4.4 Article

Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing

Youyang Qu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Artificial Intelligence

Federated Machine Learning: Concept and Applications

Qiang Yang et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2019)

Proceedings Paper Engineering, Electrical & Electronic

GAN-DP: Generative Adversarial Net Driven Differentially Privacy-Preserving Big Data Publishing

Youyang Qu et al.

ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) (2019)

Proceedings Paper Computer Science, Theory & Methods

Multi-Task Network Anomaly Detection using Federated Learning

Ying Zhao et al.

SOICT 2019: PROCEEDINGS OF THE TENTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (2019)

Article Computer Science, Theory & Methods

Privacy-Preserving Deep Learning via Additively Homomorphic Encryption

Le Trieu Phong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Hardware & Architecture

PRIVACY OF THINGS: EMERGING CHALLENGES AND OPPORTUNITIES IN WIRELESS INTERNET OF THINGS

Youyang Qu et al.

IEEE WIRELESS COMMUNICATIONS (2018)

Proceedings Paper Computer Science, Information Systems

Practical Secure Aggregation for Privacy-Preserving Machine Learning

Keith Bonawitz et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Article Computer Science, Information Systems

Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data

Shui Yu

IEEE ACCESS (2016)

Proceedings Paper Computer Science, Information Systems

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures

Matt Fredrikson et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)