4.8 Article

Privacy Threat and Defense for Federated Learning With Non-i.i.d. Data in AIoT

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

Differentially Private Asynchronous Federated Learning for Mobile Edge Computing in Urban Informatics

Yunlong Lu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence

Meng Hao et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Engineering, Multidisciplinary

A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems

Zhipeng Cai et al.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2020)

Article Computer Science, Theory & Methods

Federated Learning With Differential Privacy: Algorithms and Performance Analysis

Kang Wei et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Information Systems

Differential Privacy Preservation in Deep Learning: Challenges, Opportunities and Solutions

Jingwen Zhao et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition

Qilong Han et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Proceedings Paper Computer Science, Information Systems

Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning

Briland Hitaj et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Practical Secure Aggregation for Privacy-Preserving Machine Learning

Keith Bonawitz et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures

Matt Fredrikson et al.

CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)