<?xml version="1.0"?>
<!DOCTYPE article SYSTEM "C:\nlm\converter\journal-publishing-dtd-2.0\journalpublishing.dtd">
<article>
<front>
<journal-meta>
<journal-id journal-id-type="publisher">IJDSBDA</journal-id>
<journal-title>International Journal of Data Science and Big Data Analytics</journal-title>
<issn pub-type="epub">2710-2599</issn>
<publisher>
<publisher-name>SvedbergOpen</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="other">ijdsbda-1-2-001</article-id>
<doi-group>
<article-doi><ext-link ext-link-type="uri" xmlns:xlink="https://doi.org/" xlink:href="10.51483/IJDSBDA.1.2.2021.1-13">10.51483/IJDSBDA.1.2.2021.1-13</ext-link></article-doi>
</doi-group>
<article-categories>
<subj-group>
<subject>Research Paper</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Federated learning for privacy-preserving data access</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Smietanka</surname><given-names>Malgorzata</given-names></name>
<xref ref-type="aff" rid="aff001"><sup>1</sup></xref>
<xref ref-type="corresp" rid="cor001"><sup>&#x002A;</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Pithadia</surname><given-names>Hirsh</given-names></name>
<xref ref-type="aff" rid="aff002"><sup>2</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Treleaven</surname><given-names>Philip</given-names></name>
<xref ref-type="aff" rid="aff003"><sup>3</sup></xref>
</contrib>
</contrib-group>
<aff id="aff001"><sup>1</sup><instname>University College London, Gower St, Bloomsbury</instname>, <instaddress>London WC1E 6BT</instaddress>, <instcountry>United Kingdom</instcountry>. E-mail: <email>malgorzata.wasiewicz.17@ucl.ac.uk</email></aff>
<aff id="aff002"><sup>2</sup><instname>University College London, Gower St, Bloomsbury</instname>, <instaddress>London WC1E 6BT</instaddress>, <instcountry>United Kingdom</instcountry>. E-mail: <email>H.Pithadia@cs.ucl.ac.uk</email></aff>
<aff id="aff003"><sup>3</sup><instname>University College London, Gower St, Bloomsbury</instname>, <instaddress>London WC1E 6BT</instaddress>, <instcountry>United Kingdom</instcountry>. E-mail: <email>p.treleaven@ucl.ac.uk</email></aff>
<author-notes>
<corresp id="cor001"><sup>&#x002A;</sup>Corresponding author: Malgorzata Smietanka, <instname>University College London, Gower St, Bloomsbury</instname>, <instaddress>London WC1E 6BT</instaddress>, <instcountry>United Kingdom</instcountry>. E-mail: <email>malgorzata.wasiewicz.17@ucl.ac.uk</email></corresp>
</author-notes>
<pub-date pub-type="ppub">
<month>05</month>
<year>2021</year>
</pub-date>
<volume>1</volume>
<issue>2</issue>
<fpage>1</fpage>
<lpage>13</lpage>
<abstract>
<title>Abstract</title>
<p>Federated learning is a pioneering privacy-preserving data technology and also a new machine learning model trained on distributed data sets. Companies collect huge amounts of historic and real-time data to drive their business and collaborate with other organizations. However, data privacy is becoming increasingly important because of regulations (e.g., EU GDPR) and the need to protect their sensitive and personal data. Companies need to manage data access: firstly within their organizations (so they can control staff access), and secondly protecting raw data when collaborating with third parties. What is more, companies are increasingly looking to &#x2018;monetize&#x2019; the data they&#x2019;ve collected. However, under new legislations, utilizing data by different organization is becoming increasingly difficult (Yu, 2016). Federated learning pioneered by Google is the emerging privacy- preserving data technology and also a new class of distributed machine learning models. This paper discusses federated learning as a solution for privacy-preserving data access and distributed machine learning applied to distributed data sets. It also presents a privacy-preserving federated learning infrastructure.</p>
</abstract>
<kwd-group>
<title>Keywords</title>
<kwd>Federated Learning</kwd>
<kwd>Privacy</kwd>
<kwd>Machine Learning</kwd>
<kwd>Data Science</kwd>
<kwd>InsurTech</kwd>
</kwd-group>
<counts>
<ref-count count="43"/>
<page-count count="13"/>
</counts>
</article-meta>
</front>
<back>
<ref-list>
<title>References</title>
<ref id="bib001"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Barreno</surname><given-names>M.</given-names></name></person-group> <etal>et al.</etal> (<year>2006</year>). <article-title>Can machine learning be secure?</article-title>. <source>Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS &#x2018;06</source>.</citation></ref>
<ref id="bib002"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Brisimi</surname><given-names>T.S.</given-names></name></person-group> <etal>et al.</etal> (<year>2018</year>). <article-title>Federated learning of predictive models from federated electronic health records</article-title>. <source>International Journal of Medical Informatics</source>. <volume>112</volume>, <fpage>59</fpage>&#x2013;<lpage>67</lpage>.</citation></ref>
<ref id="bib003"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Choudhury</surname><given-names>O.</given-names></name></person-group> <etal>et al.</etal> (<year>2019</year>). <article-title>Predicting adverse drug reactions on distributed health data using federated learning</article-title>. <source>AMIA Annu Symp Proc</source>., <fpage>313</fpage>&#x2013;<lpage>322</lpage>.</citation></ref>
<ref id="bib004"><citation citation-type="web"><person-group person-group-type="author"><name><surname>Cohan</surname><given-names>P.</given-names></name></person-group> (<year>2018</year>). <source>Forbes</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://www.forbes.com/sites/petercohan/2018/07/22/mastercard-amex-and-envestnet-profit-from-400m-business-of-selling-transaction-data/#5e576d4f7722">https://www.forbes.com/sites/petercohan/2018/07/22/mastercard-amex-and-envestnet-profit-from-400m-business-of-selling-transaction-data/#5e576d4f7722</ext-link> [Accessed <date-in-citation content-type="access-date">22 07 2018</date-in-citation>].</citation></ref>
<ref id="bib005"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cramer</surname><given-names>R.</given-names></name><name><surname>Damg&#x00E5;rd</surname><given-names>I.</given-names></name><name><surname>Nielsen</surname><given-names>J.</given-names></name></person-group> (<year>2000</year>). <article-title>Multiparty computation from threshold homomorphic encryption</article-title>. <source>Lecture Notes in Computer Science</source>, <volume>11</volume>(<issue>7</issue>).</citation></ref>
<ref id="bib006"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Damg&#x00E5;rd</surname><given-names>I.</given-names></name><name><surname>Pastro</surname><given-names>V.</given-names></name><name><surname>Smart</surname><given-names>N.</given-names></name><name><surname>Zakarias</surname><given-names>S.</given-names></name></person-group> (<year>2012</year>). <source>Multiparty computation from somewhat homomorphic encryption.s.l., s.n</source>., <fpage>643</fpage>&#x2013;<lpage>662</lpage>.</citation></ref>
<ref id="bib007"><citation citation-type="web"><collab>Data Model, 2</collab>. (<year>2020</year>). <source>Wikipedia</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://en.wikipedia.org/wiki/Data_model#:~:text=A%20data%20model%20(or%20datamodel,properties%20of%20real%2Dworld%20entities">https://en.wikipedia.org/wiki/Data_model#:~:text=A%20data%20model%20(or%20datamodel,properties%20of%20real%2Dworld%20entities</ext-link>. [Accessed <date-in-citation content-type="access-date">28 08 2020</date-in-citation>].</citation></ref>
<ref id="bib008"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Derwisch</surname><given-names>S.</given-names></name></person-group> (<year>2019</year>). <source>Data Monetization - Use Cases, Implementation and Added Value, s.l</source>.: <publisher-name>BARC</publisher-name>.</citation></ref>
<ref id="bib009"><citation citation-type="web"><collab>Facebook_data_scandal</collab> (<year>2020</year>). <source>Wikipedia</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://en.wikipedia.org/wiki/Facebook-Cambridge_Analytica_data_scandal">https://en.wikipedia.org/wiki/Facebook-Cambridge_Analytica_data_scandal</ext-link> [Accessed <date-in-citation content-type="access-date">05 08 2020</date-in-citation>].</citation></ref>
<ref id="bib0010"><citation citation-type="web"><collab>GDPR</collab> (<year>2018</year>). <source>GDPR</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://gdpr-info.eu/">https://gdpr-info.eu/</ext-link> [Accessed <date-in-citation content-type="access-date">05 08 2020</date-in-citation>].</citation></ref>
<ref id="bib0011"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Gilad-Bachrach</surname><given-names>R.</given-names></name></person-group> <etal>et al.</etal> (<year>2016</year>). <source>Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. s.l., s.n</source>., <fpage>201</fpage>&#x2013;<lpage>210</lpage>.</citation></ref>
<ref id="bib0012"><citation citation-type="web"><collab>GoogleAI</collab> (<year>2017</year>). <source>Google AI Blog</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://ai.googleblog.com/2017/04/federated-learning-collaborative.html">https://ai.googleblog.com/2017/04/federated-learning-collaborative.html</ext-link>. [Accessed <date-in-citation content-type="access-date">05 08 2020</date-in-citation>]</citation></ref>
<ref id="bib0013"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Hardy</surname><given-names>C.</given-names></name><name><surname>Le Merrer</surname><given-names>E.</given-names></name><name><surname>Sericola</surname><given-names>B.</given-names></name></person-group> (<year>2018</year>). <article-title>Gossiping GANs</article-title>. <source>Proceedings of the Second Workshop on Distributed Infrastructures for Deep Learning - DIDL&#x2019;18</source>.</citation></ref>
<ref id="bib0014"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Huang</surname><given-names>L.</given-names></name><name><surname>Liu</surname><given-names>D.</given-names></name></person-group> (<year>2019</year>). <article-title>Patient clustering improves efficiency of federated machine learning to predict mortality and hospital stay time using distributed electronic medical records</article-title>.. <source>arXiv:1903.09296</source>.</citation></ref>
<ref id="bib0015"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Keller</surname><given-names>M.</given-names></name><name><surname>Orsini</surname><given-names>E.</given-names></name><name><surname>Scholl</surname><given-names>P.</given-names></name></person-group> (<year>2016</year>). <article-title>MASCOT</article-title>. <source>Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security</source>.</citation></ref>
<ref id="bib0016"><citation citation-type="web"><person-group person-group-type="author"><name><surname>Kone&#x010D;n&#x00FD;</surname><given-names>J.</given-names></name><name><surname>McMahan</surname><given-names>B. H.</given-names></name><name><surname>Ramage</surname><given-names>D.</given-names></name><name><surname>Richt&#x00E1;rik</surname><given-names>P.</given-names></name></person-group> (<year>2016</year>). <article-title>Federated Optimization: Distributed Machine Learning for On-Device Intelligence</article-title>. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://arxiv.org/abs/1610.02527">https://arxiv.org/abs/1610.02527</ext-link>.</citation></ref>
<ref id="bib0017"><citation citation-type="web"><person-group person-group-type="author"><name><surname>Kone&#x010D;n&#x00FD;</surname><given-names>J.</given-names></name></person-group> <etal>et al.</etal> (<year>2017</year>). <article-title>Federated Learning: Strategies for Improving Communication Efficiency</article-title>. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://arxiv.org/abs/1610.05492">https://arxiv.org/abs/1610.05492</ext-link>.</citation></ref>
<ref id="bib0018"><citation citation-type="web"><person-group person-group-type="author"><name><surname>Koty</surname><given-names>A. C.</given-names></name></person-group> (<year>2019</year>). <source>China Briefing</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://www.china-briefing.com/news/chinas-corporate-social-credit-system-how-it-works/">https://www.china-briefing.com/news/chinas-corporate-social-credit-system-how-it-works/</ext-link> [Accessed <date-in-citation content-type="access-date">03 08 2020</date-in-citation>].</citation></ref>
<ref id="bib0019"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lee</surname><given-names>J.</given-names></name></person-group> <etal>et al.</etal> (<year>2018</year>). <article-title>Privacy-preserving patient similarity learning in a federated environment: development and analysis</article-title>.. <source>JMIR Medical Informatics</source>, <volume>6</volume>(<issue>2</issue>).</citation></ref>
<ref id="bib0020"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Li</surname><given-names>W.</given-names></name></person-group> <etal>et al.</etal> (<year>2019</year>). <chapter-title>Privacy-preserving federated brain tumour segmentation</chapter-title>. In: <source>Machine Learning in Medical Imaging. MLMI2019. Lecture Notes in Computer Science</source>. s.l.:<publisher-name>Springer</publisher-name>, <publisher-loc>Cham</publisher-loc>, pp. <fpage>133</fpage>&#x2013;<lpage>141</lpage>.</citation></ref>
<ref id="bib0021"><citation citation-type="web"><person-group person-group-type="author"><name><surname>McMahan</surname><given-names>B.H.</given-names></name></person-group> <etal>et al.</etal> (<year>2017</year>). <article-title>Communication-Efficient Learning of Deep Networks from Decentralized Data</article-title>. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://arxiv.org/abs/1602.05629">https://arxiv.org/abs/1602.05629</ext-link>.</citation></ref>
<ref id="bib0022"><citation citation-type="web"><collab>MELLODDY</collab> (<year>2020</year>). <source>MELLODDY project</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://www.melloddy.eu/">https://www.melloddy.eu/</ext-link> [Accessed <date-in-citation content-type="access-date">10 09 2020</date-in-citation>].</citation></ref>
<ref id="bib0023"><citation citation-type="web"><collab>OpenMined</collab> (<year>2020</year>). <source>OpenMined Blog</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://blog.openmined.org/federated-credit-scoring/">https://blog.openmined.org/federated-credit-scoring/</ext-link> [Accessed <date-in-citation content-type="access-date">03 08 2020</date-in-citation>].</citation></ref>
<ref id="bib0024"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Papernot</surname><given-names>N.</given-names></name></person-group> <etal>et al.</etal> (<year>2020</year>). <source>Scalable Private Learning with PATE</source>.s.l.:s.n.</citation></ref>
<ref id="bib0025"><citation citation-type="web"><person-group person-group-type="author"><name><surname>PyGrid</surname><given-names>O.</given-names></name></person-group> (<year>2020</year>). <source>PyGrid OpenMined</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://github.com/OpenMined/PyGrid">https://github.com/OpenMined/PyGrid</ext-link> [Accessed <date-in-citation content-type="access-date">08 2020</date-in-citation>].</citation></ref>
<ref id="bib0026"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rivest</surname><given-names>R.L.</given-names></name><name><surname>Adleman</surname><given-names>L.</given-names></name><name><surname>Dertouzos</surname><given-names>M.L.</given-names></name></person-group> and <collab>others</collab> (<year>1978</year>). <article-title>On data banks and privacy homomorphisms</article-title>. <source>Foundations of Secure Computation</source>. <volume>4</volume>, <fpage>169</fpage>&#x2013;<lpage>180</lpage>.</citation></ref>
<ref id="bib0027"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shamir</surname><given-names>A.</given-names></name></person-group> (<year>1979</year>). <article-title>How to share a secret</article-title>. <source>Communications of the ACM</source>. <volume>22</volume>, <fpage>612</fpage>&#x2013;<lpage>613</lpage>.</citation></ref>
<ref id="bib0028"><citation citation-type="web"><person-group person-group-type="author"><name><surname>&#x015A;mietanka</surname><given-names>M.</given-names></name><name><surname>Koshiyama</surname><given-names>A.</given-names></name><name><surname>Treleaven</surname><given-names>P.</given-names></name></person-group> (<year>2020</year>). <article-title>Algorithms in Future Insurance Markets</article-title>. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3641518">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3641518</ext-link>.</citation></ref>
<ref id="bib0029"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Surden</surname><given-names>H.</given-names></name></person-group>, (<year>2019</year>). <article-title>Artificial intelligence and law: An overview</article-title>. <source>Georgia State University Law Review</source>, <volume>35</volume>, <fpage>19</fpage>&#x2013;<lpage>22</lpage>.</citation></ref>
<ref id="bib0030"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Treleaven</surname><given-names>P.</given-names></name><name><surname>Gendal Brown</surname><given-names>R.</given-names></name><name><surname>Yang</surname><given-names>D.</given-names></name></person-group> (<year>2017</year>). <article-title>Blockchain technology in finance</article-title>. <source>Computer</source>, <volume>50</volume>(<issue>9</issue>), <fpage>14</fpage>&#x2013;<lpage>17</lpage>.</citation></ref>
<ref id="bib0031"><citation citation-type="web"><person-group person-group-type="author"><name><surname>Turea</surname><given-names>M.</given-names></name></person-group> (<year>2019</year>). <source>Healthcare innovation</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://healthcareweekly.com/how-the-big-4-tech-companies-are-leading-healthcare-innovation/">https://healthcareweekly.com/how-the-big-4-tech-companies-are-leading-healthcare-innovation/</ext-link> [Accessed <date-in-citation content-type="access-date">11 08 2020</date-in-citation>].</citation></ref>
<ref id="bib0032"><citation citation-type="web"><collab>Wikipedia</collab> (<year>2020a</year>). <source>Data exchange</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://en.wikipedia.org/wiki/Data_exchange">https://en.wikipedia.org/wiki/Data_exchange</ext-link> [Accessed <date-in-citation content-type="access-date">05 08 2020</date-in-citation>].</citation></ref>
<ref id="bib0033"><citation citation-type="web"><collab>Wikipedia</collab> (<year>2020b</year>). <source>Data model</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://en.wikipedia.org/wiki/Data_model">https://en.wikipedia.org/wiki/Data_model</ext-link> [Accessed <date-in-citation content-type="access-date">05 08 2020</date-in-citation>].</citation></ref>
<ref id="bib0034"><citation citation-type="web"><collab>Wikipedia</collab> (<year>2020c</year>). <source>Digital object identifier</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://en.wikipedia.org/wiki/Digital_object_identifier">https://en.wikipedia.org/wiki/Digital_object_identifier</ext-link> [Accessed <date-in-citation content-type="access-date">05 08 2020</date-in-citation>].</citation></ref>
<ref id="bib0035"><citation citation-type="web"><collab>Wikipedia</collab> (<year>2020d</year>). <source>Markup language</source>. [Online] Available at: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="https://en.wikipedia.org/wiki/Markup_language">https://en.wikipedia.org/wiki/Markup_language</ext-link> [Accessed <date-in-citation content-type="access-date">05 08 2020</date-in-citation>].</citation></ref>
<ref id="bib0036"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname><given-names>Q.</given-names></name></person-group> <etal>et al.</etal> (<year>2019a</year>). <article-title>Federated learning</article-title>. <source>Synthesis Lectures on Artificial Intelligence and Machine Learning</source>, <volume>13</volume>, <fpage>1</fpage>&#x2013;<lpage>207</lpage>.</citation></ref>
<ref id="bib0037"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Yang</surname><given-names>Q.</given-names></name></person-group> <etal>et al.</etal> (<year>2019b</year>). <source>Federated Learning. Synthesis Lectures on Artificial Intelligence and Machine Learning</source>.s.l. :<publisher-name>Morgan &#x0026; Claypool Publishers</publisher-name>.</citation></ref>
<ref id="bib0038"><citation citation-type="web"><person-group person-group-type="author"><name><surname>Yang</surname><given-names>Q.</given-names></name><name><surname>Liu</surname><given-names>Y.</given-names></name><name><surname>Chen</surname><given-names>T.</given-names></name></person-group> (<year>2019c</year>). <article-title>Federated machine learning: Concept and applications</article-title>. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink"
xlink:href="http://arxiv.org/abs/1902.04885">http://arxiv.org/abs/1902.04885</ext-link>.</citation></ref>
<ref id="bib0039"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname><given-names>W.</given-names></name></person-group> <etal>et al.</etal> (<year>2019d</year>). <article-title>FFD: A federated learning based method for credit card fraud detection</article-title>. <source>Notes in Computer Science, Springer</source>. <volume>11514</volume>, <fpage>18</fpage>&#x2013;<lpage>32</lpage>.</citation></ref>
<ref id="bib0040"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Yao</surname><given-names>A. C.C.</given-names></name></person-group> (<year>1986</year>). <source>How to generate and exchange secrets - IEEE Conference Publication</source>. s.l.:s.n.</citation></ref>
<ref id="bib0041"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yu</surname><given-names>S.</given-names></name></person-group> (<year>2016</year>). <article-title>Big privacy: Challenges and opportunities of privacy study in the age of big data</article-title>. <source>IEEEAccess</source>, <volume>4</volume>(<issue>2016</issue>), <fpage>2751</fpage>&#x2013;<lpage>2763</lpage>.</citation></ref>
<ref id="bib0042"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Zhao</surname><given-names>Y.</given-names></name></person-group> <etal>et al.</etal> (<year>2019</year>). <article-title>Mobile edge computing, blockchain and reputation-based crowdsourcing iot federated learning: A secure, decentralized and privacy-preserving system</article-title>.. <source>arXiv:1906.10893</source>.</citation></ref>
<ref id="bib0043"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Zou</surname><given-names>Y.</given-names></name></person-group> <etal>et al.</etal> (<year>2019</year>). <article-title>Mobile Device Training Strategies in Federated Learning: An Evolutionary Game Approach</article-title>. <source>International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)</source> ,<fpage>874</fpage>&#x2013;<lpage>879</lpage>.</citation></ref>
</ref-list>
</back>
</article>