4.7 Article

Zero Knowledge Clustering Based Adversarial Mitigation in Heterogeneous Federated Learning

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection

Lingchen Zhao et al.

Summary: The article presents a novel defense scheme to detect anomalous updates in both IID and non-IID settings, while protecting client-level privacy to prevent poisoning attacks. Experimental evaluations show that the scheme is significantly robust against representative attacks.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Automation & Control Systems

A Distributed Deep Learning System for Web Attack Detection on Edge Devices

Zhihong Tian et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

A Survey on Access Control in the Age of Internet of Things

Jing Qiu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems

Mohan Li et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Artificial Intelligence

Robust and Communication-Efficient Federated Learning From Non-i.i.d. Data

Felix Sattler et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2020)

Review Biotechnology & Applied Microbiology

Wearable biosensors for healthcare monitoring

Jayoung Kim et al.

NATURE BIOTECHNOLOGY (2019)

Article Engineering, Electrical & Electronic

Adaptive Federated Learning in Resource Constrained Edge Computing Systems

Shiqiang Wang et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2019)

Article Computer Science, Theory & Methods

Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog

Nour Moustafa et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Review Computer Science, Hardware & Architecture

Heterogeneity consideration in wireless sensor networks routing algorithms: a review

Deepak Sharma et al.

JOURNAL OF SUPERCOMPUTING (2019)

Article Computer Science, Information Systems

Efficient Secure Outsourcing of Large-Scale Convex Separable Programming for Big Data

Weixian Liao et al.

IEEE TRANSACTIONS ON BIG DATA (2019)

Article Computer Science, Information Systems

Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly

Fan Liang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Deep Learning for IoT Big Data and Streaming Analytics: A Survey

Mehdi Mohammadi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)

Article Computer Science, Hardware & Architecture

Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing

He Li et al.

IEEE NETWORK (2018)

Article Computer Science, Information Systems

Federated learning of predictive models from federated Electronic Health Records

Theodora S. Brisimi et al.

INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS (2018)

Article Computer Science, Information Systems

A Survey of Deep Learning: Platforms, Applications and Emerging Rlesearch Trends

William Grant Hatcher et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications

Jie Lin et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Article Computer Science, Theory & Methods

Towards Multistep Electricity Prices in Smart Grid Electricity Markets

Jie Lin et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2016)

Article Computer Science, Information Systems

Robust K-means algorithm with automatically splitting and merging clusters and its applications for surveillance data

Jingsheng Lei et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Computer Science, Information Systems

On false data injection attacks against Kalman filtering in power system dynamic state estimation

Qingyu Yang et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Theory & Methods

On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures

Qingyu Yang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Computer Science, Information Systems

Research Directions for the Internet of Things

John A. Stankovic

IEEE INTERNET OF THINGS JOURNAL (2014)

Article Computer Science, Artificial Intelligence

Data clustering: 50 years beyond K-means

Anil K. Jain

PATTERN RECOGNITION LETTERS (2010)