4.8 Article

Lightweight Federated Learning for Large-Scale IoT Devices With Privacy Guarantee

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Blockchain-Enabled Secure Data Sharing Scheme in Mobile-Edge Computing: An Asynchronous Advantage Actor-Critic Learning Approach

Lei Liu et al.

Summary: Mobile-edge computing (MEC) plays a crucial role in supporting various service applications through efficient data sharing. However, the unique characteristics of MEC also introduce data privacy and security concerns, hindering its development. Blockchain technology is seen as a promising solution to ensure secure data sharing, but integrating it into MEC systems faces challenges due to dynamic network conditions. In this article, a secure data sharing scheme using an asynchronous learning approach in a blockchain-enabled MEC system is proposed, aiming to optimize system performance while balancing energy consumption and throughput.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Engineering, Electrical & Electronic

Federated Learning: Challenges, Methods, and Future Directions

Tian Li et al.

IEEE SIGNAL PROCESSING MAGAZINE (2020)

Article Computer Science, Information Systems

Federated Learning With Cooperating Devices: A Consensus Approach for Massive IoT Networks

Stefano Savazzi et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Privacy-Preserving distributed deep learning based on secret sharing

Jia Duan et al.

INFORMATION SCIENCES (2020)

Proceedings Paper Engineering, Electrical & Electronic

A Privacy-Preserving and Verifiable Federated Learning Scheme

Xianglong Zhang et al.

ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) (2020)

Article Engineering, Electrical & Electronic

Multi-Armed Bandit-Based Client Scheduling for Federated Learning

Wenchao Xia et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Review Chemistry, Analytical

Federated Learning in Smart City Sensing: Challenges and Opportunities

Ji Chu Jiang et al.

SENSORS (2020)

Article Computer Science, Theory & Methods

Federated Learning With Differential Privacy: Algorithms and Performance Analysis

Kang Wei et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

VerifyNet: Secure and Verifiable Federated Learning

Guowen Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Theory & Methods

Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets

David Froelicher et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Artificial Intelligence

Federated Machine Learning: Concept and Applications

Qiang Yang et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2019)

Article Computer Science, Theory & Methods

Privacy-Preserving Deep Learning via Additively Homomorphic Encryption

Le Trieu Phong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Hardware & Architecture

A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy

Slawomir Goryczka et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2017)

Proceedings Paper Computer Science, Information Systems

Practical Secure Aggregation for Privacy-Preserving Machine Learning

Keith Bonawitz et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Safely Measuring Tor

Rob Jansen et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Proceedings Paper Computer Science, Theory & Methods

PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks

Tariq Elahi et al.

CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2014)