4.8 Article

VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization

Anmin Fu et al.

Summary: This paper presents a novel outsourced scheme for Non-negative Matrix Factorization (O-NMF) to alleviate clients' computing burden and address data privacy and verification issues when outsourcing NMF.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Automation & Control Systems

A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern in Secure Industrial Internet of Things

Zhihua Xia et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Automation & Control Systems

Data-Driven Cyber Security in Perspective-Intelligent Traffic Analysis

Rory Coulter et al.

IEEE TRANSACTIONS ON CYBERNETICS (2020)

Article Automation & Control Systems

Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence

Meng Hao et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Engineering, Electrical & Electronic

Software Vulnerability Detection Using Deep Neural Networks: A Survey

Guanjun Lin et al.

PROCEEDINGS OF THE IEEE (2020)

Article Computer Science, Information Systems

Privacy-Preserving Federated Learning in Fog Computing

Chunyi Zhou et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Telecommunications

Security and privacy in 6G networks: New areas and new challenges

Minghao Wang et al.

DIGITAL COMMUNICATIONS AND NETWORKS (2020)

Article Computer Science, Artificial Intelligence

Federated Machine Learning: Concept and Applications

Qiang Yang et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2019)

Article Computer Science, Theory & Methods

GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy

Chugui Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Theory & Methods

An intelligent incentive mechanism for coverage of data collection in cognitive internet of things

Yuxin Liu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Automation & Control Systems

Adaptive Range-Based Target Localization Using Diffusion GaussNewton Method in Industrial Environments

Mou Wu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Proceedings Paper Computer Science, Information Systems

QUOTIENT: Two-Party Secure Neural Network Training and Prediction

Nitin Agrawal et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Information Systems

Two-party Private Set Intersection with an Untrusted Third Party

Phi Hung Le et al.

PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)

Proceedings Paper Computer Science, Theory & Methods

Helen: Maliciously Secure Coopetitive Learning for Linear Models

Wenting Zheng et al.

2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019) (2019)

Article Automation & Control Systems

Intelligent Impulsive Synchronization of Nonlinear Interconnected Neural Networks for Image Protection

Bin Hu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Theory & Methods

Privacy-Preserving Deep Learning via Additively Homomorphic Encryption

Le Trieu Phong et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Differentially private Naive Bayes learning over multiple data sources

Tong Li et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Information Systems

Privacy preserving multi-party computation delegation for deep learning in cloud computing

Xu Ma et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Information Systems

A Greedy Deep Learning Method for Medical Disease Analysis

Chunxue Wu et al.

IEEE ACCESS (2018)

Article Computer Science, Theory & Methods

Multi-key privacy-preserving deep learning in cloud computing

Ping Li et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Proceedings Paper Computer Science, Information Systems

ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation

Daniel Demmler et al.

22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) (2015)