Federated Learning: Security and Privacy

Author:   Somanath Tripathy ,  Harsh Kasyap ,  Minghong Fang
Publisher:   Taylor & Francis Ltd
ISBN:  

9781041174622


Pages:   156
Publication Date:   04 December 2025
Format:   Hardback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $129.38 Quantity:  
Add to Cart

Share |

Federated Learning: Security and Privacy


Overview

Full Product Details

Author:   Somanath Tripathy ,  Harsh Kasyap ,  Minghong Fang
Publisher:   Taylor & Francis Ltd
Imprint:   CRC Press
Weight:   0.480kg
ISBN:  

9781041174622


ISBN 10:   1041174624
Pages:   156
Publication Date:   04 December 2025
Audience:   College/higher education ,  Professional and scholarly ,  Tertiary & Higher Education ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

1. Introduction to Machine Learning a. Types of Learning b. Learning Tasks c. Cost Function d. Optimization e. Evaluation Metrics f. Artificial Neural Network g. Implementation 2. Federated Learning a. Importance of FL b. Types of FL c. Applications in FL d. Challenges in FL e. Security and Privacy Issues f. Defense Techniques g. Privacy-Preserving Byzantine-Robust FL h. Implementation 3. Poisoning Attacks in FL a. Attacker b. Label flipping attack c. Gaussian attack d. LIE attack e. Krum attack f. Trim attack g. Shejwalkar attack h. Scaling attack i. Edge attack j. Vulnerabilities in Cosine Similarity-based Defenses k. Implementation 4. Inference Attacks in FL a. Attacker goal b. Data reconstruction attacks c. Membership inference attacks d. Property inference attacks e. Implementation 5. Byzantine Robust Defenses a. Design goals b. Krum c. Median and Trimmed Mean d. Bulyan e. FoolsGold f. FLTrust g. Moat h. DeFL i. RDFL j. FLTC k. Implementation 6. Privacy-Preserving FL a. Differential Privacy b. DPFL: A Client Level c. Homomorphic d. BatchCrypt: HE-based Scheme e. Threshold Multi-key HE Scheme f. Secure Multi-Party Computation g. Practical Secure Aggregation h. Summary i. Implementation

Reviews

Author Information

Somanath Tripathy received his PhD from IIT Guwahati in 2007. Currently, he is a professor in the Department of Computer Science and Engineering at the Indian Institute of Technology, Patna, where he has been a faculty member since December 2008. Prof. Tripathy has held significant administrative positions at IIT Patna, including Associate Dean of Academics (January 2016 - March 2017), Head, Computer Centre (November 2022-November 2023) and Associate Dean of Administration (July 2021 - November 2023). His research interests encompass Cybersecurity, Malware Detection, Secure Machine Learning, Lightweight Cryptography, and Blockchain. Tripathy holds two patents and has published over 130 research papers in reputed journals and conferences. He has led several projects as Principal Investigator, notably his team developed a malware detection app presented to the Bureau of Police Research and Development (BPRD) and the Ministry of Home Affairs (MHA) as part of a sponsored project. Tripathy is currently an editor of the IETE Technical Review and an associate editor of the journal Multimedia Tools and Applications. Harsh Kasyap is an Assistant Professor in the Department of Computer Science and Engineering at the Indian Institute of Technology (BHU), Varanasi, India. He is also an honorary research fellow at WMG, University of Warwick, UK. Prior to that, Harsh was a Research Associate, working in the Alan Turing Institute London, where he established significant research collaborations with the HSBC, Bank of Italy and TNO, advancing the fields of data privacy, AI security and fairness. He obtained his Ph.D. from the IIT Patna, India. His Ph.D. thesis title was “Security and Privacy Preserving Techniques for Federated Learning”. His research interests are Federated Learning, Machine Learning Security, Trustworthy AI, Privacy and Data Security. Minghong Fang is a tenure-track Assistant Professor in the Department of Computer Science and Engineering at the University of Louisville. He was a Postdoctoral Associate in the Department of Electrical and Computer Engineering at Duke University from 2022 to 2024. He received his Ph.D. degree from the Department of Electrical and Computer Engineering at The Ohio State University in August 2022. He has published several high-impact research papers in top-tier security conferences, including the USENIX Security Symposium, the ACM Conference on Computer and Communications Security (CCS), and the Network and Distributed System Security (NDSS) Symposium. Notably, his USENIX Security 2020 paper was selected as one of the “Normalized Top-100 Security Papers Since 1981”. His research interests broadly span various aspects of AI safety and security.

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List