4.8 Article

Boosting Accuracy of Differentially Private Federated Learning in Industrial IoT With Sparse Responses

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

Blockchain-Empowered Decentralized Horizontal Federated Learning for 5G-Enabled UAVs

Chaosheng Feng et al.

Summary: Motivated by Industry 4.0, 5G-enabled drones have been widely applied, but the open nature of 5G networks threatens data sharing and privacy. To address these issues, a blockchain-empowered decentralized federated learning framework is proposed, enabling cross-domain authentication and global model updates, achieving efficient authentication and accuracy.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Automation & Control Systems

Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT

Bin Jia et al.

Summary: This article presents a blockchain-enabled federated learning application model and data protection methods based on differential privacy and homomorphic encryption. Experimental results demonstrate that the method has better performance in data sharing and model sharing.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

Toward Accurate Anomaly Detection in Industrial Internet of Things Using Hierarchical Federated Learning

Xiaoding Wang et al.

Summary: This paper proposes a reliable anomaly detection strategy for Industrial Internet of Things (IIoT) using federated learning. By training local models with deep reinforcement learning algorithm and introducing privacy leakage degree and action relation, the detection accuracy can be greatly improved, achieving privacy preservation.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Automation & Control Systems

Deep Reinforcement Learning Assisted Federated Learning Algorithm for Data Management of IIoT

Peiying Zhang et al.

Summary: This study explores the efficient and secure management of massive user data generated by IIoT devices, utilizing FL technology and DRL algorithms to increase model aggregation rates and reduce communication costs.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Automation & Control Systems

Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT

Rahim Taheri et al.

Summary: Fed-IIoT is a robust architecture for detecting Android malware applications in IIoT, utilizing federated learning on both participant and server sides to enhance security and privacy protection.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Engineering, Electrical & Electronic

Slashing Communication Traffic in Federated Learning by Transmitting Clustered Model Updates

Laizhong Cui et al.

Summary: Federated Learning faces challenges in communication traffic, and compressing model updates is an effective solution. The proposed MUCSC algorithm uses soft clustering to compress model updates by transmitting cluster centroids and cluster IDs, ensuring unbiased estimation and minimizing the impact of compression errors on model accuracy. Additionally, the B-MUCSC algorithm can achieve high compression rates by grouping insignificant model updates, making it suitable for scenarios with limited network resources.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2021)

Article Automation & Control Systems

Communication-Efficient Federated Learning for Digital Twin Edge Networks in Industrial IoT

Yunlong Lu et al.

Summary: This article introduces the application of digital twin edge networks in the industrial Internet of Things, filling the gap between physical systems and digital spaces by incorporating digital twin into edge networks. The use of federated learning to construct digital twin models of IoT devices and the proposal of an asynchronous model update scheme help to improve communication efficiency and reduce transmission energy cost.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

Differential Privacy for Industrial Internet of Things: Opportunities, Applications, and Challenges

Bin Jiang et al.

Summary: The development of IoT has brought new changes and IIoT is promoting a new industrial revolution. With more IIoT applications, privacy protection issues are emerging. Differential privacy is used to protect user-terminal privacy, requiring in-depth research.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Federated Learning With Cooperating Devices: A Consensus Approach for Massive IoT Networks

Stefano Savazzi et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Automation & Control Systems

A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems

Pathum Chamikara Mahawaga Arachchige et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Proceedings Paper Computer Science, Theory & Methods

Classification of Garments from Fashion MNIST Dataset Using CNN LeNet-5 Architecture

Mohammed Kayed et al.

PROCEEDINGS OF 2020 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN COMMUNICATION AND COMPUTER ENGINEERING (ITCE) (2020)

Proceedings Paper Computer Science, Hardware & Architecture

On the Detection of Shilling Attacks in Federated Collaborative Filtering

Yangfan Jiang et al.

2020 INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2020) (2020)

Proceedings Paper Computer Science, Information Systems

The Value of Collaboration in Convex Machine Learning with Differential Privacy

Nan Wu et al.

2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020) (2020)

Article Computer Science, Theory & Methods

Federated Learning With Differential Privacy: Algorithms and Performance Analysis

Kang Wei et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Interdisciplinary Applications

Industrial IoT in 5G environment towards smart manufacturing

Jiangfeng Cheng et al.

JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION (2018)

Article Computer Science, Information Systems

Understanding the Sparse Vector Technique for Differential Privacy

Min Lyu et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2017)

Article Computer Science, Theory & Methods

The Algorithmic Foundations of Differential Privacy

Cynthia Dwork et al.

FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE (2013)