
REFERENCES
Awad, A. I. and Hassanien, A. E. (2014). Impact of some
biometric modalities on forensic science. Computa-
tional intelligence in digital forensics: Forensic inves-
tigation and applications, pages 47–62.
Babu Nampalle, K., Singh, P., Vivek Narayan, U., and Ra-
man, B. (2023). Vision through the veil: Differential
privacy in federated learning for medical image clas-
sification. arXiv e-prints, pages arXiv–2306.
Bouacida, N. and Mohapatra, P. (2021). Vulnerabilities in
federated learning. IEEE Access, 9:63229–63249.
Brahmi, W., Jdey, I., and Drira, F. (2024). Exploring the
role of convolutional neural networks (cnn) in dental
radiography segmentation: A comprehensive system-
atic literature review. Engineering Applications of Ar-
tificial Intelligence, 133:108510.
Dwork, C. (2006). Differential privacy. In International col-
loquium on automata, languages, and programming,
pages 1–12. Springer.
Dwork, C., Roth, A., et al. (2014). The algorithmic founda-
tions of differential privacy. Foundations and Trends®
in Theoretical Computer Science, 9(3–4):211–407.
Feng, L., Zhao, Y., Guo, S., Qiu, X., Li, W., and Yu,
P. (2021). Blockchain-based asynchronous federated
learning for internet of things. IEEE Transactions on
Computers, 99(1):1–9.
Hameed, S. S., Hassan, W. H., Latiff, L. A., and Ghabban,
F. (2021). A systematic review of security and privacy
issues in the internet of medical things; the role of ma-
chine learning approaches. PeerJ Computer Science,
7:e414.
Issa, W., Moustafa, N., Turnbull, B., Sohrabi, N., and Tari,
Z. (2023). Blockchain-based federated learning for
securing internet of things: A comprehensive survey.
ACM Computing Surveys, 55(9):1–43.
Jdey, I. (2022). Trusted smart irrigation system based on
fuzzy iot and blockchain. In International Confer-
ence on Service-Oriented Computing, pages 154–165.
Springer.
Jordan, M. I. and Mitchell, T. M. (2015). Machine learn-
ing: Trends, perspectives, and prospects. Science,
349(6245):255–260.
Kassahun, Y., Yu, B., Tibebu, A. T., Stoyanov, D., Gi-
annarou, S., Metzen, J. H., and Vander Poorten, E.
(2016). Surgical robotics beyond enhanced dexterity
instrumentation: a survey of machine learning tech-
niques and their role in intelligent and autonomous
surgical actions. International journal of computer as-
sisted radiology and surgery, 11:553–568.
Lee, J. and Clifton, C. (2011). How much is enough? choos-
ing ε for differential privacy. In Information Secu-
rity: 14th International Conference, ISC 2011, Xi’an,
China, October 26-29, 2011. Proceedings 14, pages
325–340. Springer.
Letafati, M. and Otoum, S. (2023). Digital healthcare in the
metaverse: Insights into privacy and security. IEEE
Consumer Electronics Magazine.
Liu, J., Lou, J., Xiong, L., Liu, J., and Meng, X. (2024).
Cross-silo federated learning with record-level per-
sonalized differential privacy. In Proceedings of the
2024 on ACM SIGSAC Conference on Computer and
Communications Security, pages 303–317.
Moulahi, W., Jdey, I., Moulahi, T., Alawida, M., and
Alabdulatif, A. (2023). A blockchain-based fed-
erated learning mechanism for privacy preservation
of healthcare iot data. Computers in Biology and
Medicine, 167:107630.
Popescu, M.-C., Balas, V. E., Perescu-Popescu, L., and
Mastorakis, N. (2009). Multilayer perceptron and
neural networks. WSEAS Transactions on Circuits and
Systems, 8(7):579–588.
Prakash, S. and Avestimehr, A. S. (2020). Mitigating
byzantine attacks in federated learning. arXiv preprint
arXiv:2010.07541.
Rocher, L., Hendrickx, J. M., and De Montjoye, Y.-A.
(2019). Estimating the success of re-identifications in
incomplete datasets using generative models. Nature
communications, 10(1):1–9.
Savi
´
c, M., Kurbalija, V., Ili
´
c, M., Ivanovi
´
c, M., Jakoveti
´
c,
D., Valachis, A., Autexier, S., Rust, J., and Kosmidis,
T. (2023). The application of machine learning tech-
niques in prediction of quality of life features for can-
cer patients. Computer Science and Information Sys-
tems, 20(1):381–404.
Stripelis, D., Thompson, P. M., and Ambite, J. L.
(2022). Semi-synchronous federated learning for
energy-efficient training and accelerated convergence
in cross-silo settings. ACM Transactions on Intelligent
Systems and Technology (TIST), 13(5):1–29.
Sun, Y., Ochiai, H., and Sakuma, J. (2022). Semi-targeted
model poisoning attack on federated learning via
backward error analysis. In 2022 International Joint
Conference on Neural Networks (IJCNN), pages 1–8.
IEEE.
Vamathevan, J., Clark, D., Czodrowski, P., Dunham, I., Fer-
ran, E., Lee, G., Li, B., Madabhushi, A., Shah, P.,
Spitzer, M., et al. (2019). Applications of machine
learning in drug discovery and development. Nature
reviews Drug discovery, 18(6):463–477.
Wang, Z., Yang, Z., Azimi, I., and Rahmani, A. M.
(2024). Differential private federated transfer learn-
ing for mental health monitoring in everyday settings:
A case study on stress detection. arXiv preprint
arXiv:2402.10862.
ICAART 2025 - 17th International Conference on Agents and Artificial Intelligence
852