Related references
Note: Only part of the references are listed.Blockchain-Enabled Secure Data Sharing Scheme in Mobile-Edge Computing: An Asynchronous Advantage Actor-Critic Learning Approach
Lei Liu et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Federated Learning: Challenges, Methods, and Future Directions
Tian Li et al.
IEEE SIGNAL PROCESSING MAGAZINE (2020)
Federated Learning With Cooperating Devices: A Consensus Approach for Massive IoT Networks
Stefano Savazzi et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Privacy-Preserving distributed deep learning based on secret sharing
Jia Duan et al.
INFORMATION SCIENCES (2020)
Cooperative Computation Offloading and Resource Allocation for Blockchain-Enabled Mobile-Edge Computing: A Deep Reinforcement Learning Approach
Jie Feng et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
A Privacy-Preserving and Verifiable Federated Learning Scheme
Xianglong Zhang et al.
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) (2020)
Multi-Armed Bandit-Based Client Scheduling for Federated Learning
Wenchao Xia et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)
Federated Learning in Smart City Sensing: Challenges and Opportunities
Ji Chu Jiang et al.
SENSORS (2020)
Federated Learning With Differential Privacy: Algorithms and Performance Analysis
Kang Wei et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
VerifyNet: Secure and Verifiable Federated Learning
Guowen Xu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Drynx: Decentralized, Secure, Verifiable System for Statistical Queries and Machine Learning on Distributed Datasets
David Froelicher et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Federated Machine Learning: Concept and Applications
Qiang Yang et al.
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2019)
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption
Le Trieu Phong et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy
Slawomir Goryczka et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2017)
Practical Secure Aggregation for Privacy-Preserving Machine Learning
Keith Bonawitz et al.
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)
Safely Measuring Tor
Rob Jansen et al.
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)
PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks
Tariq Elahi et al.
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2014)