:https://doi.org/10.1109/EMBC.2015.7318626Google Scholar
- Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, and Pascal Frossard. 2015. DeepFool: A simple and accurate method to fool deep neural networks. CoRR abs/1511.04599 (2015). arXiv:1511.04599 http://arxiv.org/abs/1511.04599.Google Scholar
- Ziad Obermeyer, Brian Powers, Christine Vogeli, and Sendhil Mullainathan. 2019. Dissecting racial bias in an algorithm used to manage the health of populations. Science 366, 6464 (2019), 447–453.Google Scholar
- Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques (EUROCRYPT’99). Springer-Verlag, Berlin, 223–238. Retrieved from http://dl.acm.org/citation.cfm?id=1756123.1756146.Google Scholar
Digital Library
- Diego Peteiro-Barral and Bertha Guijarro-Berdiñas. 2013. A survey of methods for distributed machine learning. Prog. Artif. Intell. 2, 1 (2013), 1–11. DOI:DOI:https://doi.org/10.1007/s13748-012-0035-5Google Scholar
Cross Ref
- Mauro Ribeiro, Katarina Grolinger, and Miriam A. M. Capretz. 2015. MLaaS: Machine learning as a service. In Proceedings of the IEEE 14th International Conference on Machine Learning and Applications (ICMLA’15). IEEE, 896–902.Google Scholar
- R. L. Rivest, L. Adleman, and M. L. Dertouzos. 1978. On data banks and privacy homomorphisms. Foundations of Secure Computation. Academia Press, 169–179.Google Scholar
- Luc Rocher, Julien M. Hendrickx, and Yves-Alexandre de Montjoye. 2019. Estimating the success of re-identifications in incomplete datasets using generative models. Nat. Commun. 10, 1 (2019), 3069.Google Scholar
Cross Ref
- Yossi Rubner, Carlo Tomasi, and Leonidas J. Guibas. 2000. The earth mover’s distance as a metric for image retrieval. Int. J. Comput. Vis. 40, 2 (2000), 99–121.Google Scholar
Digital Library
- Z. Shae and J. Tsai. 2018. Transform blockchain into distributed parallel computing architecture for precision medicine. In Proceedings of the IEEE 38th International Conference on Distributed Computing Systems (ICDCS’18). 1290–1299. DOI:DOI:https://doi.org/10.1109/ICDCS.2018.00129Google Scholar
- Adi Shamir. 1979. How to share a secret. Commun. ACM 22, 11 (Nov. 1979), 612–613. DOI:DOI:https://doi.org/10.1145/359168.359176Google Scholar
Digital Library
- J. Zhou, Z. Cao, X. Dong, and X. Lin. 2015. PPDM: A privacy-preserving protocol for cloud-assisted e-Healthcare systems. IEEE J. Select. Top. Sig. Proc. 9, 7 (Oct. 2015), 1332–1344. DOI:DOI:https://doi.org/10.1109/JSTSP.2015.2427113Google Scholar
Index Terms
Federated Learning in a Medical Context: A Systematic Literature Review
Recommendations
A Systematic Literature Review on Federated Machine Learning: From a Software Engineering Perspective
Federated learning is an emerging machine learning paradigm where clients train models locally and formulate a global model based on the local model updates. To identify the state-of-the-art in federated learning and explore how to develop federated ...
Securing federated learning with blockchain: a systematic literature review
AbstractFederated learning (FL) is a promising framework for distributed machine learning that trains models without sharing local data while protecting privacy. FL exploits the concept of collaborative learning and builds privacy-preserving models. ...
Performance Analysis of Distributed and Federated Learning Models on Private Data
AbstractThere has been significant research in privacy-related aspects of machine learning and large scale data processing. In traditional methods of training a model, data is gathered at a centralized machine where training on the entire data takes ...






Comments