4.0 Article

Privacy and Trust Redefined in Federated Machine Learning

Related references

Note: Only part of the references are listed.
Article Engineering, Multidisciplinary

An approach towards missing data management using improved GRNN-SGTM ensemble method

Ivan Izonin et al.

Summary: The paper introduces an improved method for enhancing the accuracy of data ensemble predictions by improving two GRNNs ensemble and introducing additional SGTM structure to handle missing data management tasks in smart systems. Experimental results demonstrate the superior performance of this method in air condition monitoring dataset compared to methods of the same class.

ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH (2021)

Review Chemistry, Analytical

Open-Source Federated Learning Frameworks for IoT: A Comparative Review and Analysis

Ivan Kholod et al.

Summary: The rapid development of the Internet of Things (IoT) has brought challenges in managing and analyzing large volumes of data. Traditional approaches may face limitations due to data volume, limited bandwidth, and security requirements. Federated learning (FL) provides a promising solution by enabling direct analysis on data sources with high accuracy and performance. Existing open-source FL frameworks show potential for application in IoT systems with certain restrictions.

SENSORS (2021)

Article Chemistry, Analytical

A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

Charalampos Stamatellis et al.

SENSORS (2020)

Article Computer Science, Interdisciplinary Applications

Privacy-Preserving Passive DNS

Pavlos Papadopoulos et al.

COMPUTERS (2020)

Article Computer Science, Information Systems

Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion

Fennie Wang et al.

FRONTIERS IN BLOCKCHAIN (2020)

Article Gastroenterology & Hepatology

Barriers and pitfalls for artificial intelligence in gastroenterology: Ethical and regulatory issues

Omer F. Ahmad et al.

TECHNIQUES AND INNOVATIONS IN GASTROINTESTINAL ENDOSCOPY (2020)

Article Computer Science, Information Systems

Privacy-Preserving Machine Learning: Threats and Solutions

Mohammad Al-Rubaie et al.

IEEE SECURITY & PRIVACY (2019)

Review Computer Science, Artificial Intelligence

Causability and explainability of artificial intelligence in medicine

Andreas Holzinger et al.

WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY (2019)

Article Computer Science, Artificial Intelligence

Adversarial Examples: Attacks and Defenses for Deep Learning

Xiaoyong Yu et al.

IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS (2019)

Review Computer Science, Information Systems

A taxonomy and survey of attacks against machine learning

Nikolaos Pitropakis et al.

COMPUTER SCIENCE REVIEW (2019)

Article Computer Science, Information Systems

Docker ecosystem - Vulnerability Analysis

A. Martin et al.

COMPUTER COMMUNICATIONS (2018)

Article Computer Science, Theory & Methods

Performance comparison of intrusion detection systems and application of machine learning to Snort system

Syed Ali Raza Shah et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

A First Look at Identity Management Schemes on the Blockchain

Paul Dunphy et al.

IEEE SECURITY & PRIVACY (2018)

Article Computer Science, Artificial Intelligence

A survey of deep neural network architectures and their applications

Weibo Liu et al.

NEUROCOMPUTING (2017)

Article Medical Informatics

Google DeepMind and healthcare in an age of algorithms

Julia Powles et al.

HEALTH AND TECHNOLOGY (2017)

Article Computer Science, Information Systems

Privacy Engineering: Shaping an Emerging Field of Research and Practice

Seda Guerses et al.

IEEE SECURITY & PRIVACY (2016)

Article Computer Science, Theory & Methods

The Algorithmic Foundations of Differential Privacy

Cynthia Dwork et al.

FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE (2013)

Article Computer Science, Hardware & Architecture

The architecture of virtual machines

JE Smith et al.

COMPUTER (2005)

Article International Relations

A conceptualization of trust in international relations

AM Hoffman

EUROPEAN JOURNAL OF INTERNATIONAL RELATIONS (2002)