<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v25i1e41588</article-id>
      <article-id pub-id-type="pmid">36995759</article-id>
      <article-id pub-id-type="doi">10.2196/41588</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Federated Machine Learning, Privacy-Enhancing Technologies, and Data Protection Laws in Medical Research: Scoping Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Leung</surname>
            <given-names>Tiffany</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Tewari</surname>
            <given-names>Ambuj</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Heider</surname>
            <given-names>Dominik</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Reuter</surname>
            <given-names>Dianna</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Yan</surname>
            <given-names>Chao</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Brauneck</surname>
            <given-names>Alissa</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Hamburg University Faculty of Law</institution>
            <institution>University of Hamburg</institution>
            <addr-line>Rothenbaumchaussee 33</addr-line>
            <addr-line>Hamburg, 20148</addr-line>
            <country>Germany</country>
            <phone>49 40 42838 2328</phone>
            <email>alissa.brauneck@uni-hamburg.de</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-0345-3174</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Schmalhorst</surname>
            <given-names>Louisa</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-6397-2398</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Kazemi Majdabadi</surname>
            <given-names>Mohammad Mahdi</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-9294-162X</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Bakhtiari</surname>
            <given-names>Mohammad</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-4169-9669</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Völker</surname>
            <given-names>Uwe</given-names>
          </name>
          <degrees>Prof Dr</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-5689-3448</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author">
          <name name-style="western">
            <surname>Baumbach</surname>
            <given-names>Jan</given-names>
          </name>
          <degrees>Prof Dr</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-0282-0462</ext-link>
        </contrib>
        <contrib id="contrib7" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Baumbach</surname>
            <given-names>Linda</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff5" ref-type="aff">5</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8105-3494</ext-link>
        </contrib>
        <contrib id="contrib8" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Buchholtz</surname>
            <given-names>Gabriele</given-names>
          </name>
          <degrees>Prof Dr</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6509-718X</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Hamburg University Faculty of Law</institution>
        <institution>University of Hamburg</institution>
        <addr-line>Hamburg</addr-line>
        <country>Germany</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Institute for Computational Systems Biology</institution>
        <institution>University of Hamburg</institution>
        <addr-line>Hamburg</addr-line>
        <country>Germany</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Interfaculty Institute of Genetics and Functional Genomics</institution>
        <institution>Department of Functional Genomics</institution>
        <institution>University Medicine Greifswald</institution>
        <addr-line>Greifswald</addr-line>
        <country>Germany</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Computational BioMedicine lab</institution>
        <institution>University of Southern Denmark</institution>
        <addr-line>Odense</addr-line>
        <country>Denmark</country>
      </aff>
      <aff id="aff5">
        <label>5</label>
        <institution>Department of Health Economics and Health Services Research</institution>
        <institution>University Medical Center Hamburg-Eppendorf</institution>
        <addr-line>Hamburg</addr-line>
        <country>Germany</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Alissa Brauneck <email>alissa.brauneck@uni-hamburg.de</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2023</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>30</day>
        <month>3</month>
        <year>2023</year>
      </pub-date>
      <volume>25</volume>
      <elocation-id>e41588</elocation-id>
      <history>
        <date date-type="received">
          <day>1</day>
          <month>8</month>
          <year>2022</year>
        </date>
        <date date-type="rev-request">
          <day>15</day>
          <month>11</month>
          <year>2022</year>
        </date>
        <date date-type="rev-recd">
          <day>5</day>
          <month>12</month>
          <year>2022</year>
        </date>
        <date date-type="accepted">
          <day>29</day>
          <month>1</month>
          <year>2023</year>
        </date>
      </history>
      <copyright-statement>©Alissa Brauneck, Louisa Schmalhorst, Mohammad Mahdi Kazemi Majdabadi, Mohammad Bakhtiari, Uwe Völker, Jan Baumbach, Linda Baumbach, Gabriele Buchholtz. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 30.03.2023.</copyright-statement>
      <copyright-year>2023</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2023/1/e41588" xlink:type="simple"/>
      <related-article related-article-type="commentary" id="v25i1e46700" ext-link-type="doi" xlink:href="10.2196/46700" vol="25" page="e46700" xlink:type="simple">https://www.jmir.org/2023/1/e46700/</related-article>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>The collection, storage, and analysis of large data sets are relevant in many sectors. Especially in the medical field, the processing of patient data promises great progress in personalized health care. However, it is strictly regulated, such as by the General Data Protection Regulation (GDPR). These regulations mandate strict data security and data protection and, thus, create major challenges for collecting and using large data sets. Technologies such as federated learning (FL), especially paired with differential privacy (DP) and secure multiparty computation (SMPC), aim to solve these challenges.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This scoping review aimed to summarize the current discussion on the legal questions and concerns related to FL systems in medical research. We were particularly interested in whether and to what extent FL applications and training processes are compliant with the GDPR data protection law and whether the use of the aforementioned privacy-enhancing technologies (DP and SMPC) affects this legal compliance. We placed special emphasis on the consequences for medical research and development.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We performed a scoping review according to the PRISMA-ScR (Preferred Reporting Items for Systematic Reviews and Meta-Analyses extension for Scoping Reviews). We reviewed articles on Beck-Online, SSRN, ScienceDirect, arXiv, and Google Scholar published in German or English between 2016 and 2022. We examined 4 questions: whether local and global models are “personal data” as per the GDPR; what the “roles” as defined by the GDPR of various parties in FL are; who controls the data at various stages of the training process; and how, if at all, the use of privacy-enhancing technologies affects these findings.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>We identified and summarized the findings of 56 relevant publications on FL. Local and likely also global models constitute personal data according to the GDPR. FL strengthens data protection but is still vulnerable to a number of attacks and the possibility of data leakage. These concerns can be successfully addressed through the privacy-enhancing technologies SMPC and DP.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Combining FL with SMPC and DP is necessary to fulfill the legal data protection requirements (GDPR) in medical research dealing with personal data. Even though some technical and legal challenges remain, for example, the possibility of successful attacks on the system, combining FL with SMPC and DP creates enough security to satisfy the legal requirements of the GDPR. This combination thereby provides an attractive technical solution for health institutions willing to collaborate without exposing their data to risk. From a legal perspective, the combination provides enough built-in security measures to satisfy data protection requirements, and from a technical perspective, the combination provides secure systems with comparable performance with centralized machine learning applications.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>federated learning</kwd>
        <kwd>data protection regulation</kwd>
        <kwd>data protection by design</kwd>
        <kwd>privacy protection</kwd>
        <kwd>General Data Protection Regulation compliance</kwd>
        <kwd>GDPR compliance</kwd>
        <kwd>privacy-preserving technologies</kwd>
        <kwd>differential privacy</kwd>
        <kwd>secure multiparty computation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Large data sets hold the promise of striking new insights by revealing even the faintest patterns that may, for example, be used to predict the most successful cancer treatment based on certain genetic markers. However, revealing these faint patterns often requires the use of machine learning—which in turn requires many large and well-prepared data sets as a basis for their training process [<xref ref-type="bibr" rid="ref1">1</xref>]. Prediction models such as the one in our example are most effectively trained on patient data, that is, data that clearly relate to individual persons. This makes them “personal data” according to article 4 (1) of the General Data Protection Regulation (GDPR), which defines “personal data” as “any information relating to an identified or identifiable natural person” [<xref ref-type="bibr" rid="ref2">2</xref>]. Collecting personal data, and especially aggregating it into large, centralized data sets, is fraught with substantial legal risks and often outright unlawful [<xref ref-type="bibr" rid="ref3">3</xref>]. This is exacerbated by the legal “gray area” surrounding the lawfulness or unlawfulness of data collection in medical research. Such legal uncertainties inhibit the process of not only data mining but also, and especially, data sharing. Thus, the adoption of machine learning is inhibited [<xref ref-type="bibr" rid="ref4">4</xref>]. Federated learning (FL), in which machine learning models are trained in a way that precludes the need for the aggregation of large data sets, is currently widely discussed as a possible technical solution to this problem.</p>
        <p>We now introduce data protection regulation and privacy-enhancing technologies to show why a problem exists and provide the necessary background information.</p>
      </sec>
      <sec>
        <title>Data Protection Regulation</title>
        <p>In many countries, machine learning systems need to comply with data protection regulations if they are intended to access and analyze personal data. Throughout the European Union, the GDPR has regulated this practice since May 25, 2018. Many countries have followed suit by launching similar legislation, partly to ease regulatory compliance when doing business with Europe [<xref ref-type="bibr" rid="ref5">5</xref>-<xref ref-type="bibr" rid="ref8">8</xref>]. The GDPR was introduced to address the potential for misuse that is inherent even in apparently innocuous personal data. Thus, these regulations were formulated with a broader perspective than medical data only. For instance, if the data collected about an individual by, for example, Google are processed and combined, they will likely provide an invasive view of that individual’s private affairs—even if each data item is innocuous in isolation. As such, there is no such thing as “irrelevant” personal data, and the collection of personal data always carries a risk to privacy and other fundamental rights [<xref ref-type="bibr" rid="ref9">9</xref>]. This has always been the case for medical data, but the digitization of paper records introduces new challenges. The GDPR places a strict responsibility on the party controlling the data (according to the GDPR, the “controller”; see article 24) to ensure the protection of data “by design” and “by default” in article 25. The data processing does not have to be carried out by the controller themselves; the controller may use a processor “which processes personal data on behalf of the controller” (article 4 (8) of the GDPR). Such a “security paradigm,” in which the integrity, safety, and privacy of stored data are legally given top priority as design criteria for systems and processes, is not unheard of. For instance, medical information and other confidential matters are already dealt with only through highly secure systems. The importance of the GDPR lies in its expansion of the scope of legally protected data. “Personal data” is defined as “any information relating to an identified or identifiable natural person (‘data subject’)” by GDPR article 4 (1). These personal data fall under the requirements of the GDPR and are subject to stringent security and privacy requirements, as well as being difficult to exploit scientifically, commercially, or otherwise. Furthermore, the processing of genetic, biometric, and health data, which hold the potential for substantial medical discoveries, is placed under further restrictions (article 9 of the GDPR). The data subject has various rights in relation to personal data, such as the right to information, access, rectification, and erasure of their data. Only anonymous information is not subject to the GDPR [<xref ref-type="bibr" rid="ref2">2</xref>], but a precise definition of “anonymous data” is not contained in the GDPR. Hence, it can only be deduced that anonymous data are the opposite of personal data, that is, data that contain no information related to an identifiable data subject [<xref ref-type="bibr" rid="ref10">10</xref>]. In machine learning applications, the distinction between anonymous and personal data is very important because of its implications for the legality of data processing.</p>
        <p>In the following section, we want to explore whether privacy-enhancing technologies are generally suitable for anonymizing (ie, eliminating the personal reference of) a data set and whether they can enable data to be processed in accordance with data protection requirements.</p>
      </sec>
      <sec>
        <title>Privacy-Enhancing Technologies</title>
        <p>Privacy-enhancing technologies that are intended to allow for legally compliant processing and analysis of personal data include (1) FL, (2) differential privacy (DP), and (3) secure multiparty computation (SMPC). FL was proposed by McMahan et al [<xref ref-type="bibr" rid="ref11">11</xref>] in 2016 as a potential solution to the conflict between data privacy protection and machine learning training [<xref ref-type="bibr" rid="ref1">1</xref>].</p>
        <p>In FL, all data stay in their place of generation or storage and are never transferred to a central server, thus protecting the safety and privacy of the “local” raw training data [<xref ref-type="bibr" rid="ref12">12</xref>]. FL includes at least 2 participants (eg, hospitals that provide data for a joint model), but each participant only has access to their own data. The process of FL is shown in <xref rid="figure1" ref-type="fig">Figure 1</xref> [<xref ref-type="bibr" rid="ref13">13</xref>]. After participants decide to collaborate, they engage in an iterative training loop, which has 4 steps (<xref ref-type="boxed-text" rid="box1">Textbox 1</xref>) that are represented by the circled numbers in <xref rid="figure1" ref-type="fig">Figure 1</xref>.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Schematic representation of federated learning combined with privacy-enhancing technologies (PETs). (1) Training of local models and implementation of PETs. (2) Secure transfer of local model parameters to a coordinator. (3A) Decryption of local models. (3B) Aggregation of local models. (4) Returning the global model to the participants. Note that these steps are often performed iteratively until model convergence (adapted from Huang et al [<xref ref-type="bibr" rid="ref13">13</xref>]).</p>
          </caption>
          <graphic xlink:href="jmir_v25i1e41588_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <boxed-text id="box1" position="float">
          <title>The 4 steps in the iterative training loop.</title>
          <list list-type="order">
            <list-item>
              <p>Training the local model</p>
              <list list-type="bullet">
                <list-item>
                  <p>Each federated learning (FL) participant takes a baseline machine learning model and trains it on their own database, as in any other machine learning technique. They add privacy-enhancing technologies such as differential privacy (DP) or secure multiparty computation if necessary.</p>
                </list-item>
              </list>
            </list-item>
            <list-item>
              <p>Securely transferring the local model to the coordinator</p>
              <list list-type="bullet">
                <list-item>
                  <p>FL participants encrypt the (now trained) local model and send the encrypted local model to the coordinator (or a participant elected temporarily as a coordinator).</p>
                </list-item>
              </list>
            </list-item>
            <list-item>
              <p>Aggregation of local models into the global model</p>
              <list list-type="bullet">
                <list-item>
                  <p>The coordinator decrypts the local models of each FL participant and aggregates the parameters of each local model into a global model. DP can be implemented at this stage.</p>
                </list-item>
              </list>
            </list-item>
            <list-item>
              <p>Return of the global model to the FL participants</p>
              <list list-type="bullet">
                <list-item>
                  <p>The coordinator encrypts the global model and sends it to each participant. The global model, which contains the updates from the previous training round, becomes the “baseline” model for the new training round as the loop turns over to step 1.</p>
                </list-item>
              </list>
            </list-item>
          </list>
        </boxed-text>
        <p>Thus, in FL, participants perform model training only locally on their own data, whereas the generation of a federated global model is done by a coordinator who aggregates these local training results [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref14">14</xref>]. This process is often performed iteratively in several rounds until model convergence. For instance, FL’s application to digital health can enable insights to be gained across institutions collaboratively without the need to share personal patient data. Thus, the data never cross the firewalls of the institution where they reside [<xref ref-type="bibr" rid="ref4">4</xref>]. The fact that data are never aggregated into a single central data set improves the quality of privacy protection and data security [<xref ref-type="bibr" rid="ref1">1</xref>].</p>
        <p>From a legal perspective, the quality of data and privacy protection that can be achieved through FL is of particular interest because of the aforementioned strict responsibility to ensure the protection of data “by design” and “by default.” Its workflow makes it uniquely suited for sensitive data such as health care data [<xref ref-type="bibr" rid="ref15">15</xref>]. Nevertheless, a local model in an FL system can “leak” data about the training data set from the trained local model’s weights or parameters [<xref ref-type="bibr" rid="ref16">16</xref>]. This is because FL systems are vulnerable to a number of attacks, for example, privacy leaks during data communication [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref18">18</xref>] through predictions based on the model and background information [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref19">19</xref>] or poisonous attacks by malicious clients [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref33">33</xref>]. As such, FL is typically combined with other privacy-enhancing technologies [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. In this review, we discuss DP and SMPC as potential solutions. DP can reduce the risk of data leakage by adding noise to the training process, which makes it more difficult to make inferences about the underlying patient data [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref16">16</xref>]. “DP can be applied to the input data (local DP), the computation results (global DP) or the algorithm” [<xref ref-type="bibr" rid="ref36">36</xref>]. There is a trade-off inherent to DP as “adding randomness to the collected data preserves user (participant) privacy”—the main objective in terms of data protection on legal compliance—“at the cost of accuracy”—the main concern in terms of creating a useful machine learning application [<xref ref-type="bibr" rid="ref16">16</xref>]. In the end, “the goal is to achieve an optimal balance between privacy and result quality” [<xref ref-type="bibr" rid="ref37">37</xref>]. In addition to the intrinsic quality-privacy trade-off, DP cannot eliminate but only reduce data leakage risks [<xref ref-type="bibr" rid="ref16">16</xref>]. Another privacy-enhancing technology that can be integrated into FL systems is SMPC. If implemented correctly, SMPC allows “multiple parties [to] collaborate to compute a common function of interest without revealing their private inputs to other parties” [<xref ref-type="bibr" rid="ref16">16</xref>]. The challenge is to reveal as little information as possible to any given counterparty as the other parties may potentially collude to piece together disparate pieces of information revealed during computation [<xref ref-type="bibr" rid="ref38">38</xref>].</p>
        <p>In this scoping review, we pursued the following two objectives: (1) provide an overview of the current literature assessing the legal aspects of FL and the privacy-enhancing technologies DP and SMPC relevant for medical data and (2) illuminate and specify unsolved legal challenges and provide recommendations for action for clinicians and researchers in the medical field.</p>
        <p>For a better overview and structure, we defined the research questions (RQs) outlined in <xref ref-type="boxed-text" rid="box2">Textbox 2</xref>.</p>
        <boxed-text id="box2" position="float">
          <title>Research questions (RQs).</title>
          <p>
            <bold>RQ 1</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Are the local or global models used in federated learning (FL) “personal data” as defined in article 4 (1) of the General Data Protection Regulation (GDPR)? What could be the consequences in legal terms?</p>
            </list-item>
          </list>
          <p>
            <bold>RQ 2</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>What are the roles of FL model service providers and training participants in relation to the controller and processor roles set out in chapter 4 of the GDPR?</p>
            </list-item>
          </list>
          <p>
            <bold>RQ 3</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Who controls the (raw) training data used to train the local models in decentralized FL? Who controls the model updates aggregated into the global model?</p>
            </list-item>
            <list-item>
              <p>RQ 3.1</p>
              <list>
                <list-item>
                  <p>How are the raw training data and model updates secured?</p>
                </list-item>
              </list>
            </list-item>
            <list-item>
              <p>RQ 3.2</p>
              <list>
                <list-item>
                  <p>Which processing bases, basic principles of data protection law, and rights of data subjects must be observed during model training?</p>
                </list-item>
              </list>
            </list-item>
          </list>
          <p>
            <bold>RQ 4</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Does the use of secure multiparty computation and differential privacy change the legal assessment of FL?</p>
            </list-item>
          </list>
        </boxed-text>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <p>We performed a scoping review according to the PRISMA-ScR (Preferred Reporting Items for Systematic Reviews and Meta-Analyses extension for Scoping Reviews) [<xref ref-type="bibr" rid="ref39">39</xref>].</p>
      <sec>
        <title>Eligibility Criteria</title>
        <p>To cover a wide variety of publications, we included any publications dealing with FL and its legal aspects. Hence, we did not set any limitations on the source of literature and included published books, scientific papers, industry publications, and matters of public record. We only looked for literature published after January 1, 2016, as FL was first introduced in that year [<xref ref-type="bibr" rid="ref11">11</xref>]. Finally, for reasons of transparency and practicality, the included publications needed to be open access and written in English or German.</p>
        <p>Publications unrelated to our main topics (ie, our RQs) or to FL and legal aspects or that addressed only one of both topics were excluded.</p>
      </sec>
      <sec>
        <title>Information Sources</title>
        <p>We searched for literature in the search engines and databases Beck-Online, SSRN, ScienceDirect, arXiv, and Google Scholar, including PubMed. The searches were performed between January 13, 2022, and February 18, 2022.</p>
      </sec>
      <sec>
        <title>Search</title>
        <p>In the selected databases and search engines, we first tried various search string criteria. We looked for synonyms of “Federated Learning,” our key term, and identified “FL,” “Federated Machine Learning,” and “Federated ML.” Similarly, we considered and looked for synonyms of our second key term, “Data protection,” and found “Data privacy protection,” “GDPR-Compliance,” “privacy protection,” “Differential privacy,” and “Secure Multiparty Computation.” Hence, in our searches, we combined “Federated Learning” AND “Privacy Protection.” Synonyms were added to the main term using OR. Finally, we applied the aforementioned publication year restrictions. Thus, the final search in, for example, Google Scholar was “((federated learning) AND ((data protection) OR (privacy protection) OR (GDPR-compliance) OR (DSGVO)) AND (Years 2016-2022 [Filter])).” The search strings finally selected to obtain the most useful information terms and the respective number of publications in the first search of each search engine are listed in Tables S1-S5 in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>.</p>
      </sec>
      <sec>
        <title>Selection of Sources of Evidence</title>
        <p>The literature selection was performed independently by 2 reviewers (AB and LS), and disagreement was resolved via discussion. In the first step, AB and LS screened the titles and abstracts for inclusion; afterward, they evaluated the full texts of the preselected publications.</p>
      </sec>
      <sec>
        <title>Data Charting Process</title>
        <p>Although we screened the full texts for inclusion, we observed a large heterogeneity in the publication structure. Furthermore, we found that most publications only addressed 1 or 2 of our RQs. As a consequence, we refrained from a structured data extraction with, for example, a spreadsheet. Instead, to ensure that all relevant information was respected, 2 reviewers (AB and LS) independently extracted data from the included publications. Afterward, we clustered these data according to our RQs.</p>
      </sec>
      <sec>
        <title>Data Items</title>
        <p>For each of the included publications, we documented the author, publication year, title, and data source from which we obtained it. Finally, we also registered which of our RQs was addressed by the publication.</p>
      </sec>
      <sec>
        <title>Critical Appraisal of Individual Sources of Evidence</title>
        <p>We did not evaluate the quality of the included information sources. However, as we only searched for and included publications identified by data engines and databases for scientific purposes, a minimum of quality was guaranteed. Furthermore, it should be noted that, although medical publications are often peer-reviewed before publication, this is not standard for law-related publications. A review of these publications is conducted by the internal editorial board of the journals. Finally, we only considered open access publications to allow our curious readers to evaluate the quality of the included publications for themselves.</p>
      </sec>
      <sec>
        <title>Synthesis of Results</title>
        <p>After we extracted relevant information from the publications, we grouped it in accordance with our RQs. The extracted information was added to one or more of our RQs if relevant. Finally, we cross-checked whether all the extracted information was covered in our results. Afterward, we quantified the agreement between publications regarding our proposed RQs.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Search Strategy</title>
        <p>The flowchart in <xref rid="figure2" ref-type="fig">Figure 2</xref> provides an overview of our publication inclusion and exclusion processes. Of the identified 6498 publications, 56 (0.86%) fulfilled our criteria and were included—55 (98%) articles and 1 (2%) book. Most of the articles were published in 2020 (20/56, 36%) and 2021 (24/56, 43%).</p>
        <p>Most of the identified studies (50/56, 89%) were limited to either only the legal or technical dimension of data protection in FL. Thus, we could only include 11% (6/56) of studies [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref40">40</xref>-<xref ref-type="bibr" rid="ref42">42</xref>] that made a direct link between the 2 disciplines.</p>
        <p>An overview of the included publications, including which publications addressed which RQ, is provided in Table S1 in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref> [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref17">17</xref>-<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref40">40</xref>-<xref ref-type="bibr" rid="ref75">75</xref>].</p>
        <p>In the following sections, we present our results as they correspond to our RQs. The 2 most important papers were Rossello et al [<xref ref-type="bibr" rid="ref28">28</xref>], “Data protection by design in AI? The case of federated learning,” and Truong et al [<xref ref-type="bibr" rid="ref22">22</xref>], “Privacy preservation in federated learning: An insightful survey from the GDPR perspective,” both of which discussed all of our RQs. RQs 2 and 3 were each only addressed in a total of 5% (3/56) of the publications. Most studies (4/56, 7%) were published in the past 3 years (2020-2022), highlighting an emerging area of interdisciplinary study relevant to clinical researchers. Further research in this area can be expected—particularly as judicial decisions and new regulations begin to arrive and the ecosystem of FL tools available to medical researchers grows in scope, performance, and availability.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) flow diagram showing disposition of publications. Of a total of 6498 initial articles, 56 (0.86%) were eligible for data abstraction. The most common source of the selected articles was Google Scholar, followed by arXiv.</p>
          </caption>
          <graphic xlink:href="jmir_v25i1e41588_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>RQ 1: Are Local or Global FL Models “Personal Data” as Defined in Article 4 (1) of the GDPR? What Could Be the Consequences in Legal Terms?</title>
        <p>Personal data are information related to an identified or identifiable natural person. Patient data fulfill this requirement. Training data in FL systems stay at their place of origin or production and cannot be viewed by the central party at any time. Of the 56 included publications, 37 (66%) addressed this question and 18 (32%) agreed that FL leads to better privacy and security compared with centralized systems [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>-<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref43">43</xref>-<xref ref-type="bibr" rid="ref48">48</xref>].</p>
        <p>Two contradicting views are held regarding our first RQ: (1) local models are sufficiently anonymized to not constitute personal data and (2) local models are personal data. According to the first view, local models should not be considered personal data [<xref ref-type="bibr" rid="ref3">3</xref>] as the coordinator responsible does not have access to the training data, only to the trained models. These can be considered not personal data as several processing steps occur before transmission, “which individually are already suitable for eliminating the personal reference of the models, and even more so in the aggregate.” Thus, the models that are shared should typically qualify as anonymous [<xref ref-type="bibr" rid="ref40">40</xref>]. This allows the local models “to be processed without restrictions imposed by the GDPR” [<xref ref-type="bibr" rid="ref3">3</xref>].</p>
        <p>According to the other view, the local model as constituted by the number vector containing the parameters that result from training the model on the local data, which is shared with the coordinator, can be considered personal data unless privacy-enhancing measures are used [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref41">41</xref>]. This is due to the aforementioned “data leakage” risks [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref49">49</xref>-<xref ref-type="bibr" rid="ref55">55</xref>]. “Some features of the training data samples are inherently encoded” [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref57">57</xref>] into local models as the training participants “represent diverse users (e.g. patients) with different interests, preferences and habits” [<xref ref-type="bibr" rid="ref58">58</xref>]. Therefore, “the underlying data distributions of the users are not identically distributed and as a consequence, is characteristic of the users” so that model updates encode individual-specific information (acting as a fingerprint) [<xref ref-type="bibr" rid="ref58">58</xref>].</p>
        <p>Although the global models themselves are considered to be anonymous and, therefore, not personal data [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref41">41</xref>], the GDPR is still applicable to local models and model updates [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref45">45</xref>]. In this case, the “controller(s) responsible for the processing operations on these data will have to ensure that the processing of model updates complies with the GDPR” [<xref ref-type="bibr" rid="ref28">28</xref>]. Therefore, it is necessary that “the processing rests on one of the legal grounds listed in articles 6.1 juncto 9.2 GDPR and that the purpose of the training is compatible with the purpose for which the data were originally collected, pursuant to articles 5.1.(b) and 6.4 GDPR” [<xref ref-type="bibr" rid="ref28">28</xref>]. It is also assumed that the processing operations performed on personal data in FL are likely to fall under the definition of “processing” under article 4 (2) of the GDPR [<xref ref-type="bibr" rid="ref28">28</xref>].</p>
        <p>Overall, these contradictory opinions could lead to practicians and hospitals being “more reluctant to participate in FL without proper privacy protection” [<xref ref-type="bibr" rid="ref49">49</xref>].</p>
      </sec>
      <sec>
        <title>RQ 2: What Are the Roles of FL Model Service Providers and Training Participants in Relation to the Controller and Processor Roles Set Out in Chapter 4 of the GDPR?</title>
        <p>In the GDPR, there are 3 participant roles (<xref rid="figure3" ref-type="fig">Figure 3</xref>): data subject (article 4 (1) of the GDPR), data controller (article 4 (7) of the GDPR), and data processor (article 4 (8) of the GDPR) [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. The data subject (eg, a patient) is the identified or identifiable person; they have the right to access, erasure, and restriction of processing [<xref ref-type="bibr" rid="ref22">22</xref>]. The data controller (eg, a hospital or a clinician) determines the processing purposes in accordance with the GDPR and ensures the privacy and security of the data [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. The controller has to inform the data subject about the sharing and processing of their data [<xref ref-type="bibr" rid="ref22">22</xref>]. However, first, the data controller must ensure the existence of a legal basis, that is, a legitimation, for data processing (article 6 of the GDPR), most importantly by obtaining the data subject’s consent (article 6.1 (a) of the GDPR) [<xref ref-type="bibr" rid="ref22">22</xref>]. The data processor (eg, the quality management department of the hospital or a researcher) processes the data for the purposes laid out by the controller [<xref ref-type="bibr" rid="ref22">22</xref>]. However, in FL, there is an additional role: the FL participant.</p>
        <p>The service provider of an FL model fulfills the roles of both data controller and data processor but not those of other players (ie, third parties, as defined in article 4 (10) of the GDPR) [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref28">28</xref>] (<xref rid="figure4" ref-type="fig">Figure 4</xref>). They implement the FL system; direct the participants (eg, hospitals and clinicians) to train, share, and update their (locally trained) models; and aggregate and update the global models to all participants [<xref ref-type="bibr" rid="ref22">22</xref>]. Note that the FL service provider is likely to only have contact with the data subjects via the participant—hence, there is no direct contact. Owing to the concept of joint control and the complexity of many FL systems (eg, potentially millions of patients providing raw training data), the service provider is not necessarily the only data controller [<xref ref-type="bibr" rid="ref28">28</xref>]. Therefore, it can be challenging to identify and allocate the responsibility of each actor for compliance with the GDPR, in particular toward data subjects [<xref ref-type="bibr" rid="ref28">28</xref>]. Inaccuracies could violate the principle of transparent and fair processing laid down in article 5.1 (a) of the GDPR [<xref ref-type="bibr" rid="ref28">28</xref>].</p>
        <p>Regarding the roles of (potential) FL participants, it will be necessary to examine “whether the relation between training participants is qualified as a controller-processor or a (joint) controllership relationship (article 26 GDPR)” [<xref ref-type="bibr" rid="ref28">28</xref>] (<xref rid="figure5" ref-type="fig">Figure 5</xref>).</p>
        <p>Moreover, and regardless of the outcome, each training participant should “conduct a careful due diligence investigation” of <italic>all other parties’</italic> compliance with the GDPR “before venturing into a federated learning scheme” [<xref ref-type="bibr" rid="ref28">28</xref>]. The question of whether such a process can realistically be undertaken by all participants is beyond the scope of this study.</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Representation of the roles that are laid out in the General Data Protection Regulation (GDPR). These are combined with their respective responsibilities or liabilities as defined by the GDPR.</p>
          </caption>
          <graphic xlink:href="jmir_v25i1e41588_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure4" position="float">
          <label>Figure 4</label>
          <caption>
            <p>Representation of the relationships between the different parties and the roles they fulfill, including the “FL Service Provider.” FL: federated learning; GDPR: General Data Protection Regulation.</p>
          </caption>
          <graphic xlink:href="jmir_v25i1e41588_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure5" position="float">
          <label>Figure 5</label>
          <caption>
            <p>Representation of the relationships between the different parties and the roles they fulfill. The role of the service provider(s) is not depicted. The figure shows the 2 options of joint controllership (option 1) and a controller-processor relationship (option 2), which can be chosen by the participants. FL: federated learning; GDPR: General Data Protection Regulation.</p>
          </caption>
          <graphic xlink:href="jmir_v25i1e41588_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>RQ 3: Who Controls the (Raw) Training Data Used to Train the Local Models in Decentralized FL? Who Controls the Model Updates Aggregated Into the Global Model?</title>
        <sec>
          <title>Overview</title>
          <p>The training data are provided by contributors (referring to <xref rid="figure1" ref-type="fig">Figure 1</xref>, this would be participant 1 to participant <italic>k</italic>) who update the local models themselves and are the only party that controls their respective data [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. The FL developers [<xref ref-type="bibr" rid="ref21">21</xref>] and service providers [<xref ref-type="bibr" rid="ref22">22</xref>] are not able to access the training data. Model updates are generated by the machine learning system on the local system and transferred to the coordinator—hence, unlike the raw data, they change hands throughout the training process (<xref rid="figure6" ref-type="fig">Figure 6</xref>). This process creates a technical data protection risk, at least in the absence of encryption. It also creates substantial legal risk insofar as local models may be in fact personal data.</p>
          <fig id="figure6" position="float">
            <label>Figure 6</label>
            <caption>
              <p>Schematic representation of federated learning with hospitals as participants without differential privacy and secure multiparty computation (adapted from FeatureCloud [<xref ref-type="bibr" rid="ref59">59</xref>], with permission from the FeatureCloud consortium).</p>
            </caption>
            <graphic xlink:href="jmir_v25i1e41588_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>RQ 3.1: How Are the Raw Training Data and Model Updates Secured?</title>
          <p>Training data and model updates can be secured using privacy-enhancing technologies such as data anonymization, DP, SMPC, and homomorphic encryption [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref60">60</xref>,<xref ref-type="bibr" rid="ref61">61</xref>]. Which technology or combination is the most effective depends on the respective circumstances and type of data (eg, genetic data cannot be successfully anonymized).</p>
        </sec>
        <sec>
          <title>RQ 3.2: Which Processing Bases, Basic Principles of Data Protection Law, and Rights of Data Subjects Must Be Observed During Local Model Training?</title>
          <p>There are 6 data processing bases determined in article 6.1 of the GDPR (<xref rid="figure7" ref-type="fig">Figure 7</xref>).</p>
          <p>The controller is responsible for ensuring that one of the processing bases applies. In practice, the underlying bases of <italic>consent</italic> (article 6.1 (a) of the GDPR) and <italic>legitimate interest</italic> (article 6.1 (f) of the GDPR) are especially important [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref22">22</xref>].</p>
          <p><italic>Consent</italic> (article 6.1 (a) of the GDPR) may be considered “but will not usually be given by data subjects [patients]; after all, it is voluntary” [<xref ref-type="bibr" rid="ref3">3</xref>]. “The training of models is also not <italic>necessary</italic> for the <italic>performance</italic> of a contract (Art. 6.1 (b) GDPR), which would be the case, for example, with the processing of account data for salary payments” [<xref ref-type="bibr" rid="ref3">3</xref>]. In practice, there is a presumption that companies will frequently invoke the so-called overriding legitimate interests pursuant to article 6.1 (f) of the GDPR [<xref ref-type="bibr" rid="ref3">3</xref>]. A legitimate interest in accordance with article 6.1 (f) of the GDPR exists “if it is necessary to process the data due to legitimate interests of the controller and the data subjects’ interests, fundamental rights and freedoms regarding the protection of their personal data do not outweigh the controller’s interests” [<xref ref-type="bibr" rid="ref3">3</xref>]. Relevant aspects of this weighing are the amount of data processed, applied security mechanisms, data access, content, and purpose of the individual case [<xref ref-type="bibr" rid="ref3">3</xref>]. This means that the GDPR does provide a way to process personal data beyond the minimum processing required to fulfill a contract but only if the strictest security is maintained. Article 9.2 of the GDPR opens up the processing of sensitive data such as health, biometric, or genetic data in specified cases. Included are consent (article 9.2 (a) of the GDPR) and scientific research purposes (article 9.2 (j) of the GDPR).</p>
          <p>Data minimization requires the controller (eg, service provider) to only collect data that are adequate, limited, and relevant exclusively to the agreed-upon purposes [<xref ref-type="bibr" rid="ref22">22</xref>]. Purpose limitation requires data subjects to be informed of the purpose of the data collection and limits the use of the data to the initially expressed or compatible purposes [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. Storage limitations require data to be anonymized or deleted after having fulfilled their purpose. Medical records may mostly be deleted 5 to 10 years after the last discharge or after death. The principle of accuracy requires that the stored data be correct and updated. Largely, FL systems easily comply with most of these requirements [<xref ref-type="bibr" rid="ref22">22</xref>] except fairness and transparency [<xref ref-type="bibr" rid="ref22">22</xref>].</p>
          <p>For both data minimization and purpose limitation, privacy measures to protect the data from unauthorized access and extractions must be taken [<xref ref-type="bibr" rid="ref22">22</xref>]. However, FL systems generally comply with these principles because of their architecture [<xref ref-type="bibr" rid="ref22">22</xref>]. Similarly, FL systems meet accuracy requirements as they only process model parameters in their original and unaltered form [<xref ref-type="bibr" rid="ref22">22</xref>] unless the model performance is impaired owing to poisoning attacks [<xref ref-type="bibr" rid="ref28">28</xref>]. As “the ‘raw’ training data provided by each FL participant can ‘by design’ not be inspected by other actors than the holder of the data,” no participant can guarantee that other participants comply with the principles of accuracy [<xref ref-type="bibr" rid="ref28">28</xref>]. FL systems inherently comply with the principle of storage limitation as they only store the global models that do not contain personal data [<xref ref-type="bibr" rid="ref22">22</xref>]. As for integrity and confidentiality, as FL systems cannot guarantee the privacy of the raw data, additional techniques have to be deployed by coordinators’ servers but also by FL participants [<xref ref-type="bibr" rid="ref22">22</xref>]. As for fairness and transparency, GDPR compliance also requires fairness and transparency, which FL systems do not completely fulfill [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref44">44</xref>]. If the training data are not carefully and correctly collected, biased results can lead to discrimination and injustice [<xref ref-type="bibr" rid="ref22">22</xref>], which, in terms of medical research, could mean poorer health care for certain populations. Furthermore, practices and mechanisms designed to assure data privacy, including the inability of service providers to access the raw training data and local models (which, as mentioned, serves among other things to fulfill the principle of purpose limitation), prevent FL systems from complying with these principles [<xref ref-type="bibr" rid="ref22">22</xref>]. These issues are fundamental to FL and machine learning in general. Regarding the rights of the data subject, it is worth mentioning that the training process in FL as a whole is automated within the meaning of article 22.1 of the GDPR [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]. As a consequence of the so-called black box effect, which is generally inherent in machine learning, including FL, there is limited transparency regarding the training process and the results (eg, a global machine learning model in FL), which “are generally generated without any proper explanation” [<xref ref-type="bibr" rid="ref22">22</xref>]. This causes uncertainty about whether outcomes of a machine learning model have a negative impact on the data subject (eg, patient) “or negatively impact its circumstances, behavior or choices” [<xref ref-type="bibr" rid="ref22">22</xref>]. Compliance with the GDPR remains possible if data subjects explicitly consent to relinquishing their rights to control automated decision-making [<xref ref-type="bibr" rid="ref22">22</xref>]. Other, more remote possible solutions to these issues are the development of new machine learning techniques or the relaxation of current regulations [<xref ref-type="bibr" rid="ref22">22</xref>].</p>
          <p>In addition, the system must comply with basic principles of data protection (<xref rid="figure8" ref-type="fig">Figure 8</xref>).</p>
          <fig id="figure7" position="float">
            <label>Figure 7</label>
            <caption>
              <p>Processing bases (article 6.1 of the General Data Protection Regulation [GDPR]). At least one of the 6 requirements (processing bases A-F) according to article 6.1 of the GDPR must be met for personal data to be processed lawfully (this does not pertain to personal data that fall under a special category according to article 9.1 of the GDPR, such as health or genetic data).</p>
            </caption>
            <graphic xlink:href="jmir_v25i1e41588_fig7.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure8" position="float">
            <label>Figure 8</label>
            <caption>
              <p>Principles of data protection (article 5.1 of the General Data Protection Regulation [GDPR]). All 6 principles of data protection according to article 5.1 of the GDPR (A-F) must be followed to ensure lawful data processing.</p>
            </caption>
            <graphic xlink:href="jmir_v25i1e41588_fig8.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
      </sec>
      <sec>
        <title>RQ 4: Does the Use of SMPC or DP Change the Previous Legal Assessment?</title>
        <p>RQ 4 was addressed in 45% (25/56) of the publications. Fundamental to our last RQ is the recognition that FL does not fully guarantee the privacy of personal data on its own [<xref ref-type="bibr" rid="ref22">22</xref>]—FL offers a way to make the training of artificial intelligence (AI) models more secure in terms of data protection law and, therefore, more attractive for those involved, but other privacy-enhancing measures must be taken to protect personal data [<xref ref-type="bibr" rid="ref42">42</xref>]. If the anonymity of a model cannot be guaranteed, the GDPR applies, and controllers are required to fulfill their obligations as set out in the GDPR, starting with providing a justification for data processing that provides a legal basis according to articles 6 and 9 (see the previous sections) [<xref ref-type="bibr" rid="ref41">41</xref>]—2 views differing in their assessment of the value of privacy-enhancing technologies. According to the first view, the privacy-enhancing technologies explored previously are sufficient to overcome the weaknesses of FL on its own. According to the other view, DP and SMPC as a privacy enhancement for FL need to be substantially redesigned to provide data subjects with a meaningful degree of data protection.</p>
        <p>Article 25 of the GDPR “takes into account the realization that adequate protection of privacy in the digital age is inconceivable without ‘privacy by design’” [<xref ref-type="bibr" rid="ref62">62</xref>]. Hence, for data processing technologies and procedures, privacy must be fundamental at all levels of programming and architectural design and must be ensured from day 1 of development [<xref ref-type="bibr" rid="ref62">62</xref>]. This can be achieved by integrating privacy-enhancing technologies such as DP into the processing operations [<xref ref-type="bibr" rid="ref62">62</xref>] (<xref rid="figure9" ref-type="fig">Figure 9</xref>). In this context, some argue that the combination of FL with other privacy-enhancing technologies such as DP “limits the capacity to extract the (personal) training data from the [local model] updates sent to the coordinator” [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref50">50</xref>,<xref ref-type="bibr" rid="ref63">63</xref>,<xref ref-type="bibr" rid="ref64">64</xref>]; others even hold that the system becomes fully private when DP and SMPC are combined [<xref ref-type="bibr" rid="ref65">65</xref>].</p>
        <p>It is also said that, as the effort required to extract personal data from global models increases with every privacy-enhancing measure taken, combining privacy-enhancing technologies such as DP and SMPC allows the global model and its process of aggregation to qualify as anonymous<italic>—</italic>and, hence, not fall under the scope of the GDPR [<xref ref-type="bibr" rid="ref41">41</xref>].</p>
        <p>If one nevertheless considers a given process to fall within the scope of the GDPR, it is worth mentioning that, in the context of weighing of interests according to article 6.1 (f) of the GDPR, the processing of personal data in FL leads to “an overriding on the part of the provider [data controller], as long as the provider ensures through appropriate measures in accordance with the state of the art that access by third parties is practically excluded” [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref40">40</xref>].</p>
        <p>It is difficult to extract a consensus from the literature, particularly as the terminology is not quite settled. For instance, in 1 source, DP is touted as a means to overcome the transparency issue—something that the DP techniques we have previously described definitely cannot do and whose possibility in the first place is not even certain [<xref ref-type="bibr" rid="ref66">66</xref>].</p>
        <p>According to the other view, these problems are too fundamental. Even within the FL framework, it is not necessarily possible to “avoid algorithms recording sensitive data or even learning to discriminate” [<xref ref-type="bibr" rid="ref33">33</xref>]. It is also argued that privacy-friendly techniques such as DP, which are designed “to prevent unintentional disclosure of sensitive data” in accordance with article 25 of the GDPR, do not guarantee that the data are free of “errors” [<xref ref-type="bibr" rid="ref67">67</xref>]; therefore, the question of the compatibility of FL in combination with privacy-enhancing technologies with the basic principles of the GDPR is raised again (see the previous sections). Furthermore, it is also argued that combined privacy-enhancing technologies cannot guarantee that the system is fully private [<xref ref-type="bibr" rid="ref68">68</xref>].</p>
        <p>In addition, a malicious coordinator puts DP implementations at the coordinator level at risk “as they explicitly trust the central party with the crucial task of adding DP noise, and thus provide no protection against a malicious central party” [<xref ref-type="bibr" rid="ref69">69</xref>]. Moreover, adding noise at the global scale severely harms the utility of the model as it reduces the accuracy of the trained or central data set [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref69">69</xref>-<xref ref-type="bibr" rid="ref76">76</xref>]. This, in turn, contradicts the principle of accuracy (article 5.1 (d) of the GDPR). As such, for FL to provide meaningful privacy protection to participants and fulfill the principles of the GDPR, a considerable redesign is required [<xref ref-type="bibr" rid="ref69">69</xref>].</p>
        <fig id="figure9" position="float">
          <label>Figure 9</label>
          <caption>
            <p>Schematic representation of federated learning with hospitals as participants combined with differential privacy and secure multiparty computation (adapted from FeatureCloud [<xref ref-type="bibr" rid="ref59">59</xref>], with permission from the FeatureCloud consortium).</p>
          </caption>
          <graphic xlink:href="jmir_v25i1e41588_fig9.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>This review explored the potential and shortcomings of FL in terms of privacy and data security with a focus on medical data. The major identified problem is defining the GDPR status—personal or anonymized data—of which only the former is governed by the GDPR. We found that, in addition to the data themselves, the GDPR status of both local and global FL models is uncertain. Without DP and SMPC, local FL models should be considered personal data and, thus, need to be treated as such. Moreover, there is controversy as to whether DP and SMPC are sufficient to “anonymize” local models. Whether global models are personal data is also uncertain. Therefore, in general, it remains unclear whether FL achieves a level of privacy and security consistent with the requirements of the GDPR. Although FL systems do provide better security than centralized systems, they do not by themselves ensure a sufficient degree of anonymization and privacy to be considered GDPR compliant by design. Thus, even if global models are not to be considered personal data, the GDPR remains applicable to local models and model updates.</p>
        <p>In the following sections, we will explore the open questions we identified as requiring further regulatory action. The GDPR circumscribes the conditions under which the processing of personal data is possible. However, further refinement is needed as the <italic>concrete</italic> requirements for FL service providers as set out in the GDPR are currently very unclear [<xref ref-type="bibr" rid="ref28">28</xref>]. This lack of legal certainty for FL providers is likely to obstruct the adoption of FL technologies despite their potential for solving major legal issues. A particularly fatal example of this problem is the lack of criteria for differentiating personal and anonymous data that can be used to determine the status of data beyond doubt and without requiring recourse to legal experts [<xref ref-type="bibr" rid="ref37">37</xref>]. In the absence of such verifiability, there is no guarantee that a data set anonymized according to the state of the art is <italic>truly</italic> anonymous and, thus, whether the GDPR applies. This raises 2 interlinked questions. The first is what degree of anonymity is sufficient in each case and also in relation to the various types of data. The second is whether the anonymization used makes the data anonymous and whether this anonymity is resilient to attacks [<xref ref-type="bibr" rid="ref37">37</xref>]. Furthermore, the terms <italic>personal</italic> and <italic>anonymous</italic>, which we have used throughout this paper, should be furnished with a precise legal definition that allows for the evaluation of data without recourse to jurists [<xref ref-type="bibr" rid="ref37">37</xref>]. This is a tricky problem for policy makers to solve, not least as progress in the development of cryptographic and analytical techniques is likely to affect the suitability of various anonymization techniques going forward. Until there is a settled jurisprudence on this question, FL service providers will navigate an environment of substantial legal risk.</p>
      </sec>
      <sec>
        <title>Applicability of Privacy-Enhancing Technologies</title>
        <p>Several privacy-enhancing technologies exist, but they cannot be applied in all cases [<xref ref-type="bibr" rid="ref37">37</xref>]. Applying privacy-enhancing methods to arbitrary machine learning methods is difficult and often impossible as they are optimized for application with specific learning algorithms [<xref ref-type="bibr" rid="ref37">37</xref>]. In addition, “lack of scalability is an obstacle to applying privacy-enhancing measures in practice” [<xref ref-type="bibr" rid="ref37">37</xref>].</p>
        <p>Data protection, particularly if pursued at the high level mandated when processing personal (medical) data, always generates costs. This is due to the higher computational effort, longer training times, and reductions in the utility of the data, for example, through added noise [<xref ref-type="bibr" rid="ref37">37</xref>]. DP adds noise to the data to ensure no identifiability of local data from trained models but faces the challenge of balancing privacy levels and model utility—the more noise, the more privacy but the lower the accuracy of the model (although this is a problem with DP in general independent of the application to FL) [<xref ref-type="bibr" rid="ref47">47</xref>]. These costs at the model level of anonymity may mean that an application that is valuable in principle is not sustainable in practice [<xref ref-type="bibr" rid="ref37">37</xref>].</p>
      </sec>
      <sec>
        <title>Technically Challenging GDPR Obligations</title>
        <p>Some requirements of the GDPR seem downright impossible to fulfill for FL applications. The first is the requirement for error-free data sets, and the second is the requirement for transparency. For this reason, some refinements to the GDPR have already been mooted or are in progress of being delivered.</p>
        <p>The requirement for error-free data sets comes from the principles of lawfulness, fairness, and transparency set out in the GDPR but presents an almost impossible challenge [<xref ref-type="bibr" rid="ref77">77</xref>]. The reason for this is that the vast amounts of data used in machine learning systems cannot feasibly be verified in their entirety. In FL systems, the data are distributed among many FL participants who, by design, cannot access each other’s data, which exacerbates the problem of verifiability of data. In consequence, regulating the <italic>process</italic> of validating data sets rather than mandating the <italic>outcome</italic> of completely error-free data sets is recommended [<xref ref-type="bibr" rid="ref67">67</xref>]. In addition, measures to evaluate the quality of data sets should be established (“e.g., predictive accuracy, robustness, fairness of trained machine learning models”) [<xref ref-type="bibr" rid="ref67">67</xref>]. Owing to the difficulty of verifying other participants’ regulatory compliance in an FL collaboration, it may be necessary to implement ex ante <italic>accountability measures</italic>, “particularly, those concerning the ‘quality’ of the training data” [<xref ref-type="bibr" rid="ref28">28</xref>]. These measures should act as a basis for each training participant to be able to demonstrate “continuous compliance with the GDPR” [<xref ref-type="bibr" rid="ref28">28</xref>]. It is especially vital that each FL participant carefully documents each training data set because of the strict legal obligations to ensure the accuracy of data sets [<xref ref-type="bibr" rid="ref28">28</xref>]. In addition, “clear protocols should be established specifying which requirements the training data should meet, in light of (among others) the purpose and target population to which the federated learning model will be applied” [<xref ref-type="bibr" rid="ref28">28</xref>]. “Further interdisciplinary research should be devoted to investigating which measures are suitable and recommended for adoption into large machine learning environments, such as the ones in which federated learning is typically intended to be used” [<xref ref-type="bibr" rid="ref28">28</xref>].</p>
        <p>The second problem of GDPR obligations is the so-called black box effect, which is inherent in all machine learning systems and violates the principle of transparency. The regulator has recognized this. The proposal of the European Commission for the regulation of AI presented on April 21, 2021, raises the question of what specific measures must be taken to ensure the transparency and interpretability of (high-risk) AI systems. However, the proposed regulation unfortunately does not provide an answer to uncertainty regarding transparency [<xref ref-type="bibr" rid="ref67">67</xref>]. In the meantime, the GDPR supervisory board is considering relaxing the requirement for AI or machine learning mechanisms “by accepting a <italic>general explanation</italic> as an indication of how and what personal data is going to be processed” [<xref ref-type="bibr" rid="ref22">22</xref>]. This makes the implementation of FL more manageable as it means that, for FL systems, the right to be informed (articles 13-15 of the GDPR) can be fulfilled by providing a general explanation of the FL process in the terms and conditions. The relevant privacy information could then be agreed to by all parties: the processing purpose as “building a global ML model,” the retention period as “retention for a single training round,” and the parties with access to the data as “only the coordinating central party” [<xref ref-type="bibr" rid="ref22">22</xref>]. “The explanation of the workings of the federated learning model can be achieved by elaborating on how a defined input can lead to a particular output” [<xref ref-type="bibr" rid="ref35">35</xref>]. With a growing privacy awareness among patients, models need to be carefully designed, and the implications when using them need to be clear [<xref ref-type="bibr" rid="ref35">35</xref>].</p>
      </sec>
      <sec>
        <title>Strengths and Limitations</title>
        <p>We summarized a wide range of subtly different arguments and conclusions in a highly condensed form. In consequence, our review is (by nature) very heterogeneous and relevant to several disciplines.</p>
        <p>Nonetheless, the diversity of the relevant publications leads to several methodological challenges. However, owing to the novelty of the research topic, we decided to focus on inclusiveness rather than on specificity. Thus, although we are aware that the lack of quality assessment of the included publications is a limitation of our review, in contrast, it allows us to provide a broad overview of all existing literature. In addition, a fair quality evaluation would have been impossible because of the lack of homogeneity in the included publications. This diversity also led to difficulties in data extraction. Nonetheless, by extracting information through 2 independent researchers, we increased the chance of completeness of our findings. Finally, the aforementioned ultimately renders our results and conclusions theoretical rather than empirical.</p>
        <p>Finally, our legal assessment is considerably limited by a lack of court decisions on the subject. Legal facts are ultimately created in judicial decisions, which are absent thus far, to the best of our knowledge.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>We performed a scoping review and identified what we consider to be the most important intersections between data protection legislation and FL techniques. We found that only the combination of FL with SMPC and DP has made the technology sufficiently secure to satisfy the requirements of the GDPR, thereby enabling the use of powerful machine learning tools even for systems that process sensitive personal data such as health data. However, 2 substantial challenges remain: one technical and one legal. In the technical domain, developers must face the need for (and legal prescription of) data protection head on, whereas the negative effects on model utility of techniques such as DP need to be addressed to unlock the full potential of FL systems. In the legal domain, even though the GDPR provides for clauses in terms and conditions that permit the use of FL, the legal hurdles to onboarding of data subjects and “gray areas” nonetheless remain onerous and in urgent need of legislative clarification.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Search strings and quantity for each database searched.</p>
        <media xlink:href="jmir_v25i1e41588_app1.docx" xlink:title="DOCX File , 15 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>List of individual sources of evidence and assignment to the research questions addressed.</p>
        <media xlink:href="jmir_v25i1e41588_app2.docx" xlink:title="DOCX File , 30 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AI</term>
          <def>
            <p>artificial intelligence</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">DP</term>
          <def>
            <p>differential privacy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">FL</term>
          <def>
            <p>federated learning</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">GDPR</term>
          <def>
            <p>General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">PRISMA-ScR</term>
          <def>
            <p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses extension for Scoping Reviews</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">RQ</term>
          <def>
            <p>research question</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">SMPC</term>
          <def>
            <p>secure multiparty computation</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work was funded by the German Federal Ministry of Education and Research (grants 16DTM100A and 16DTM100C, TreuMed). Furthermore, our work received funding from the European Union Horizon 2020 research and innovation program under grant agreement 826078 (FeatureCloud). This publication reflects only the authors’ views, and the European Commission is not responsible for any use that may be made of the information it contains. JB was partially funded by Villum Young Investigator Grant 13154.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>JB, UV, and GB designed the study and supervised the overall work. JB, MMKM, and MB contributed with technological insights and clarifications regarding federated learning and privacy-enhancing technologies. UV contributed with scientific discussions on privacy requirements in clinical applications. AB and LB were responsible for study conception and design. AB performed the literature searches. AB and LS reviewed the literature. AB and LS abstracted and verified the data. AB and LS analyzed and interpreted the data. All authors had full access to all the data in the study. AB and LS drafted the original manuscript, and all coauthors reviewed the draft and provided critical feedback. All authors contributed to and approved the final manuscript.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Yi</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Li</given-names>
            </name>
            <name name-style="western">
              <surname>Ge</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>A systematic literature review on federated learning: from a model quality perspective</article-title>
          <source>arXiv</source>
          <year>2020</year>
          <month>12</month>
          <day>04</day>
          <fpage>1</fpage>
          <lpage>28</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2012.01973"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <article-title>Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance)</article-title>
          <source>Publications Office of the European Union</source>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://op.europa.eu/en/publication-detail/-/publication/3e485e15-11bd-11e6-ba9a-01aa75ed71a1">https://op.europa.eu/en/publication-detail/-/publication/3e485e15-11bd-11e6-ba9a-01aa75ed71a1</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aichroth</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Battis</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Dewes</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dibak</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Doroshenko</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Geiger</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Graner</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Holly</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Huth</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kämpgen</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Kaulartz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Mundt</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rapp</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Steinebach</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sushko</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Swarat</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Winter</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Weiß</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Anonymisierung und Pseudonymisierung von Daten für Projekte des maschinellen Lernens</article-title>
          <source>Bitkom</source>
          <year>2020</year>
          <access-date>2022-05-16</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bitkom.org/sites/default/files/2020-10/201002_lf_anonymisierung-und-pseudonymisierung-von-daten.pdf">https://www.bitkom.org/sites/default/files/2020-10/201002_lf_anonymisierung-und-pseudonymisierung-von-daten.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rieke</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Hancox</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Milletarì</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Roth</surname>
              <given-names>HR</given-names>
            </name>
            <name name-style="western">
              <surname>Albarqouni</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bakas</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Galtier</surname>
              <given-names>MN</given-names>
            </name>
            <name name-style="western">
              <surname>Landman</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Maier-Hein</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Ourselin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sheller</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Summers</surname>
              <given-names>RM</given-names>
            </name>
            <name name-style="western">
              <surname>Trask</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Baust</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cardoso</surname>
              <given-names>MJ</given-names>
            </name>
          </person-group>
          <article-title>The future of digital health with federated learning</article-title>
          <source>NPJ Digit Med</source>
          <year>2020</year>
          <month>09</month>
          <day>14</day>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>21</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/s41746-020-00323-1"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41746-020-00323-1</pub-id>
          <pub-id pub-id-type="medline">33015372</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41746-020-00323-1</pub-id>
          <pub-id pub-id-type="pmcid">PMC7490367</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
          <article-title>Cybersecurity law of the People's Republic of China</article-title>
          <source>Standing Committee of the National People's Congress</source>
          <year>2016</year>
          <month>7</month>
          <day>11</day>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.lawinfochina.com/Display.aspx?LookType=3&#38;Lib=law&#38;Id=22826&#38;SearchKeyword=&#38;SearchCKeyword=&#38;paycode=">http://www.lawinfochina.com/Display.aspx?LookType=3&#38;Lib=law&#38;Id=22826&#38;SearchKeyword=&#38;SearchCKeyword=&#38;paycode=</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
          <article-title>Health Insurance Portability and Accountability Act of 1996 (HIPAA)</article-title>
          <source>Centers for Disease Control and Prevention</source>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cdc.gov/phlp/publications/topic/hipaa.html">https://www.cdc.gov/phlp/publications/topic/hipaa.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
          <article-title>Codes display text</article-title>
          <source>California Legislative Information</source>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://leginfo.legislature.ca.gov/faces/codes_displayText.xhtml?division=3.&#38;part=4.&#38;lawCode=CIV&#38;title=1.81.5">https://leginfo.legislature.ca.gov/faces/codes_displayText.xhtml?division=3.&#38;part=4.&#38;lawCode=CIV&#38;title=1.81.5</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <article-title>Personal Data Protection Act</article-title>
          <source>The Ministry of Justice</source>
          <access-date>2012-12-15</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://law.moj.gov.tw/ENG/LawClass/LawAll.aspx?pcode=I0050021">https://law.moj.gov.tw/ENG/LawClass/LawAll.aspx?pcode=I0050021</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
          <article-title>Abstract of the Federal Constitutional Court’s Order of 13 June 2007, 1 BvR 1550/03, 1 BvR 2357/04, 1 BvR 603/05 [CODICES]</article-title>
          <source>The Federal Constitutional Court</source>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bundesverfassungsgericht.de/SharedDocs/Entscheidungen/EN/2007/06/rs20070613_1bvr155003en.html">https://www.bundesverfassungsgericht.de/SharedDocs/Entscheidungen/EN/2007/06/rs20070613_1bvr155003en.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <article-title>beck-online hoempage</article-title>
          <source>beck-online</source>
          <access-date>2022-03-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://beck-online.beck.de/Dokument?vpath=bibdata%2Fzeits%2Fzd%2F2021%2Fcont%2Fzd.2021.482.1.htm&#38;pos=4">https://beck-online.beck.de/Dokument?vpath=bibdata%2Fzeits%2Fzd%2F2021%2Fcont%2Fzd.2021.482.1.htm&#38;pos=4</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McMahan</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Moore</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Ramage</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Hampson</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Argüera</surname>
              <given-names>YA</given-names>
            </name>
          </person-group>
          <article-title>Communication-efficient learning of deep networks from decentralized data</article-title>
          <source>Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS) 2017</source>
          <year>2017</year>
          <conf-name>20th International Conference on Artificial Intelligence and Statistics (AISTATS) 2017</conf-name>
          <conf-date>May 9- 11, 2017</conf-date>
          <conf-loc>Fort Lauderdale, Florida, USA</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kairouz</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>McMahan</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Avent</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Bellet</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bennis</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Nitin Bhagoji</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bonawitz</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Charles</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Cormode</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Cummings</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>D’Oliveira</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Eichner</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>El Rouayheb</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Gardner</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Garrett</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Gascón</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ghazi</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Gibbons</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Gruteser</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Harchaoui</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>He</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>He</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Huo</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Hutchinson</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Hsu</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Jaggi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Javidi</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Joshi</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Khodak</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Konecný</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Korolova</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Koushanfar</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Koyejo</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lepoint</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Mittal</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Mohri</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Nock</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Özgür</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Pagh</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Qi</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ramage</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Raskar</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Raykova</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Song</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Song</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Stich</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Suresh</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Tramèr</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Vepakomma</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Xiong</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Advances and open problems in federated learning</article-title>
          <source>FNT Mach Learn</source>
          <year>2021</year>
          <volume>14</volume>
          <issue>1–2</issue>
          <fpage>1</fpage>
          <lpage>210</lpage>
          <pub-id pub-id-type="doi">10.1561/2200000083</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Ding</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>ZL</given-names>
            </name>
            <name name-style="western">
              <surname>Qi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Liao</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>DP-FL: a novel differentially private federated learning framework for the unbalanced data</article-title>
          <source>World Wide Web</source>
          <year>2020</year>
          <month>04</month>
          <day>30</day>
          <volume>23</volume>
          <issue>4</issue>
          <fpage>2529</fpage>
          <lpage>45</lpage>
          <pub-id pub-id-type="doi">10.1007/s11280-020-00780-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lo</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Paik</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>A systematic literature review on federated machine learning: from a software engineering perspective</article-title>
          <source>ArXiv</source>
          <year>2021</year>
          <fpage>1</fpage>
          <lpage>38</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2007.11354"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3450288</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Long</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Shen</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Tan</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Gerrard</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Clarke</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Federated learning for privacy-preserving open innovation future on digital health</article-title>
          <source>Humanity Driven AI</source>
          <year>2022</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mugunthan</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Polychroniadou</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Balch</surname>
              <given-names>TH</given-names>
            </name>
            <name name-style="western">
              <surname>Byrd</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>SMPAI: secure multi-party computation for federated learning</article-title>
          <source>Proceedings of the 33rd Conference on Neural Information Processing Systems (NeurIPS 2019)</source>
          <year>2019</year>
          <conf-name>33rd Conference on Neural Information Processing Systems (NeurIPS 2019)</conf-name>
          <conf-date>Dec 8-14, 2019</conf-date>
          <conf-loc>Vancouver, Canada</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jpmorgan.com/content/dam/jpm/cib/complex/content/technology/ai-research-publications/pdf-9.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ni</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Wei</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Shu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Federated learning model with adaptive differential privacy protection in medical IoT</article-title>
          <source>Wireless Commun Mobile Comput</source>
          <year>2021</year>
          <month>11</month>
          <day>22</day>
          <volume>2021</volume>
          <fpage>1</fpage>
          <lpage>14</lpage>
          <pub-id pub-id-type="doi">10.1155/2021/8967819</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lyu</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>Threats to federated learning: a survey</article-title>
          <source>ArXiv</source>
          <year>2020</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2003.02133"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/978-3-030-63076-8_1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ulhaq</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Burmeister</surname>
              <given-names>O</given-names>
            </name>
          </person-group>
          <article-title>COVID-19 imaging data privacy by federated learning design: a theoretical framework</article-title>
          <source>ArXiv</source>
          <year>2020</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2010.06177"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Choudhury</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Gkoulalas-Divanis</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Salonidis</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Sylla</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Hsu</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Das</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Anonymizing data for privacy-preserving federated learning</article-title>
          <source>ArXiv</source>
          <year>2020</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2002.09096"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>GH</given-names>
            </name>
            <name name-style="western">
              <surname>Shin</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Federated learning on clinical benchmark data: performance assessment</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>10</month>
          <day>26</day>
          <volume>22</volume>
          <issue>10</issue>
          <fpage>e20891</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/10/e20891/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/20891</pub-id>
          <pub-id pub-id-type="medline">33104011</pub-id>
          <pub-id pub-id-type="pii">v22i10e20891</pub-id>
          <pub-id pub-id-type="pmcid">PMC7652692</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Truong</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Guitton</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Privacy preservation in federated learning: an insightful survey from the GDPR perspective</article-title>
          <source>Comput Security</source>
          <year>2021</year>
          <month>11</month>
          <volume>110</volume>
          <fpage>102402</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://paperpile.com/b/d7Y0VP/zX0vf"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.cose.2021.102402</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kurupathi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Maass</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Survey on federated learning towards privacy preserving AI</article-title>
          <source>Comput Sci Inform Technol</source>
          <year>2020</year>
          <month>9</month>
          <day>26</day>
          <volume>10</volume>
          <issue>11</issue>
          <fpage>235</fpage>
          <pub-id pub-id-type="doi">10.5121/csit.2020.101120</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Mao</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Zeng</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Utility optimization of federated learning with differential privacy</article-title>
          <source>Discrete Dynamic Nature Soc</source>
          <year>2021</year>
          <month>10</month>
          <day>8</day>
          <volume>2021</volume>
          <fpage>1</fpage>
          <lpage>14</lpage>
          <pub-id pub-id-type="doi">10.1155/2021/3344862</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Geiping</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Bauermeister</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Dröge</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Moeller</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Inverting gradients -- how easy is it to break privacy in federated learning?</article-title>
          <source>ArXiv</source>
          <year>2020</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/2003.14053"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Asad</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Moustafa</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>A critical evaluation of privacy and security threats in federated learning</article-title>
          <source>Sensors (Basel)</source>
          <year>2020</year>
          <month>12</month>
          <day>15</day>
          <volume>20</volume>
          <issue>24</issue>
          <fpage>7182</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=s20247182"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/s20247182</pub-id>
          <pub-id pub-id-type="medline">33333854</pub-id>
          <pub-id pub-id-type="pii">s20247182</pub-id>
          <pub-id pub-id-type="pmcid">PMC7765278</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lyu</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ma</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Privacy and robustness in federated learning: attacks and defenses</article-title>
          <source>IEEE Trans Neural Netw Learn Syst</source>
          <year>2022</year>
          <month>11</month>
          <day>10</day>
          <comment>(forthcoming)<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2012.06337"/></comment>
          <pub-id pub-id-type="doi">10.1109/TNNLS.2022.3216981</pub-id>
          <pub-id pub-id-type="medline">36355741</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rossello</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Díaz</surname>
              <given-names>MR</given-names>
            </name>
            <name name-style="western">
              <surname>Muñoz-González</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Data protection by design in AI? The case of federated learning</article-title>
          <source>SSRN</source>
          <year>2021</year>
          <month>7</month>
          <day>8</day>
          <access-date>2022-03-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3879613">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3879613</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gutierrez</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <source>Open Data Science</source>
          <year>2020</year>
          <month>5</month>
          <day>25</day>
          <access-date>2022-03-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://opendatascience.com/how-you-can-use-federated-learning-for-security-privacy/">https://opendatascience.com/how-you-can-use-federated-learning-for-security-privacy/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Xia</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Weng</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Federated learning: a distributed shared machine learning method</article-title>
          <source>Complexity</source>
          <year>2021</year>
          <month>8</month>
          <day>30</day>
          <volume>2021</volume>
          <fpage>1</fpage>
          <lpage>20</lpage>
          <pub-id pub-id-type="doi">10.1155/2021/8261663</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Blanco-Justicia</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Domingo-Ferrer</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Martínez</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sánchez</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Flanagan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Tan</surname>
              <given-names>KE</given-names>
            </name>
          </person-group>
          <article-title>Achieving security and privacy in federated learning systems: survey, research challenges and future directions</article-title>
          <source>Eng Appl Artif Intell</source>
          <year>2021</year>
          <month>11</month>
          <volume>106</volume>
          <fpage>104468</fpage>
          <pub-id pub-id-type="doi">10.1016/j.engappai.2021.104468</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Campos</surname>
              <given-names>EM</given-names>
            </name>
            <name name-style="western">
              <surname>Saura</surname>
              <given-names>PF</given-names>
            </name>
            <name name-style="western">
              <surname>González-Vidal</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hernández-Ramos</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Bernabé</surname>
              <given-names>JB</given-names>
            </name>
            <name name-style="western">
              <surname>Baldini</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Skarmeta</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Evaluating Federated Learning for intrusion detection in Internet of Things: review and challenges</article-title>
          <source>Comput Network</source>
          <year>2022</year>
          <month>02</month>
          <volume>203</volume>
          <fpage>108661</fpage>
          <pub-id pub-id-type="doi">10.1016/j.comnet.2021.108661</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="web">
          <article-title>Protokolle</article-title>
          <source>Deutscher Bundestag</source>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bundestag.de/protokolle">https://www.bundestag.de/protokolle</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brundage</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Avin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Belfield</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Krueger</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hadfield</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Khlaaf</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Toner</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Fong</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Maharaj</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Koh</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Hooker</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Leung</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Trask</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bluemke</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Lebensold</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>O?Keefe</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Koren</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ryffel</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Rubinovitz</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Besiroglu</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Carugati</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Clark</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Eckersley</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>de</surname>
              <given-names>HS</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Laurie</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Ingerman</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Krawczuk</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Askell</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Cammarota</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Lohn</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Krueger</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Stix</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Henderson</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Graham</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Prunkl</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Seger</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zilberman</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>hÉigeartaigh</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kroeger</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Sastry</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Kagan</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Weller</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Tse</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Barnes</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Dafoe</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Scharre</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Herbert-Voss</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rasser</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sodhani</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Flynn</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Gilbert</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Dyer</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bengio</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Anderljung</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Toward trustworthy AI development: mechanisms for supporting verifiable claims</article-title>
          <source>arXiv</source>
          <year>2020</year>
          <fpage>1</fpage>
          <lpage>80</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2004.07213"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Zeni</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kröller</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Moons</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Casale</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Beyond privacy regulations: an ethical approach to data usage in transportation</article-title>
          <source>ArXiv</source>
          <year>2020</year>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2004.00491"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaissis</surname>
              <given-names>GA</given-names>
            </name>
            <name name-style="western">
              <surname>Makowski</surname>
              <given-names>MR</given-names>
            </name>
            <name name-style="western">
              <surname>Rückert</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Braren</surname>
              <given-names>RF</given-names>
            </name>
          </person-group>
          <article-title>Secure, privacy-preserving and federated machine learning in medical imaging</article-title>
          <source>Nat Mach Intell</source>
          <year>2020</year>
          <month>06</month>
          <day>08</day>
          <volume>2</volume>
          <issue>6</issue>
          <fpage>305</fpage>
          <lpage>11</lpage>
          <pub-id pub-id-type="doi">10.1038/s42256-020-0186-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Winter</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Battis</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Halvani</surname>
              <given-names>O</given-names>
            </name>
          </person-group>
          <article-title>Herausforderungen für die Anonymisierung von Daten</article-title>
          <source>INFORMATIK 2019: 50 Jahre Gesellschaft für Informatik – Informatik für Gesellschaft</source>
          <year>2019</year>
          <publisher-loc>Bonn</publisher-loc>
          <publisher-name>Gesellschaft für Informatik e.V</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kairouz</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Oh</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Viswanath</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Secure multi-party differential privacy</article-title>
          <source>Proceedings of the Advances in Neural Information Processing Systems 28 (NIPS 2015)</source>
          <year>2015</year>
          <conf-name>Advances in Neural Information Processing Systems 28 (NIPS 2015)</conf-name>
          <conf-date>Dec 7-12, 2015</conf-date>
          <conf-loc>Montreal, Canada</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://proceedings.neurips.cc/paper/2015/hash/a01610228fe998f515a72dd730294d87-Abstract.html"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tricco</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Lillie</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zarin</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>O'Brien</surname>
              <given-names>KK</given-names>
            </name>
            <name name-style="western">
              <surname>Colquhoun</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Levac</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>MD</given-names>
            </name>
            <name name-style="western">
              <surname>Horsley</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Weeks</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hempel</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Akl</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>McGowan</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Stewart</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hartling</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Aldcroft</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>MG</given-names>
            </name>
            <name name-style="western">
              <surname>Garritty</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lewin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Godfrey</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Macdonald</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Langlois</surname>
              <given-names>EV</given-names>
            </name>
            <name name-style="western">
              <surname>Soares-Weiser</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Moriarty</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Clifford</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Tunçalp</surname>
              <given-names>Ö</given-names>
            </name>
            <name name-style="western">
              <surname>Straus</surname>
              <given-names>SE</given-names>
            </name>
          </person-group>
          <article-title>PRISMA extension for scoping reviews (PRISMA-ScR): checklist and explanation</article-title>
          <source>Ann Intern Med</source>
          <year>2018</year>
          <month>10</month>
          <day>02</day>
          <volume>169</volume>
          <issue>7</issue>
          <fpage>467</fpage>
          <lpage>73</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.acpjournals.org/doi/abs/10.7326/M18-0850?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.7326/M18-0850</pub-id>
          <pub-id pub-id-type="medline">30178033</pub-id>
          <pub-id pub-id-type="pii">2700389</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaulartz</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Datenschutz-compliance bei KI am Beispiel Federated Learning</article-title>
          <source>CMS Blog</source>
          <year>2019</year>
          <month>10</month>
          <day>18</day>
          <access-date>2022-03-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cmshs-bloggt.de/tmc/machine-learning-datenschutz-compliance-bei-ki-am-beispiel-federated-learning/">https://www.cmshs-bloggt.de/tmc/machine-learning-datenschutz-compliance-bei-ki-am-beispiel-federated-learning/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="book">
          <source>Legal Handbook Artificial Intelligence and Machine Learning</source>
          <year>2020</year>
          <publisher-loc>Verlag</publisher-loc>
          <publisher-name>Beck e-Library</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Puschky</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Federated Learning - eine datenschutzfreundliche Methode zum Training von KI-Modellen?</article-title>
          <source>beck-online</source>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/2yp4e6yp">https://tinyurl.com/2yp4e6yp</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bonura</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Carbonare</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Díaz-Morales</surname>
              <given-names>R</given-names>
            </name>
            <collab>Navia-Vázquez</collab>
            <name name-style="western">
              <surname>Purcell</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rossello</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Increasing trust within a data space with federated learning, in data spaces: design, deployments, and future directions internet</article-title>
          <source>Musketeer</source>
          <year>2022</year>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://musketeer.eu/wp-content/uploads/2022/01/BDVA_Book_Chapter_ITDSFL.pdf">https://musketeer.eu/wp-content/uploads/2022/01/BDVA_Book_Chapter_ITDSFL.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="web">
          <article-title>Accountable federated learning: a classifying citizen participation ideas use case</article-title>
          <source>IBM Research</source>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://aifs360.mybluemix.net/examples/federated_learning">https://aifs360.mybluemix.net/examples/federated_learning</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Do</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Thomas</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Design and analysis of a GDPR-compliant federated machine learning system</article-title>
          <source>Brown University</source>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://cs.brown.edu/courses/csci2390/2020/assign/project/report/2020/gdpr-ml.pdf">http://cs.brown.edu/courses/csci2390/2020/assign/project/report/2020/gdpr-ml.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chamikara</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Camtepe</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Nepal</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Grobler</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bertok</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Khalil</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Local differential privacy for federated learning</article-title>
          <source>arXiv</source>
          <year>2022</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2202.06053"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hartmann</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Federated learning</article-title>
          <source>Freie Universität Berlin</source>
          <year>2018</year>
          <month>8</month>
          <day>20</day>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.mi.fu-berlin.de/inf/groups/ag-ti/theses/download/Hartmann_F18.pdf">http://www.mi.fu-berlin.de/inf/groups/ag-ti/theses/download/Hartmann_F18.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Feng</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Fang</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Shao</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Tang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Xia</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>An accuracy-lossless perturbation method for defending privacy attacks in federated learning</article-title>
          <source>arXiv</source>
          <year>2020</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2002.09843"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3485447.3512233</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Cao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yoshikawa</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Yan</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>FL-Market: trading private models in federated learning</article-title>
          <source>arXiv</source>
          <year>2021</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2106.04384"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/bigdata55660.2022.10020232</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lepri</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Oliver</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Pentland</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Ethical machines: the human-centric use of artificial intelligence</article-title>
          <source>iScience</source>
          <year>2021</year>
          <month>03</month>
          <day>19</day>
          <volume>24</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>17</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2589-0042(21)00217-0"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.isci.2021.102249</pub-id>
          <pub-id pub-id-type="medline">33763636</pub-id>
          <pub-id pub-id-type="pii">S2589-0042(21)00217-0</pub-id>
          <pub-id pub-id-type="pmcid">PMC7973859</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thomas Homescu</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Personalized treatment through biosensors and machine learning ML</article-title>
          <source>SSRN J</source>
          <year>2020</year>
          <month>03</month>
          <day>25</day>
          <fpage>1</fpage>
          <lpage>66</lpage>
          <pub-id pub-id-type="doi">10.2139/ssrn.3610445</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lowy</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Razaviyayn</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Private federated learning without a trusted server: optimal algorithms for convex losses</article-title>
          <source>arXiv</source>
          <year>2021</year>
          <month>10</month>
          <day>29</day>
          <fpage>1</fpage>
          <lpage>43</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2106.09779"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ma</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ding</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Shi</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Han</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Poor</surname>
              <given-names>HV</given-names>
            </name>
          </person-group>
          <article-title>When federated learning meets blockchain: a new distributed learning paradigm</article-title>
          <source>arXiv</source>
          <year>2021</year>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2009.09338"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/mci.2022.3180932</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>More</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Ramachandran</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Panda</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Mondal</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Virk</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>SCOTCH: an efficient secure computation framework for secure aggregation</article-title>
          <source>arXiv</source>
          <year>2022</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2201.07730"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ribero</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Henderson</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Williamson</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Vikalo</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Federating recommendations using differentially private prototypes</article-title>
          <source>arXiv</source>
          <year>2020</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2003.00602"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.patcog.2022.108746</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Lyu</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Niyato</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Lam</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Local differential privacy-based federated learning for internet of things</article-title>
          <source>IEEE Internet Thing J</source>
          <year>2021</year>
          <month>6</month>
          <day>1</day>
          <volume>8</volume>
          <issue>11</issue>
          <fpage>8836</fpage>
          <lpage>53</lpage>
          <pub-id pub-id-type="doi">10.1109/jiot.2020.3037194</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kanagavelu</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Samsudin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Goh</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Cheah</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wiwatphonthana</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Akkarajitsakul</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Wangz</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Two-phase multi-party computation enabled privacy-preserving federated learning</article-title>
          <source>arXiv</source>
          <year>2020</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2005.11901"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Orekondy</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Oh</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Schiele</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Fritz</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Gradient-Leaks: understanding and controlling deanonymization in federated learning</article-title>
          <source>arXiv</source>
          <year>2020</year>
          <month>09</month>
          <day>13</day>
          <fpage>1</fpage>
          <lpage>18</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/1805.05838"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="web">
          <article-title>Revolutionising Cloud Communication</article-title>
          <source>FeatureCloud</source>
          <year>2023</year>
          <access-date>2023-03-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://featurecloud.eu/">https://featurecloud.eu/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Filip</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>An overview of hybrid approaches in Horizontal Federated Learning</article-title>
          <source>TU Delft Electrical Engineering</source>
          <year>2021</year>
          <access-date>2022-03-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://repository.tudelft.nl/islandora/object/uuid:011e37fd-ffe8-46bd-8db1-5788d22b2ad7">https://repository.tudelft.nl/islandora/object/uuid:011e37fd-ffe8-46bd-8db1-5788d22b2ad7</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Culea</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>A survey of two open problems of privacy-preserving federated learning: vertically partitioned data and verifiability</article-title>
          <source>Delft University of Technology</source>
          <year>2021</year>
          <month>06</month>
          <day>27</day>
          <access-date>2022-03-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://repository.tudelft.nl/islandora/object/uuid%3Ab8d7817d-3cb9-4e22-9b1e-9db7f599aed8">https://repository.tudelft.nl/islandora/object/uuid%3Ab8d7817d-3cb9-4e22-9b1e-9db7f599aed8</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="web">
          <article-title>Art. 25 GDPR Data protection by design and by default</article-title>
          <source>General Data Protection Regulation (GDPR)</source>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dsgvo-gesetz.de/art-25-dsgvo/">https://dsgvo-gesetz.de/art-25-dsgvo/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bonawitz</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Kairouz</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>McMahan</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Ramage</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Federated Learning and Privacy: building privacy-preserving systems for machine learning and data science on decentralized data</article-title>
          <source>Queue</source>
          <year>2021</year>
          <month>11</month>
          <day>16</day>
          <volume>19</volume>
          <issue>5</issue>
          <fpage>87</fpage>
          <lpage>114</lpage>
          <pub-id pub-id-type="doi">10.1145/3494834.3500240</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A study on federated learning systems in healthcare</article-title>
          <source>Youngstown State University</source>
          <year>2021</year>
          <month>08</month>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digital.maag.ysu.edu:8443/xmlui/bitstream/handle/1989/16722/b22817554.pdf?sequence=1">https://digital.maag.ysu.edu:8443/xmlui/bitstream/handle/1989/16722/b22817554.pdf?sequence=1</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Byrd</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Responsible machine learning: supporting privacy preservation and normative alignment with multi-agent simulation</article-title>
          <source>Georgia Institute of Technology</source>
          <year>2021</year>
          <month>8</month>
          <access-date>2022-03-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://smartech.gatech.edu/handle/1853/65096">https://smartech.gatech.edu/handle/1853/65096</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="web">
          <article-title>beck online homepage</article-title>
          <source>beck online</source>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://tinyurl.com/mwjz3wna">https://tinyurl.com/mwjz3wna</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ebers</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hoch</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Rosenkranz</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Ruschemeier</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Steinrötter</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Der Entwurf für eine EU-KI-Verordnung: richtige richtung mit optimierungsbedarf</article-title>
          <source>Recht Digital</source>
          <year>2021</year>
          <fpage>528</fpage>
          <lpage>37</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pentyala</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Railsback</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Maia</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Dowsley</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Melanson</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Nascimento</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>De Cock</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Training differentially private models with secure multiparty computation</article-title>
          <source>arXiv</source>
          <year>2022</year>
          <fpage>1</fpage>
          <lpage>11</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2202.02625"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Boenisch</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Dziedzic</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Schuster</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Shamsabadi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Shumailov</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Papernot</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>When the curious abandon honesty: federated learning is not private</article-title>
          <source>arXiv</source>
          <year>2021</year>
          <month>12</month>
          <day>6</day>
          <fpage>1</fpage>
          <lpage>19</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2112.02918"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Goldblum</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Tsipras</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Xie</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Schwarzschild</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Song</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Madry</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Goldstein</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Dataset security for machine learning: data poisoning, backdoor attacks, and defenses</article-title>
          <source>arXiv</source>
          <year>2021</year>
          <fpage>1</fpage>
          <lpage>39</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2012.10544"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/tpami.2022.3162397</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hatamizadeh</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Yin</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Molchanov</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Myronenko</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Dogra</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Feng</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Flores</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kautz</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Roth</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Towards understanding the risks of gradient inversion in federated learning</article-title>
          <source>Research Square</source>
          <year>2021</year>
          <month>12</month>
          <day>17</day>
          <fpage>1</fpage>
          <lpage>24</lpage>
          <pub-id pub-id-type="doi">10.21203/rs.3.rs-1147182/v2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Gong</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Federated learning with sparsified model perturbation: improving accuracy under client-level differential privacy</article-title>
          <source>arXiv</source>
          <year>2022</year>
          <fpage>1</fpage>
          <lpage>21</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2202.07178"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Naseri</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hayes</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>De Cristofaro</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Local and central differential privacy for robustness and privacy in federated learning</article-title>
          <source>arXiv</source>
          <year>2022</year>
          <fpage>1</fpage>
          <lpage>20</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2009.03561"/>
          </comment>
          <pub-id pub-id-type="doi">10.14722/ndss.2022.23054</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Truex</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Baracaldo</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Anwar</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Steinke</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Ludwig</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>A hybrid approach to privacy-preserving federated learning</article-title>
          <source>Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security</source>
          <year>2019</year>
          <conf-name>CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security</conf-name>
          <conf-date>Nov 15, 2019</conf-date>
          <conf-loc>London United Kingdom</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3338501.3357370</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Tong</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Federated machine learning: concept and applications</article-title>
          <source>ACM Transact Intelligent Syst Technol</source>
          <year>2019</year>
          <volume>10</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>19</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.acm.org/doi/abs/10.1145/3298981"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3298981</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reddy</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Miriyala</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Security and privacy preserving deep learning</article-title>
          <source>arXiv</source>
          <year>2020</year>
          <fpage>1</fpage>
          <lpage>11</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/2006.12698"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bomhard</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Merkle</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Die Europäische KI-Verordnung Der aktuelle Kommissionsentwurf und praktische Auswirkungen</article-title>
          <source>Noerr</source>
          <year>2021</year>
          <month>5</month>
          <access-date>2022-02-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://docplayer.net/215819968-Die-europaische-ki-verordnung.html">https://docplayer.net/215819968-Die-europaische-ki-verordnung.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
