4.7 Article

A Privacy-Preserving Federated Learning for Multiparty Data Sharing in Social IoTs

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT

Jinbo Xiong et al.

Summary: The article proposes an artificial intelligence three-party game framework to ensure data privacy in mobile edge crowdsensing of IoT, addressing the issue of sensitive data privacy leakage through a combination of machine learning and game theory.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Artificial Intelligence

The Disruptions of 5G on Data-Driven Technologies and Applications

Dumitrel Loghin et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2020)

Article Computer Science, Information Systems

Federated Learning With Cooperating Devices: A Consensus Approach for Massive IoT Networks

Stefano Savazzi et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Automation & Control Systems

Differential Privacy-Based Blockchain for Industrial Internet-of-Things

Keke Gai et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

Federated Learning in Mobile Edge Networks: A Comprehensive Survey

Wei Yang Bryan Lim et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Artificial Intelligence

Federated Machine Learning: Concept and Applications

Qiang Yang et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2019)

Article Engineering, Electrical & Electronic

Adaptive Federated Learning in Resource Constrained Edge Computing Systems

Shiqiang Wang et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2019)

Article Computer Science, Hardware & Architecture

In-Edge AI: Intelligentizing Mobile Edge Computing, Caching and Communication by Federated Learning

Xiaofei Wang et al.

IEEE NETWORK (2019)

Article Computer Science, Theory & Methods

Privacy-Preserving Deep Learning via Additively Homomorphic Encryption

Le Trieu Phong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Proceedings Paper Computer Science, Software Engineering

Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings

Michel Abdalla et al.

ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I (2018)

Proceedings Paper Computer Science, Information Systems

Practical Secure Aggregation for Privacy-Preserving Machine Learning

Keith Bonawitz et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Scalable and Secure Logistic Regression via Homomorphic Encryption

Yoshinori Aono et al.

CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (2016)

Proceedings Paper Computer Science, Information Systems

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures

Matt Fredrikson et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)