A. Trusty and T. , , pp.2019-2031

, Arm TrustZone Technology, pp.2019-2031

. Helib, , 2019.

, PALISADE lattice cryptography library, 2019.

M. Abadi, A. Agarwal, P. Barham, E. Brevdo, Z. Chen et al., TensorFlow: Large-scale machine learning on heterogeneous systems, 2015.

M. Abadi, A. Chu, I. Goodfellow, I. H-brendan-mcmahan, K. Mironov et al., Deep learning with differential privacy, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.308-318, 2016.

O. Abari, H. Rahul, and D. Katabi, Over-the-air function computation in sensor networks, CoRR, 2016.

Y. Nazmiye-ceren-abay, M. Zhou, B. Kantarcioglu, L. Thuraisingham, and . Sweeney, Privacy preserving synthetic data release using deep learning, Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp.510-526, 2018.

M. John, I. M. Abowd, and . Schmutte, An economic analysis of privacy protection and statistical accuracy as social choices, American Economic Review, vol.109, issue.1, pp.171-202, 2019.

J. Acharya, C. Canonne, and H. Tyagi, Inference under information constraints I: Lower bounds from chi-square contraction, 2018.

C. Gergelyács and . Castelluccia, I have a DREAM!: DIfferentially PrivatE smart Metering, Proceedings of the 13th International Conference on Information Hiding, IH'11, pp.118-132, 2011.

N. Agarwal, A. T. Suresh, F. X. Yu, S. Kumar, and B. Mcmahan, cpSGD: Communication-efficient and differentially-private distributed SGD, Advances in Neural Information Processing Systems, pp.7564-7575, 2018.

C. Aguilar-melchor and P. Gaborit, A lattice-based computationally-efficient private information retrieval protocol, Cryptol. ePrint Arch., Report, p.446, 2007.

C. Aguilar-melchor, J. Barrier, L. Fousse, and M. Killijian, XPIR: Private information retrieval for everyone, Proceedings on Privacy Enhancing Technologies, vol.2016, pp.155-174, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01396142

, Under the hood of the Pixel 2: How AI is supercharging hardware, 2018.

, Federated learning for medical imaging, 2019.

D. Alistarh, D. Grubic, J. Li, R. Tomioka, and M. Vojnovic, QSGD: Communication-efficient SGD via gradient quantization and encoding, NIPS -Advances in Neural Information Processing Systems, pp.1709-1720, 2017.

D. Alistarh, Z. Allen-zhu, and J. Li, Byzantine stochastic gradient descent, NIPS, 2018.

I. Almeida and J. Xavier, DJAM: Distributed Jacobi Asynchronous Method for Learning Personal Models, IEEE Signal Processing Letters, vol.25, issue.9, pp.1389-1392, 2018.

S. Ames, C. Hazay, Y. Ishai, and M. Venkitasubramaniam, Ligero: Lightweight sublinear arguments without a trusted setup, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS '17, 2017.

K. Amin, A. Kulesza, A. Munoz, and S. Vassilvtiskii, Bounding user contributions: A biasvariance trade-off in differential privacy, International Conference on Machine Learning, pp.263-271, 2019.

S. Angel, H. Chen, K. Laine, T. V. Srinath, and . Setty, PIR with compressed queries and amortized query processing, IEEE Symposium on Security and Privacy, pp.962-979, 2018.

J. George and . Annas, HIPAA regulations-a new era of medical-record privacy, New England Journal of Medicine, vol.348, issue.15, pp.1486-1490, 2003.

. Apple, Private Federated Learning (NeurIPS 2019 Expo Talk Abstract)

. Apple, Designing for privacy (video and slide deck), Apple WWDC, 2019.

T. Araki, J. Furukawa, Y. Lindell, A. Nof, and K. Ohara, High-throughput semi-honest secure three-party computation with an honest majority, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp.805-817, 2016.

M. Assran, N. Loizou, N. Ballas, and M. Rabbat, Stochastic gradient push for distributed deep learning, ICML, 2019.

A. Athalye, N. Carlini, and D. Wagner, Obfuscated gradients give a false sense of security: Circumventing defenses to adversarial examples, ICML, 2018.

H. B. Sean-augenstein, D. Mcmahan, S. Ramage, P. Ramaswamy, M. Kairouz et al., Generative models for effective ML on private, decentralized datasets, 2019.

, The Clara Training Framework Authors. NVIDIA Clara, 2019.

F. The and . Authors, Federated AI technology enabler, 2019.

, The Leaf Authors. Leaf, 2019.

, The PaddleFL Authors. PaddleFL, 2019.

, The PaddlePaddle Authors. PaddlePaddle, 2019.

T. The and . Authors, TensorFlow Federated, 2019.

B. Avent, A. Korolova, D. Zeber, T. Hovden, and B. Livshits, BLENDER: Enabling local search with a hybrid differential privacy model, 26th USENIX Security Symposium (USENIX Security 17), pp.747-764, 2017.

L. Babai, L. Fortnow, L. A. Levin, and M. Szegedy, Checking computations in polylogarithmic time, STOC, pp.21-31, 1991.

E. Bagdasaryan and V. Shmatikov, Differential privacy has disparate impact on model accuracy. CoRR, abs/1905.12101, 2019.

E. Bagdasaryan, A. Veit, Y. Hua, D. Estrin, and V. Shmatikov, How to backdoor federated learning, 2018.

B. Balle, J. Bell, A. Gascón, and K. Nissim, The privacy blanket of the shuffle model, Advances in Cryptology -CRYPTO 2019 -39th Annual International Cryptology Conference, pp.638-667, 2019.

B. Balle, J. Bell, A. Gascon, and K. Nissim, Differentially private summation with multi-message shuffling, 2019.

B. Balle and J. Bell, Adrià Gascón, and Kobbi Nissim. Improved summation from shuffling, 2019.

A. Barak, D. Escudero, P. K. Anders, M. Dalskov, and . Keller, Secure evaluation of quantized neural networks, IACR Cryptology ePrint Archive, p.131, 2019.

L. P. Barnes, Y. Han, and A. , Lower bounds for learning distributions under communication constraints via Fisher information, 2019.

S. Barocas, M. Hardt, and A. Narayanan, Fairness and Machine Learning. fairmlbook.org, 2019.

M. Baruch, G. Baruch, and Y. Goldberg, A little is enough: Circumventing defenses for distributed learning, 2019.

R. Bassily and A. Smith, Local, private, efficient protocols for succinct histograms, STOC, pp.127-135, 2015.

R. Bassily, U. Stemmer, and A. Guha-thakurta, Practical locally private heavy hitters, Advances in Neural Information Processing Systems, pp.2288-2296, 2017.

J. Baxter, A model of inductive bias learning, Journal of Artificial Intelligence Research, vol.12, pp.149-198, 2000.

A. Beimel, A. Korolova, K. Nissim, O. Sheffet, and U. Stemmer, The power of synergy in differential privacy: Combining a small curator with local randomizers, Workshop on Privacy Preserving Machine Learning (PriML) at NeurIPS, 2019.

A. Bellet, R. Guerraoui, M. Taziki, and M. Tommasi, Personalized and Private Peer-to-Peer Machine Learning, In AISTATS, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01665422

I. Bello, B. Zoph, V. Vasudevan, and Q. Le, Neural optimizer search with reinforcement learning, Proceedings of the 34th International Conference on Machine Learning, vol.70, pp.459-468, 2017.

S. Ben-david, J. Blitzer, K. Crammer, A. Kulesza, F. Pereira et al., A theory of learning from different domains, Machine learning, vol.79, issue.1-2, pp.151-175, 2010.

E. Ben-sasson, A. Chiesa, C. Garman, M. Green, I. Miers et al., Zerocash: Decentralized anonymous payments from bitcoin, IEEE Symposium on Security and Privacy, pp.459-474, 2014.

E. Ben-sasson, I. Bentov, Y. Horesh, and M. Riabzev, Scalable zero knowledge with no trusted setup, CRYPTO (3), vol.11694, pp.701-732, 2019.

S. James, R. Bergstra, Y. Bardenet, B. Bengio, and . Kégl, Algorithms for hyper-parameter optimization, Advances in Neural Information Processing Systems, pp.2546-2554, 2011.

M. Bertrán, N. Martínez, A. Papadaki, Q. Qiu, M. R. Rodrigues et al., Learning adversarially fair and transferable representations, ICML, 2019.

S. Arjun-nitin-bhagoji, P. Chakraborty, S. Mittal, and . Calo, Analyzing federated learning through an adversarial lens, Proceedings of the 36th International Conference on Machine Learning, pp.634-643, 2019.

A. Bhowmick, J. Duchi, J. Freudiger, G. Kapoor, and R. Rogers, Protection against reconstruction and its applications in private federated learning, 2018.

B. Biggio, B. Nelson, and P. Laskov, Poisoning attacks against support vector machines, Proceedings of the 29th International Coference on International Conference on Machine Learning, ICML'12, pp.1467-1474, 2012.

B. Biggio, I. Corona, D. Maiorca, B. Nelson, P. Nedim?rndi? et al., Evasion attacks against machine learning at test time, ECML-PKDD, pp.387-402

. Springer, , 2013.

N. Bitansky, R. Canetti, A. Chiesa, and E. Tromer, From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, ITCS '12, 2012.

R. Bitar and S. E. Rouayheb, Staircase-PIR: Universally robust private information retrieval, IEEE Information Theory Workshop (ITW), pp.1-5, 2018.

A. Bittau, Ú. Erlingsson, P. Maniatis, I. Mironov, A. Raghunathan et al., Prochlo: Strong privacy for analytics in the crowd, Proceedings of the 26th Symposium on Operating Systems Principles, SOSP '17, pp.441-459, 2017.

P. Blanchard, R. El-mahdi-el-mhamdi, J. Guerraoui, and . Stainer, Machine learning with adversaries: Byzantine tolerant gradient descent, Advances in Neural Information Processing Systems, 2017.

P. Blanchard, R. Guerraoui, and J. Stainer, Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent, Advances in Neural Information Processing Systems, pp.118-128, 2017.

D. Bogdanov, R. Talviste, and J. Willemson, Deploying secure multi-party computation for financial data analysis -(short paper), Financial Cryptography, vol.7397, pp.57-64, 2012.

P. Bogetoft, D. L. Christensen, I. Damgård, M. Geisler, T. P. Jakobsen et al., Secure multiparty computation goes live, Financial Cryptography, vol.5628, pp.325-343, 2009.

K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H. B. Mcmahan et al., Practical secure aggregation for federated learning on user-held data, 2016.

K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, S. H-brendan-mcmahan et al., Practical secure aggregation for privacy-preserving machine learning, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1175-1191, 2017.

K. Bonawitz, H. Eichner, W. Grieskamp, D. Huba, A. Ingerman et al., Towards federated learning at scale: System design, 2019.

K. Bonawitz, F. Salehi, J. Kone?ný, B. Mcmahan, and M. Gruteser, Federated learning with autotuned communication-efficient secure aggregation, 2019 53nd Asilomar Conference on Signals, Systems, and Computers, 2019.

D. Boneh, E. Boyle, H. Corrigan-gibbs, N. Gilboa, and Y. Ishai, Zero-knowledge proofs on secret-shared data via fully linear PCPs, CRYPTO, vol.11694, pp.67-97, 2019.

F. Bourse, M. Minelli, M. Minihold, and P. Paillier, Fast homomorphic evaluation of deep discretized neural networks, CRYPTO (3), vol.10993, pp.483-512, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01665330

S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, Randomized gossip algorithms, IEEE Transactions on Information Theory, vol.52, issue.6, pp.2508-2530, 2006.

Z. Brakerski, Fully homomorphic encryption without modulus switching from classical gapsvp, CRYPTO, vol.7417, pp.868-886, 2012.

Z. Brakerski, C. Gentry, and V. Vaikuntanathan, (leveled) fully homomorphic encryption without bootstrapping, ITCS, pp.309-325, 2012.

M. Braverman, A. Garg, T. Ma, L. Huy, D. P. Nguyen et al., Communication lower bounds for statistical estimation problems via a distributed data processing inequality, Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, pp.1011-1020, 2016.

W. Brendel, J. Rauber, and M. Bethge, Decision-based adversarial attacks: Reliable attacks against black-box machine learning models, 2017.

S. Theodora, R. Brisimi, T. Chen, A. Mela, . Olshevsky et al., Federated learning of predictive models from federated electronic health records, International journal of medical informatics, vol.112, pp.59-67, 2018.

B. Bünz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille et al., Bulletproofs: Short proofs for confidential transactions and more, 2018 IEEE Symposium on Security and Privacy, pp.21-23, 2018.

J. Buolamwini and T. Gebru, Gender shades: Intersectional accuracy disparities in commercial gender classification, Conference on fairness, accountability and transparency, pp.77-91, 2018.

M. Burkhart and M. Strasser, SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics, Dilip Many, and Xenofontas Dimitropoulos, pp.1-101101, 2010.

S. Caldas, J. Kone?ný, A. H-brendan-mcmahan, and . Talwalkar, Expanding the reach of federated learning by reducing client resource requirements, 2018.

S. Caldas, P. Wu, T. Li, J. Kone?ný, and B. Mcmahan, Virginia Smith, and Ameet Talwalkar. LEAF: A benchmark for federated settings, 2018.

G. Clément-l-canonne, A. Kamath, A. Mcmillan, J. Smith, and . Ullman, The structure of optimal private tests for simple hypotheses, 2019.

N. Carlini and D. Wagner, Towards evaluating the robustness of neural networks, 2017 IEEE Symposium on Security and Privacy (SP), pp.39-57, 2017.

N. Carlini, C. Liu, and J. Kos, The secret sharer: Measuring unintended neural network memorization & extracting secrets, 2018.

T. Chan, E. Shi, and D. Song, Privacy-preserving stream aggregation with fault tolerance, International Conference on Financial Cryptography and Data Security, pp.200-214, 2012.

K. Chang, N. Balachandar, C. Lam, D. Yi, J. Brown et al., Distributed deep learning networks among institutions for medical imaging, Journal of the American Medical Informatics Association, vol.25, issue.8, pp.945-954, 2018.

W. Chang and R. Tandon, On the upload versus download cost for secure and private matrix multiplication. ArXiv, abs, 1906.

D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, 1981.

B. Chen, W. Carvalho, N. Baracaldo, H. Ludwig, and B. Edwards, Taesung Lee, Ian Molloy, and Biplav Srivastava. Detecting backdoor attacks on deep neural networks by activation clustering, 2018.

L. Chen, H. Wang, Z. B. Charles, and D. S. Papailiopoulos, DRACO: Byzantineresilient distributed training via redundant gradients, Proceedings of the 35th International Conference on Machine Learning, ICML, 2018.

M. Chen, R. Mathews, T. Ouyang, and F. Beaufays, Federated learning of out-ofvocabulary words, 2019.

P. Chen, H. Zhang, Y. Sharma, J. Yi, and C. Hsieh, ZOO: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models, Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp.15-26, 2017.

X. Chen, C. Liu, B. Li, K. Lu, and D. Song, Targeted backdoor attacks on deep learning systems using data poisoning, 2017.

Y. Chen, L. Su, and J. Xu, Distributed Statistical Machine Learning in Adversarial Settings, Byzantine Gradient Descent. POMACS, vol.1, 2017.

M. Chenal and Q. Tang, On key recovery attacks against existing somewhat homomorphic encryption schemes, LATINCRYPT, vol.8895, pp.239-258, 2014.

K. Cheng, T. Fan, Y. Jin, Y. Liu, T. Chen et al., SecureBoost: A lossless federated learning framework. CoRR, abs/1901.08755, 2019.

R. Cheng, F. Zhang, J. Kos, W. He, N. Hynes et al., Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts, 2019 IEEE European Symposium on Security and Privacy (EuroS&P), pp.185-200, 2019.

A. Cheu, A. Smith, J. Ullman, D. Zeber, and M. Zhilyaev, Distributed differential privacy via shuffling, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.375-403, 2019.

B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, Private information retrieval, J. ACM, vol.45, issue.6, pp.965-981, 1998.

E. Chou, F. Tramèr, and G. Pellegrino, SentiNet: Detecting physical attacks against deep learning systems, 2018.

P. Christen, Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection, 2012.

G. Cohen, S. Afshar, J. Tapson, and A. Van-schaik, EMNIST: an extension of MNIST to handwritten letters, 2017.

I. Colin, A. Bellet, J. Salmon, and S. Clémençon, Gossip dual averaging for decentralized optimization of pairwise functions, ICML, 2016.
URL : https://hal.archives-ouvertes.fr/hal-02107511

G. Cormode, T. Kulkarni, and D. Srivastava, Marginal release under local differential privacy, Proceedings of the 2018 International Conference on Management of Data, pp.131-146, 2018.

T. Jean-sébastien-coron, M. Lepoint, and . Tibouchi, Scale-invariant fully homomorphic encryption over the integers, Public Key Cryptography, vol.8383, pp.311-328, 2014.

H. Corrigan, -. Gibbs, and D. Boneh, Prio: Private, robust, and scalable computation of aggregate statistics, 14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17), pp.259-282, 2017.

H. Corrigan, -. Gibbs, and D. Kogan, Private information retrieval with sublinear online time, IACR Cryptology ePrint Archive, p.1075, 2019.

C. Cortes and M. Mohri, Domain adaptation and sample bias correction theory and algorithm for regression, Theoretical Computer Science, vol.519, pp.103-126, 2014.

V. Costan and S. Devadas, Intel SGX explained. IACR Cryptology ePrint Archive, issue.086, pp.1-118, 2016.

I. Victor-costan, S. Lebedev, and . Devadas, Sanctum: Minimal hardware extensions for strong software isolation, 25th {USENIX} Security Symposium ({USENIX} Security 16), pp.857-874, 2016.

C. Costello, C. Fournet, J. Howell, M. Kohlweiss, B. Kreuter et al., Geppetto: Versatile verifiable computation, IEEE Symposium on Security and Privacy, pp.253-270, 2015.

A. Cotter, O. Shamir, N. Srebro, and K. Sridharan, Better mini-batch algorithms via accelerated gradient methods, Advances in Neural Information Processing Systems 24, 2011.

M. Courbariaux, Y. Bengio, and J. David, BinaryConnect: Training deep neural networks with binary weights during propagations, Advances in neural information processing systems, pp.3123-3131, 2015.

P. Courtiol, C. Maussion, M. Moarii, E. Pronier, S. Pilcer et al., Deep learning-based classification of mesothelioma improves prediction of patient outcome, Nature medicine, pp.1-7, 2019.

M. Thomas, . Cover, A. Joy, and . Thomas, Elements of information theory, 2012.

A. Gabriela-f-cretu, . Stavrou, E. Michael, S. J. Locasto, A. Stolfo et al., Casting out demons: Sanitizing training data for anomaly sensors, 2008 IEEE Symposium on Security and Privacy, pp.81-95, 2008.

R. Cummings, S. Krehbiel, K. Lai, and U. Tantitongpipat, Differential privacy for growing databases, Advances in Neural Information Processing Systems 31, NeurIPS '18, pp.8864-8873, 2018.

R. Cummings, S. Krehbiel, Y. Mei, R. Tuo, and W. Zhang, Differentially private changepoint detection, Advances in Neural Information Processing Systems 31, NeurIPS '18, pp.10825-10834, 2018.

R. Cummings, O. Dekel, K. Heffetz, and . Ligett, Bringing differential privacy into the experimental economics lab: Theory and an application to a public-good game, 2019.

R. Cummings, V. Gupta, D. Kimpara, and J. Morgenstern, On the compatibility of privacy and fairness, Proceedings of Fairness in User Modeling, Adaptation and Personalization, FairUMAP, 2019.

. Damgård, On ? protocols

D. Data, L. Song, and S. Diggavi, Data encoding for Byzantine-resilient distributed optimization, 2019.

. Walter-de-brouwer, The federated future is ready for shipping, 2019.

J. Dean, G. S. Corrado, R. Monga, K. Chen, M. Devin et al., Large scale distributed deep networks, Proceedings of the International Conference on Neural Information Processing Systems, pp.1223-1231, 2012.

O. Dekel, R. Gilad-bachrach, O. Shamir, and L. Xiao, Optimal distributed online prediction using mini-batches, J. Mach. Learn. Res, vol.13, issue.1, 2012.

I. Diakonikolas, G. Kamath, D. Kane, J. Li, J. Steinhardt et al., Sever: A robust meta-algorithm for stochastic optimization, Proceedings of the 36th International Conference on Machine Learning, vol.97, pp.9-15, 2019.

M. Diaz, P. Kairouz, J. Liao, and L. Sankar, Theoretical guarantees for model auditing with finite adversaries, 2019.

, Learning with privacy at scale, Differential Privacy Team, vol.1, 2017.

J. Bolin-ding, S. Kulkarni, and . Yekhanin, Collecting telemetry data privately, Advances in Neural Information Processing Systems, vol.30, 2017.

Z. Ding, Y. Wang, G. Wang, D. Zhang, and D. Kifer, Detecting violations of differential privacy, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS '18, pp.475-489, 2018.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, 2004.

G. L. Rafael, S. E. Oliveira, and . Rouayheb, Lifting private information retrieval from two to any number of messages, 2018 IEEE International Symposium on Information Theory (ISIT), pp.1744-1748, 2018.

J. R. Douceur, The sybil attack, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.251-260, 2002.

Y. Dubey and A. Korolova, The power of the hybrid model for mean estimation, Workshop on Privacy Preserving Machine Learning at NeurIPS, 2018.

C. John, M. I. Duchi, M. Jordan, and . Wainwright, Local privacy and statistical minimax rates, Foundations of Computer Science (FOCS), 2013 IEEE 54th Annual Symposium on, pp.429-438, 2013.

S. Dutta, G. Joshi, S. Ghosh, P. Dube, and P. Nagpurkar, Slow and Stale Gradients Can Win the Race: Error-Runtime Trade-offs in, Distributed SGD. International Conference on Artificial Intelligence and Statistics (AISTATS), 2018.

C. Dwork, Differential privacy: A survey of results, International Conference on Theory and Applications of Models of Computation, pp.1-19, 2008.

C. Dwork and A. Roth, The algorithmic foundations of differential privacy, Foundations and Trends in Theoretical Computer Science, vol.9, issue.3-4, pp.211-407, 2014.

C. Dwork, K. Kenthapadi, F. Mcsherry, I. Mironov, and M. Naor, Our data, ourselves: Privacy via distributed noise generation, Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.486-503, 2006.

C. Dwork, F. Mcsherry, K. Nissim, and A. D. Smith, Calibrating noise to sensitivity in private data analysis, IACR Theory of Cryptography Conference (TCC), vol.3876, pp.265-284, 2006.

C. Dwork, G. N. Rothblum, and S. Vadhan, Boosting and differential privacy, Proceedings of the IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS '10, pp.51-60, 2010.

C. Dwork, M. Hardt, T. Pitassi, O. Reingold, and R. Zemel, Fairness through awareness, Proceedings of the 3rd innovations in theoretical computer science conference, pp.214-226, 2012.

L. Eckhouse, K. Lum, C. Conti-cook, and J. Ciccolini, Layers of bias: A unified approach for understanding problems with risk assessment, Criminal Justice and Behavior, vol.46, issue.2, pp.185-209, 2019.

H. Eichner, H. B. Koren, N. Mcmahan, K. Srebro, and . Talwar, Semi-cyclic stochastic gradient descent, Accepted to ICML 2019, 2019.

K. Eldefrawy, G. Tsudik, A. Francillon, and D. Perito, SMART: secure and minimal architecture for (establishing dynamic) root of trust, NDSS. The Internet Society, 2012.

A. Elgabli, J. Park, S. Amrit, M. Bedi, V. Bennis et al., GADMM: Fast and communication efficient framework for distributed machine learning, 2019.

T. Elsken, J. H. Metzen, and F. Hutter, Efficient multi-objective neural architecture search via Lamarckian evolution, 2018.

L. Engstrom, B. Tran, D. Tsipras, L. Schmidt, and A. Madry, A rotation and a translation suffice: Fooling CNNs with simple transformations, 2017.

Ú. Erlingsson, V. Pihur, and A. Korolova, RAPPOR: Randomized aggregatable privacypreserving ordinal response, ACM CCS, 2014.

Ú. Erlingsson, V. Feldman, I. Mironov, A. Raghunathan, K. Talwar et al., Amplification by shuffling: From local to central differential privacy via anonymity, SODA, pp.2468-2479, 2019.

. Eu-cordis, Machine learning ledger orchestration for drug discovery, 2019.

, ?WT.mc_id=RSS-Feed& WT.rss_f=project&WT.rss_a=223634&WT.rss_ev=a. Retrieved, 2019.

S. Falkner, A. Klein, and F. Hutter, BOHB: Robust and efficient hyperparameter optimization at scale, 2018.

J. Fan and F. Vercauteren, Somewhat practical fully homomorphic encryption, IACR Cryptology ePrint Archive, p.144, 2012.

M. Fang, X. Cao, J. Jia, and N. Gong, Local model poisoning attacks to Byzantine-robust federated learning, 2019.

. Featurecloud and . Featurecloud, Our vision, 2019.

V. Feldman, I. Mironov, K. Talwar, and A. Thakurta, Privacy amplification by iteration, IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS), pp.521-532, 2018.

C. Feutry, P. Piantanida, Y. Bengio, and P. Duhamel, Learning anonymized representations with adversarial neural networks. CoRR, abs/1802.09386, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01742447

C. Finn, P. Abbeel, and S. Levine, Model-agnostic meta-learning for fast adaptation of deep networks, Proceedings of the 34th International Conference on Machine Learning, 2017.

A. Francillon, Q. Nguyen, G. Kasper-bonne-rasmussen, and . Tsudik, A minimalist approach to remote attestation, DATE, pp.1-6, 2014.

M. Fredrikson, S. Jha, and T. Ristenpart, Model inversion attacks that exploit confidence information and basic countermeasures, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.1322-1333, 2015.

C. Fung, J. M. Chris, I. Yoon, and . Beschastnikh, Mitigating sybils in federated learning poisoning, 2018.

J. Furukawa, Y. Lindell, A. Nof, and O. Weinstein, High-throughput secure three-party computation for malicious adversaries and an honest majority, EUROCRYPT, vol.10211, pp.225-255, 2017.

A. Gaier and D. Ha, Weight agnostic neural networks, 2019.

V. Gandikota, R. Kumar-maity, and A. Mazumdar, vqSGD: Vector quantized stochastic gradient descent, 2019.

A. Gascón, P. Schoppmann, B. Balle, M. Raykova, J. Doerner et al., Privacy-preserving distributed linear regression on high-dimensional data, PoPETs, vol.2017, issue.4, pp.345-364, 2017.

R. Gennaro, C. Gentry, and B. Parno, Non-interactive verifiable computing: Outsourcing computation to untrusted workers, CRYPTO, vol.6223, pp.465-482

. Springer, , 2010.

R. Gennaro, C. Gentry, B. Parno, and M. Raykova, Quadratic span programs and succinct NIZKs without PCPs, EUROCRYPT, vol.7881, pp.626-645

. Springer, , 2013.

C. Gentry and S. Halevi, Compressible FHE with applications to PIR, TCC, vol.11892, pp.438-464, 2019.

C. Gentry, Fully homomorphic encryption using ideal lattices, Stoc, vol.9, pp.169-178, 2009.

R. C. Geyer, T. Klein, and M. Nabi, Differentially private federated learning: A client level perspective, 2017.

B. Ghazi, N. Golowich, R. Kumar, R. Pagh, and A. Velingker, On the power of multiple anonymous messages, 2019.

B. Ghazi, P. Manurangsi, R. Pagh, and A. Velingker, Private aggregation from fewer anonymous messages, 2019.

B. Ghazi, R. Pagh, and A. Velingker, Scalable and differentially private distributed aggregation in the shuffled model, 2019.

A. Ghosh, T. Roughgarden, and M. Sundararajan, Universally utility-maximizing privacy mechanisms, Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC '09, pp.351-360, 2009.

R. Gilad-bachrach, N. Dowlin, K. Laine, K. E. Lauter, M. Naehrig et al., CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy, Proceedings of the 33nd International Conference on Machine Learning, pp.201-210, 2016.

O. Goldreich, S. Micali, and A. Wigderson, How to play any mental game, Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, STOC '87, pp.218-229

S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof systems, SIAM J. Comput, vol.18, issue.1, pp.186-208, 1989.

S. Goldwasser, Y. T. Kalai, and G. N. Rothblum, Delegating computation: interactive proofs for muggles, STOC, pp.113-122, 2008.

I. J. Goodfellow, J. Shlens, and C. Szegedy, Explaining and harnessing adversarial examples, 3rd International Conference on Learning Representations, 2015.

J. Ian, J. Goodfellow, C. Shlens, and . Szegedy, Explaining and harnessing adversarial examples, 2015.

S. Goryczka and L. Xiong, A comprehensive comparison of multiparty secure additions with differential privacy, IEEE Trans. Dependable Sec. Comput, vol.14, issue.5, pp.463-477, 2017.

T. Gu, B. Dolan-gavitt, and S. Garg, BadNets: Identifying vulnerabilities in the machine learning model supply chain, 2017.

O. Gupta and R. Raskar, Distributed learning of deep neural network over multiple agents, Journal of Network and Computer Applications, vol.116, pp.1-8, 2018.

F. Haddadpour, M. M. Kamani, M. Mahdavi, and . Viveck-r-cadambe, Local SGD with periodic averaging: Tighter analysis and adaptive synchronization, 2019.

A. Haeberlen, C. Benjamin, A. Pierce, and . Narayan, Differential privacy under fire, USENIX Security Symposium, 2011.

S. Halevi, Y. Lindell, and B. Pinkas, Secure computation on the web: Computing without simultaneous interaction, Annual Cryptology Conference, pp.132-150, 2011.

S. Han, H. Mao, and W. J. Dally, Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding, 2015.

Y. Han, A. , and T. Weissman, Geometric lower bounds for distributed parameter estimation under communication constraints, Proceedings of Machine Learning Research, vol.75, pp.1-26, 2018.

A. Hard, K. Rao, R. Mathews, F. Beaufays, S. Augenstein et al., Federated learning for mobile keyboard prediction, 2018.

M. Hardt, E. Price, and N. Srebro, Equality of opportunity in supervised learning, Advances in Neural Information Processing Systems, 2016.

S. Hardy, W. Henecka, H. Ivey-law, R. Nock, G. Patrini et al., Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption, 2017.

T. Hashimoto, M. Srivastava, H. Namkoong, and P. Liang, Fairness without demographics in repeated loss minimization, International Conference on Machine Learning, pp.1934-1943, 2018.

C. He, C. Tan, H. Tang, S. Qiu, and J. Liu, Central server free federated learning over single-sided trust social networks, 2019.

L. He, A. Bian, and M. Jaggi, COLA: Decentralized linear learning, NeurIPS 2018 -Advances in Neural Information Processing Systems 31, 2018.

Ú. Hébert-johnson, M. Kim, O. Reingold, and G. Rothblum, Multicalibration: Calibration for the (computationally-identifiable) masses, International Conference on Machine Learning, pp.1944-1953, 2018.

J. Hoffman, M. Mohri, and N. Zhang, Algorithms and theory for multiple-source adaptation, Advances in Neural Information Processing Systems, pp.8246-8256, 2018.

S. Horvath, C. Ho, L. Horvath, A. N. Sahu, M. Canini et al., , 2019.

K. Hsieh, A. Phanishayee, O. Mutlu, and P. B. Gibbons, The non-IID data quagmire of decentralized machine learning, 2019.

T. Hsu, H. Qi, and M. Brown, Measuring the effects of non-identical data distribution for federated visual classification, 2019.

Z. Huo, B. Gu, and H. Huang, Training neural networks using features replay, Advances in Neural Information Processing Systems, pp.6659-6668, 2018.

R. Intel, Architecture instruction set extensions programming reference, Intel Corporation, 2012.

M. Ion, B. Kreuter, E. Nergiz, S. Patel, S. Saxena et al., Private intersection-sum protocol with applications to attributing aggregate ad conversions, Cryptology ePrint Archive, p.738, 2017.

M. Ion, B. Kreuter, A. E. Nergiz, S. Patel, M. Raykova et al., On deploying secure computing commercially: Private intersection-sum protocols and their business applications, IACR Cryptology ePrint Archive, p.723, 2019.

Y. Ishai, J. Kilian, K. Nissim, and E. Petrank, Extending oblivious transfers efficiently, CRYPTO, vol.2729, pp.145-161, 2003.

J. Jacobsen, J. Behrmannn, N. Carlini, F. Tramèr, and N. Papernot, Exploiting excessive invariance caused by norm-bounded adversarial robustness, 2019.

M. Jaderberg, W. M. Czarnecki, S. Osindero, O. Vinyals, A. Graves et al., Decoupled neural interfaces using synthetic gradients, Proceedings of the 34th International Conference on Machine Learning, vol.70, pp.1627-1635, 2017.

M. Jagielski, M. J. Kearns, J. Mao, A. Oprea, A. Roth et al., Differentially private fair learning, 2018.

E. Jeong, S. Oh, H. Kim, J. Park, M. Bennis et al., Communication-efficient on-device machine learning: Federated distillation and augmentation under non-IID private data. CoRR, abs/1811.11479, 2018.

Z. Jia, A. Syed, and . Jafar, On the capacity of secure distributed matrix multiplication, ArXiv, 2019.

Y. Jiang, J. Kone?ný, K. Rush, and S. Kannan, Improving federated learning personalization via model agnostic meta learning, 2019.

S. Kadhe, B. Garcia, A. Heidarzadeh, S. E. Rouayheb, and A. Sprintson, Private information retrieval with side information: The single server case, 55th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.1099-1106, 2017.

P. Kairouz, S. Oh, and P. Viswanath, Extremal mechanisms for local differential privacy, Advances in Neural Information Processing Systems, vol.27, pp.2879-2887, 2014.

P. Kairouz, K. Bonawitz, and D. Ramage, Discrete distribution estimation under local privacy, International Conference on Machine Learning, pp.2436-2444, 2016.

P. Kairouz, S. Oh, and P. Viswanath, The composition theorem for differential privacy, IEEE Transactions on Information Theory, vol.63, issue.6, pp.4037-4049, 2017.

T. Kamishima, S. Akaho, and J. Sakuma, Fairness-aware learning through regularization approach, 2011 IEEE 11th International Conference on Data Mining Workshops, pp.643-650, 2011.

D. Kang, Y. Sun, D. Hendrycks, T. Brown, and J. Steinhardt, Testing robustness against unforeseen adversaries, 2019.

J. Kang, Z. Xiong, D. Niyato, S. Xie, and J. Zhang, Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory, IEEE Internet of Things Journal, 2019.

J. Kang, Z. Xiong, D. Niyato, H. Yu, Y. Liang et al., Incentive design for efficient federated learning in mobile networks: A contract theory approach, IEEE VTS Asia Pacific Wireless Communications Symposium, pp.1-5, 2019.

H. Karimi, J. Nutini, and M. Schmidt, Linear convergence of gradient and proximal-gradient methods under the Polyak-?ojasiewicz condition, Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp.795-811, 2016.

S. Sai-praneeth-karimireddy, M. Kale, . Mohri, J. Sashank, . Reddi et al., Stochastic controlled averaging for on-device federated learning, 2019.

Q. Sai-praneeth-karimireddy, S. Rebjock, M. Stich, and . Jaggi, Error feedback fixes SignSGD and other gradient compression schemes, ICML, 2019.

H. K. Shiva-prasad-kasiviswanathan, K. Lee, S. Nissim, A. D. Raskhodnikova, and . Smith, What can we learn privately?, SIAM J. Comput, vol.40, issue.3, pp.793-826, 2011.

M. J. Kearns, A. Roth, Z. S. Wu, and G. Yaroslavtsev,

. Corr, , 2015.

A. Khaled and P. Richtárik, Gradient descent with compressed iterates, 2019.

A. Khaled, K. Mishchenko, and P. Richtárik, First analysis of local GD on heterogeneous data, 2019.

A. Khaled, K. Mishchenko, and P. Richtárik, Better communication complexity for local SGD, 2019.

M. Khodak, M. Balcan, and A. Talwalkar, Adaptive gradient-based meta-learning methods, Advances in Neural Information Processing Systems, 2019.

D. Kifer and A. Machanavajjhala, Pufferfish: A framework for mathematical privacy definitions, ACM Transactions on Database Systems, vol.39, issue.1, pp.1-3, 2014.

Y. Kim, J. Sun, H. Yu, and X. Jiang, Federated tensor factorization for computational phenotyping, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.887-895, 2017.

R. D. King, C. Feng, and A. Sutherland, StatLog: comparison of classification algorithms on large real-world problems, Applied Artificial Intelligence an International Journal, vol.9, issue.3, pp.289-333, 1995.

P. Koeberl, S. Schulz, A. Sadeghi, and V. Varadharajan, TrustLite: a security architecture for tiny embedded devices, EuroSys, vol.10, 2014.

W. Pang, P. Koh, and . Liang, Understanding black-box predictions via influence functions, Proceedings of the 34th International Conference on Machine Learning, vol.70, pp.1885-1894, 2017.

P. Wei-koh, J. Steinhardt, and P. Liang, Stronger data poisoning attacks break data sanitization defenses, 2018.

R. Kohavi and G. , Automatic parameter selection by minimizing estimated error, Machine Learning Proceedings, pp.304-312, 1995.

A. Koloskova, T. Lin, U. Sebastian, M. Stich, and . Jaggi, Decentralized deep learning with arbitrary communication compression, 2019.

A. Koloskova, U. Sebastian, M. Stich, and . Jaggi, Decentralized Stochastic Optimization and Gossip Algorithms with Compressed Communication, ICML, 2019.

J. Kone?ný and P. Richtárik, Randomized distributed mean estimation: Accuracy vs communication, Frontiers in Applied Mathematics and Statistics, vol.4, p.62, 2018.

J. Kone?ný, B. Mcmahan, F. X. Yu, P. Richtárik, A. Theertha-suresh et al., Federated learning: Strategies for improving communication efficiency, 2016.

S. Kuppam, R. Mckenna, D. Pujol, M. Hay, A. Machanavajjhala et al., Fair decision making using privacy-protected data. CoRR, abs/1905.12744, 2019.

A. Kurakin, I. Goodfellow, and S. Bengio, Adversarial machine learning at scale, 2016.

E. Kushilevitz and N. Nisan, Communication Complexity, 1997.

E. Kushilevitz and R. Ostrovsky, Replication is not needed: Single database, computationally-private information retrieval, Proc. of the 38th Annu. IEEE Symp. on Foundations of Computer Science, pp.364-373, 1997.

J. Matt, J. Kusner, C. Loftus, R. Russell, and . Silva, Counterfactual fairness, Advances in Neural Information Processing Systems, pp.4066-4076, 2017.

A. Kwon, D. Lazar, S. Devadas, and B. F. Riffle, Proceedings on Privacy Enhancing Technologies, vol.2016, pp.115-134, 2016.

M. Brenden, R. Lake, J. Salakhutdinov, J. B. Gross, and . Tenenbaum, One shot learning of simple visual concepts, Proceedings of the Conference of the Cognitive Science Society (CogSci), 2017.

A. Lalitha, T. Osman-cihan-kilinc, F. Javidi, and . Koushanfar, Peer-to-peer Federated Learning on Graphs, 2019.

A. Lalitha, X. Wang, O. Kilinc, Y. Lu, T. Javidi et al., Decentralized Bayesian learning over graphs, 1905.

L. Lamport, R. Shostak, and M. Pease, The Byzantine generals problem, ACM Transactions on Programming Languages and Systems (TOPLAS), vol.4, issue.3, pp.382-401, 1982.

G. Lan, An optimal method for stochastic composite optimization, Mathematical Programming, vol.133, issue.1, pp.365-397, 2012.

A. Lapets, N. Volgushev, A. Bestavros, F. Jansen, and M. Varia, Secure MPC for analytics as a web application, SecDev, pp.73-74, 2016.

M. Lécuyer, V. Atlidakis, R. Geambasu, D. Hsu, and S. Jana, Certified robustness to adversarial examples with differential privacy, 2019 IEEE Symposium on Security and Privacy, vol.2019, pp.656-672, 2019.

D. Leroy, A. Coucke, T. Lavril, T. Gisselbrecht, and J. Dureau, Federated learning for keyword spotting, 2018.

J. Li, M. Khodak, S. Caldas, and A. Talwalkar, Differentially private meta-learning, 2019.

T. Li, A. Kumar-sahu, M. Zaheer, M. Sanjabi, A. Talwalkar et al., Federated optimization in heterogeneous networks, 2018.

T. Li, A. Kumar-sahu, A. Talwalkar, and V. Smith, Federated learning: Challenges, methods, and future directions, 2019.

T. Li, M. Sanjabi, and V. Smith, Fair resource allocation in federated learning, 2019.

X. Li, K. Huang, W. Yang, S. Wang, and Z. Zhang, On the convergence of fedavg on non-IID data, 2019.

X. Li, W. Yang, S. Wang, and Z. Zhang, Communication efficient decentralized training with multiple local updates, 2019.

X. Lian, C. Zhang, H. Zhang, C. Hsieh, W. Zhang et al., Can Decentralized Algorithms Outperform Centralized Algorithms? A Case Study for Decentralized Parallel Stochastic Gradient Descent, NIPS, 2017.

X. Lian, W. Zhang, C. Zhang, and J. Liu, Asynchronous Decentralized Parallel Stochastic Gradient Descent, ICML, 2018.

J. Liao, C. Huang, P. Kairouz, and L. Sankar, Learning generative adversarial representations (GAP) under fairness and censoring constraints, 2019.

D. Lie and P. Maniatis, Glimmers: Resolving the privacy/trust quagmire, Proceedings of the 16th Workshop on Hot Topics in Operating Systems, pp.94-99, 2017.

D. Lin, S. Talathi, and S. Annapureddy, Fixed point quantization of deep convolutional networks, International Conference on Machine Learning, pp.2849-2858, 2016.

T. Lin, U. Sebastian, M. Stich, and . Jaggi, Don't use large mini-batches, use local SGD, 2018.

Y. Lin, S. Han, H. Mao, Y. Wang, and W. J. Dally, Deep gradient compression: Reducing the communication bandwidth for distributed training, 2017.

H. Liu, K. Simonyan, and Y. Yang, DARTS: Differentiable architecture search, 2018.

K. Liu, B. Dolan-gavitt, and S. Garg, Fine-pruning: Defending against backdooring attacks on deep neural networks, International Symposium on Research in Attacks, Intrusions, and Defenses, pp.273-294, 2018.

X. Liu and S. Oh, Minimax rates of estimating approximate differential privacy, 2019.

Y. Liu, T. Chen, and Q. Yang, Secure federated transfer learning, 2018.

Y. Liu, S. Ma, Y. Aafer, W. Lee, J. Zhai et al., Trojaning attack on neural networks, 25th Annual Network and Distributed System Security Symposium, NDSS 2018, 2018.

J. Luo, X. Wu, Y. Luo, A. Huang, Y. Huang et al., Real-world image datasets for federated learning, 2019.

R. Luo, F. Tian, T. Qin, E. Chen, and T. Liu, Neural architecture optimization, Advances in neural information processing systems, pp.7816-7827, 2018.

J. Ma, Q. Zhang, J. Lou, J. Ho, L. Xiong et al., Privacy-preserving tensor factorization for collaborative health data analysis, ACM CIKM, vol.2, 2019.

Y. Ma, X. Zhu, and J. Hsu, Data poisoning against differentially-private learners: Attacks and defenses, International Joint Conference on Artificial Intelligence (IJCAI), 2019.

D. Madras, E. Creager, T. Pitassi, and R. Zemel, Learning adversarially fair and transferable representations, In ICML, 2018.

A. Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu, Towards deep learning models resistant to adversarial attacks, 2017.

Y. Mansour, M. Mohri, and A. Rostamizadeh, Domain adaptation: Learning bounds and algorithms, 2009.

Y. Mansour, M. Mohri, and A. Rostamizadeh, Domain adaptation with multiple sources, Advances in neural information processing systems, pp.1041-1048, 2009.

M. Alicia-r-martin, Y. Kanai, Y. Kamatani, . Okada, M. Benjamin et al., Current clinical use of polygenic scores will risk exacerbating health disparities, BioRxiv, p.441261, 2019.

D. H-brendan-mcmahan and . Ramage, Federated learning: Collaborative machine learning without centralized training data, 2017.

G. H-brendan-mcmahan, U. Andrew, S. Erlingsson, I. Chien, N. Mironov et al., A general approach to adding differential privacy to iterative training procedures, p.1812, 2018.

E. H-brendan-mcmahan, D. Moore, S. Ramage, B. Hampson, and . Aguera-y-arcas, Communication-efficient learning of deep networks from decentralized data, Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, pp.1273-1282, 2016.

D. H-brendan-mcmahan, K. Ramage, L. Talwar, and . Zhang, Learning differentially private recurrent language models, International Conference on Learning Representations (ICLR), 2018.

F. Mcsherry and K. Talwar, Mechanism design via differential privacy, FOCS, pp.94-103, 2007.

S. Mei and X. Zhu, Using machine teaching to identify optimal training-set attacks on machine learners, Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015.

L. Melis, C. Song, V. Emiliano-de-cristofaro, and . Shmatikov, Exploiting unintended feature leakage in collaborative learning, 2018.

R. El-mahdi-el-mhamdi, S. Guerraoui, and . Rouault, The hidden vulnerability of distributed learning in Byzantium, ICML, 2018.

S. Micali, Computationally sound proofs, SIAM J. Comput, vol.30, issue.4, pp.1253-1298, 2000.

I. Mironov, On significance of the least significant bits for differential privacy, Proceedings of the 2012 ACM conference on Computer and communications security, pp.650-661, 2012.

I. Mironov, Rényi differential privacy, 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp.263-275, 2017.

I. Mironov and O. Pandey, Omer Reingold, and Salil Vadhan. Computational differential privacy, Advances in Cryptology-CRYPTO, pp.126-142, 2009.

I. Mironov, K. Talwar, and L. Zhang, R\'enyi differential privacy of the sampled Gaussian mechanism, 2019.

S. Mitchell, E. Potash, and S. Barocas, Prediction-based decisions and fairness: A catalogue of choices, assumptions, and definitions, 2018.

V. Mnih and G. E. Hinton, Learning to label aerial images from noisy data, Proceedings of the 29th International conference on machine learning (ICML-12), pp.567-574, 2012.

P. Mohassel and Y. Zhang, SecureML: A system for scalable privacy-preserving machine learning, IEEE Symposium on Security and Privacy, pp.19-38, 2017.

M. Mohri, G. Sivek, and A. Suresh, Agnostic Federated Learning, ICML, 2019.

G. Jose, T. Moreno-torres, R. Raeder, N. V. Alaiz-rodríguez, F. Chawla et al., A unifying view on dataset shift in classification, Pattern Recogn, vol.45, issue.1, 2012.

. Musketeer and . Musketeer, , 2019.

C. Naim, F. Ye, and S. E. Rouayheb, ON-OFF privacy with correlated requests, 2019 IEEE International Symposium on Information Theory (ISIT), 2019.

N. Natarajan, S. Inderjit, . Dhillon, K. Pradeep, A. Ravikumar et al., Learning with noisy labels, Advances in neural information processing systems, pp.1196-1204, 2013.

A. Nichol, J. Achiam, and J. Schulman, On first-order meta-learning algorithms, 2018.

V. Nikolaenko, U. Weinsberg, S. Ioannidis, M. Joye, D. Boneh et al., Privacypreserving ridge regression on hundreds of millions of records, IEEE Symposium on Security and Privacy, pp.334-348, 2013.

C. Niu, F. Wu, S. Tang, L. Hua, R. Jia et al., Secure federated submodel learning, 2019.

, Defense in depth: A practical strategy for achieving Information Assurance in today's highly networked environments, 2012.

D. Oktay, J. Ballé, S. Singh, and A. Shrivastava, Model compression by entropy penalized reparameterization, 2019.

F. Olumofin and I. Goldberg, Revisiting the computational practicality of private information retrieval, International Conference on Financial Cryptography and Data Security, pp.158-172, 2011.

Q. Sinno-jialin-pan and . Yang, A survey on transfer learning, IEEE Transactions on Knowledge and Data Engineering, vol.22, issue.10, pp.1345-1359, 2010.

N. Papernot, P. Mcdaniel, I. Goodfellow, S. Jha, A. Berkay-celik et al., Practical black-box attacks against machine learning, Proceedings of the 2017 ACM on Asia conference on computer and communications security, pp.506-519, 2017.

J. Park, S. Samarakoon, M. Bennis, and M. Debbah, , 2018.

B. Parno, J. Howell, C. Gentry, and M. Raykova, Pinocchio: nearly practical verifiable computation, Commun. ACM, vol.59, issue.2, pp.103-112, 2016.

P. Kumar-kshitij and A. Dieuleveut, Communication trade-offs for synchronized distributed SGD with large step size, NeurIPS, 2019.

S. Patel, G. Persiano, and K. Yeo, Private stateful information retrieval, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS '18, pp.1002-1019, 2018.

G. Patrini, R. Nock, S. Hardy, and T. S. Caetano, Fast learning from distributed datasets without entity matching, Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, pp.1909-1917, 2016.

F. Pedregosa, Hyperparameter optimization with approximate gradient, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01386410

H. Pham, M. Guan, B. Zoph, Q. Le, and J. Dean, Efficient neural architecture search via parameter sharing, International Conference on Machine Learning, pp.4092-4101, 2018.

S. Pichai, Google's Sundar Pichai: Privacy Should Not Be a Luxury Good, New York Times, 2019.

V. Pichapati, A. T. Suresh, X. Felix, . Yu, J. Sashank et al., AdaCliP: Adaptive clipping for private SGD, 2019.

V. Pihur, A. Korolova, F. Liu, S. Sankuratripati, M. Yung et al., Differentially-private "Draw and Discard" machine learning, 2018.

K. Pillutla, M. Sham, Z. Kakade, and . Harchaoui, Robust aggregation for federated learning, 2019.

J. Quionero-candela, M. Sugiyama, A. Schwaighofer, and N. D. Lawrence, Dataset Shift in Machine Learning, p.9780262170055, 2009.

S. Rajput, H. Wang, Z. Charles, and D. Papailiopoulos, DETOX: A redundancy-based framework for faster and more robust gradient aggregation, 2019.

S. Ramaswamy, R. Mathews, K. Rao, and F. Beaufays, Federated learning for emoji prediction in a mobile keyboard, 2019.

V. Rastogi and S. Nath, Differentially private aggregation of distributed time-series with transformation and encryption, Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, SIGMOD '10, pp.735-746, 2010.

S. Ravi and H. Larochelle, Optimization as a model for few-shot learning, Proceedings of the 5th International Conference on Learning Representations, 2017.

E. Real, S. Moore, A. Selle, S. Saxena, Y. L. Suematsu et al., Large-scale evolution of image classifiers, Proceedings of the 34th International Conference on Machine Learning, vol.70, pp.2902-2911, 2017.

E. Real, A. Aggarwal, Y. Huang, and Q. Le, Regularized evolution for image classifier architecture search, Proceedings of the AAAI Conference on Artificial Intelligence, vol.33, pp.4780-4789, 2019.

A. Reisizadeh, A. Mokhtari, H. Hassani, A. Jadbabaie, and R. Pedarsani, Fedpaq: A communication-efficient federated learning method with periodic averaging and quantization, 2019.

A. Reisizadeh and H. Taheri, Aryan Mokhtari, Hamed Hassani, and Ramtin Pedarsani. Robust and communication-efficient collaborative learning, 2019.

L. Reyzin, A. D. Smith, and S. Yakoubov, Turning HATE into LOVE: homomorphic ad hoc threshold encryption for scalable MPC, IACR Cryptology ePrint Archive, p.997, 2018.

K. Sadegh-riazi, B. Laine, W. Pelton, and . Dai, HEAX: High-performance architecture for computation on homomorphically encrypted data in the cloud, 2019.

R. Richardson, J. Schultz, and K. Crawford, Dirty data, bad predictions: How civil rights violations impact police data, predictive policing systems, and justice, 2019.

D. Brian and . Ripley, Statistical aspects of neural networks. Networks and chaos-statistical and probabilistic aspects, vol.50, pp.40-123, 1993.

L. Ronald-l-rivest, M. L. Adleman, and . Dertouzos, On data banks and privacy homomorphisms. Foundations of Secure Computation, pp.169-179, 1978.

E. Roth, D. Noble, B. H. Falk, and A. Haeberlen, Honeycrisp: large-scale differentially private aggregation without a trusted core, SOSP, pp.196-210, 2019.

T. Ryffel, A. Trask, M. Dahl, B. Wagner, J. Mancuso et al., A generic framework for privacy preserving deep learning, 2018.

K. John, . Salmon, A. Mark, R. O. Moraes, D. E. Dror et al., Parallel random numbers: As easy as 1, 2, 3, Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, p.16, 2011.

S. Samarakoon, M. Bennis, W. Saad, and M. Debbah, Federated learning for ultra-reliable low-latency V2V communications. CoRR, abs/1805.09253, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01923670

P. Sai-sri-sathya, R. Vepakomma, R. Raskar, S. Ramachandra, and . Bhattacharya, A review of homomorphic encryption libraries for secure computation, 2018.

F. Sattler, S. Wiedemann, K. Müller, and W. Samek, Robust and communicationefficient federated learning from non-IID data, 2019.

R. Schnell, Efficient private record linkage of very large datasets, 59 th World Statistics Congress, 2013.

R. Schnell, T. Bachteler, and J. Reiher, A novel error-tolerant anonymous linking code, German Record Linkage Center Working Paper Series, 2011.

C. P. Schnorr, Efficient identification and signatures for smart cards, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, EUROCRYPT '89, 1990.

. Seal, . Microsoft, and . Seal, , 2019.

A. Seshadri, M. Luk, A. Perrig, P. K. Leendert-van-doom, and . Khosla, Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems, Malware Detection, vol.27, pp.253-289, 2007.

A. Shafahi, M. Najibi, A. Ghiasi, Z. Xu, J. Dickerson et al., Adversarial training for free, 2019.

V. Sharma, P. Vepakomma, T. Swedish, K. Chang, J. Kalpathy-cramer et al., ExpertMatcher: Automating ML model selection for clients using hidden representations, 2019.

Y. Sharma and P. Chen, Attacking the Madry defense model with l 1-based adversarial examples, 2017.

Y. Shen and S. Sanghavi, Learning with bad training data via iterative trimmed loss minimization, Proceedings of the 36th International Conference on Machine Learning, vol.97, pp.9-15, 2019.

E. Shi, E. Chan, R. Rieffel, D. Chow, and . Song, Privacy-preserving aggregation of time-series data, Annual Network & Distributed System Security Symposium (NDSS), 2011.

R. Shokri, M. Stronati, C. Song, and V. Shmatikov, Membership inference attacks against machine learning models, 2017 IEEE Symposium on Security and Privacy (SP), pp.3-18, 2017.

K. Shridhar, F. Laumann, and M. Liwicki, A comprehensive guide to Bayesian convolutional neural network with variational inference, 1901.

D. L. Silver, Q. Yang, and L. Li, Lifelong machine learning systems: Beyond learning algorithms, AAAI Spring Symposium Series, 2013.

A. Singh, P. Vepakomma, O. Gupta, and R. Raskar, Detailed comparison of communication efficiency of split learning and federated learning, 2019.

R. Sion and B. Carbunar, On the computational practicality of private information retrieval, Proceedings of the Network and Distributed Systems Security Symposium, pp.2006-2012, 2007.

V. Smith, C. Chiang, M. Sanjabi, and A. S. Talwalkar, Federated Multi-Task Learning, NIPS, 2017.

J. Snell, K. Swersky, and R. S. Zemel, Prototypical networks for few-shot learning, Advances in Neural Information Processing Systems, 2017.

J. Snoek, O. Rippel, K. Swersky, R. Kiros, N. Satish et al., Mostofa Patwary, Mr Prabhat, and Ryan Adams. Scalable Bayesian optimization using deep neural networks, International conference on machine learning, pp.2171-2180, 2015.

L. Song, R. Shokri, and P. Mittal, Privacy risks of securing machine learning models against adversarial examples, Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2019.

K. Srinathan and . Pandu-rangan, Efficient asynchronous secure multiparty distributed computation, International Conference on Cryptology in India, pp.117-129, 2000.

. Brij-mohan-lal, A. Srivastava, M. Bellet, E. Tommasi, and . Vincent, Privacy-Preserving Adversarial Representation Learning in ASR: Reality or Illusion, Annual Conference of the International Speech Communication Association (Interspeech), 2019.

J. Steinhardt, P. Wei-w-koh, and P. Liang, Certified defenses for data poisoning attacks, Advances in neural information processing systems, pp.3517-3529, 2017.

T. Steinke and J. Ullman, Tight lower bounds for differentially private selection, FOCS, pp.552-563, 2017.

U. Sebastian and . Stich, Local SGD converges fast and communicates little, International Conference on Learning Representations (ICLR), 2019.

U. Sebastian, S. Stich, and . Karimireddy, The error-feedback framework: Better rates for SGD with delayed gradients and compressed communication, 2019.

L. Su and N. H. Vaidya, Fault-Tolerant Multi-Agent Optimization: Optimal Iterative Distributed Algorithms, PODC, 2016.

P. Subramanyan, R. Sinha, I. Lebedev, S. Devadas, . Sanjit et al., A formal foundation for secure remote execution of enclaves, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.2435-2450, 2017.

Z. Sun, P. Kairouz, A. Theertha-suresh, and H. Mcmahan, Can you really backdoor federated learning, 2019.

, Your chats stay private while Messages improves suggestions, 2019.

. Ananda-theertha, F. X. Suresh, S. Yu, H. Kumar, and . Mcmahan, Distributed mean estimation with limited communication, Proceedings of the 34th International Conference on Machine Learning, vol.70, pp.3329-3337, 2017.

C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan et al., Intriguing properties of neural networks, 2013.

J. Gábor, M. L. Székely, . Rizzo, K. Nail, and . Bakirov, Measuring and testing dependence by correlation of distances. The annals of statistics, vol.35, pp.2769-2794, 2007.

H. Tang, X. Lian, M. Yan, C. Zhang, and J. Liu, D2: Decentralized training over decentralized data, ICML, 2018.

H. Tang, X. Lian, S. Qiu, L. Yuan, C. Zhang et al., DeepSqueeze: Parallel stochastic gradient descent with double-pass error-compensated compression, 2019.

O. Thakkar, G. Andrew, and H. Mcmahan, Differentially private learning with adaptive clipping, 2019.

F. Tramèr and D. Boneh, Slalom: Fast, verifiable and private execution of neural networks in trusted hardware, International Conference on Learning Representations, 2019.

F. Tramèr and D. Boneh, Adversarial training and robustness for multiple perturbations, 2019.

F. Tramèr, F. Zhang, A. Juels, M. K. Reiter, and T. Ristenpart, Stealing machine learning models via prediction APIs, 25th USENIX Security Symposium, USENIX Security 16, pp.601-618, 2016.

F. Tramèr, F. Zhang, H. Lin, J. Hubaux, A. Juels et al., Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge, 2017 IEEE European Symposium on Security and Privacy, pp.19-34, 2017.

F. Tramèr, A. Kurakin, N. Papernot, I. J. Goodfellow, D. Boneh et al., Ensemble adversarial training: Attacks and defenses, 6th International Conference on Learning Representations, 2018.

B. Tran, J. Li, and A. Madry, Spectral signatures in backdoor attacks, Advances in Neural Information Processing Systems, pp.8000-8010, 2018.

J. Ullman, Tight lower bounds for locally differentially private selection, 2018.

, The Google-Landmark v2 Authors, 2019.

J. Vaidya, H. Yu, and X. Jiang, Privacy-preserving SVM classification, Knowl. Inf. Syst, vol.14, issue.2, 2008.

J. Van-bulck, M. Minkin, O. Weisse, D. Genkin, B. Kasikci et al., Foreshadow: Extracting the keys to the intel {SGX} kingdom with transient out-of-order execution, 27th {USENIX} Security Symposium ({USENIX} Security 18), pp.991-1008, 2018.

P. Vanhaesebrouck, A. Bellet, and M. Tommasi, Decentralized collaborative learning of personalized models over networks, AISTATS, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01533182

P. Vepakomma, O. Gupta, T. Swedish, and R. Raskar, Split learning for health: Distributed deep learning without sharing raw patient data, 2018.

P. Vepakomma, C. Tonde, and A. Elgammal, Supervised dimensionality reduction via distance correlation maximization, Electronic Journal of Statistics, vol.12, issue.1, pp.960-984, 2018.

P. Vepakomma, O. Gupta, A. Dubey, and R. Raskar, Reducing leakage in distributed deep learning for sensitive health data, 2019.

T. Vogels, M. Sai-praneeth-karimireddy, and . Jaggi, PowerSGD: Practical low-rank gradient compression for distributed optimization, NeurIPS 2019 -Advances in Neural Information Processing Systems, vol.32, 2019.

S. Riad, I. Wahby, A. Tzialla, J. Shelat, M. Thaler et al., Doubly-efficient zksnarks without trusted setup, 2018 IEEE Symposium on Security and Privacy, pp.21-23, 2018.

B. Wang, Y. Yao, S. Shan, H. Li, B. Viswanath et al., Neural cleanse: Identifying and mitigating backdoor attacks in neural networks, 2019 IEEE Symposium on Security and Privacy, 2019.

J. Wang and G. Joshi, Cooperative SGD: A unified framework for the design and analysis of communication-efficient SGD algorithms, 2018.

J. Wang and G. Joshi, Adaptive Communication Strategies for Best Error-Runtime Trade-offs in Communication-Efficient Distributed SGD, Proceedings of the SysML Conference, 2019.

J. Wang, A. Sahu, G. Joshi, and S. Kar, MATCHA: Speeding Up Decentralized SGD via Matching Decomposition Sampling. preprint, 2019.

J. Wang, V. Tantia, N. Ballas, and M. Rabbat, SlowMo: Improving communicationefficient distributed SGD with slow momentum, 2019.

K. Wang, R. Mathews, C. Kiddon, H. Eichner, F. Beaufays et al., Federated evaluation of on-device personalization, 2019.

T. Wang, J. Zhu, A. Torralba, and A. A. Efros, , 2018.

Y. Wang, B. Balle, and S. Kasiviswanathan, Subsampled R\'enyi differential privacy and analytical moments accountant, 2018.

L. Stanley and . Warner, Randomized response: A survey technique for eliminating evasive answer bias, Journal of the American Statistical Association, vol.60, issue.309, pp.63-69, 1965.

. Webank, WeBank and Swiss re signed cooperation MOU, 2019.

E. Wong, R. Frank, J. Schmidt, and . Kolter, Wasserstein adversarial examples via projected sinkhorn iterations. ICML, 2019.

G. Wood, Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, vol.151, pp.1-32, 2014.

D. Woodruff and S. Yekhanin, A geometric approach to information-theoretic private information retrieval, 20th Annual IEEE Conference on Computational Complexity (CCC'05), pp.275-284, 2005.

B. Woodworth, J. Wang, H. B. Mcmahan, and N. Srebro, Graph oracle models, lower bounds, and gaps for parallel stochastic optimization, Advances in Neural Information Processing Systems (NIPS), 2018.

X. Wu, R. Guo, A. Theertha-suresh, S. Kumar, N. Daniel et al., Multiscale quantization for fast similarity search, Advances in Neural Information Processing Systems, pp.5745-5755, 2017.

C. Xie and Y. Wu, Laurens van der Maaten, Alan Yuille, and Kaiming He. Feature denoising for improving adversarial robustness, 2019.

C. Xie, Zeno++: robust asynchronous SGD with arbitrary number of Byzantine workers, 2019.

C. Xie, S. Koyejo, and I. Gupta, Practical distributed learning: Secure machine learning with communication-efficient local updates, European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), 2019.

C. Xie, S. Koyejo, and I. Gupta, Zeno: Distributed stochastic gradient descent with suspicionbased fault-tolerance, International Conference on Machine Learning, pp.6893-6901, 2019.

S. Xie, H. Zheng, C. Liu, and L. Lin, SNAS: stochastic neural architecture search, 2018.

T. Xie, J. Zhang, Y. Zhang, C. Papamanthou, and D. Song, Libra: Succinct zero-knowledge proofs with optimal prover computation, CRYPTO, vol.11694, pp.733-764, 2019.

Q. Yang, Y. Liu, T. Chen, and Y. Tong, Federated machine learning: Concept and applications. CoRR, abs/1902.04885, 2019.

T. Yang, G. Andrew, H. Eichner, H. Sun, W. Li et al., Applied federated learning: Improving Google keyboard query suggestions, 2018.

C. Andrew and . Yao, Protocols for secure computations, Symposium on Foundations of Computer Science, 1982.

A. Yao, How to generate and exchange secrets (extended abstract), FOCS, pp.162-167, 1986.

F. Ye, C. Naim, and S. E. Rouayheb, Preserving ON-OFF privacy for past and future requests, 2019 IEEE Information Theory Workshop (ITW), 2019.

M. Ye and A. Barg, Optimal schemes for discrete distribution estimation under locally differential privacy, IEEE Transactions on Information Theory, 2018.

S. Yeom, I. Giacomelli, M. Fredrikson, and S. Jha, Privacy risk in machine learning: Analyzing the connection to overfitting, IEEE 31st Computer Security Foundations Symposium (CSF), pp.268-282, 2018.

D. Yin, Y. Chen, K. Ramchandran, and P. Bartlett, Byzantine-robust distributed learning: Towards optimal statistical rates, ICML, 2019.

C. Yu, H. Tang, C. Renggli, S. Kassing, A. Singla et al., Distributed learning over unreliable networks, 2018.

H. Yu, S. Yang, and S. Zhu, Parallel restarted SGD for non-convex optimization with faster convergence and less communication, 2018.

H. Yu, R. Jin, and S. Yang, On the linear speedup analysis of communication efficient momentum SGD for distributed non-convex optimization, 2019.

M. Bila-zafar, I. Valera, M. G. Rodriguez, and K. P. Gummadi, Fairness constraints: Mechanisms for fair classification, Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, 2017.

V. Zantedeschi, A. Bellet, and M. Tommasi, Fully Decentralized Joint Learning of Personalized Models and Collaboration Graphs, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02166433

S. Zhang, A. E. Choromanska, and Y. Lecun, Deep learning with elastic averaging SGD, Advances in Neural Information Processing Systems, pp.685-693, 2015.

Y. Zhang and Q. Yang, A survey on multi-task learning, 2017.

Y. Zhang, J. Duchi, M. I. Jordan, and M. J. Wainwright, Information-theoretic lower bounds for distributed statistical estimation with communication constraints, Advances in Neural Information Processing Systems, pp.2328-2336, 2013.

Y. Zhao, C. Yu, P. Zhao, and J. Liu, Decentralized online learning: Take benefits from others' data without sharing your own to track global trend, 2019.

M. Zhu and S. Gupta, To prune, or not to prune: exploring the efficacy of pruning for model compression, 2017.

W. Zhu, P. Kairouz, H. Sun, B. Mcmahan, and W. Li, Federated heavy hitters discovery with differential privacy, 2019.

X. Zhu, Machine teaching: An inverse problem to machine learning and an approach toward optimal education, Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015. picture archiving