Backdoor attacks against distributed swarm learning

K Chen, H Zhang, X Feng, X Zhang, B Mi, Z Jin - ISA transactions, 2023 - Elsevier
Traditional machine learning approaches often need a central server, where raw datasets or
model updates are trained or aggregated in a centralized way. However, these approaches …

IOFL: Intelligent Optimization-Based Federated Learning for Non-IID Data

X Li, H Zhao, W Deng - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Federated learning (FL) algorithm has been widely studied in recent years due to its ability
for sharing data while protecting privacy. However, FL has risks, such as model inversion …

Network Intrusion Detection to Mitigate Jamming and Spoofing Attacks Using Federated Leading: A Comprehensive Survey

T Rehman, N Tariq, M Ashraf… - … Measures for Logistics …, 2024 - igi-global.com
Network intrusions through jamming and spoofing attacks have become increasingly
prevalent. The ability to detect such threats at early stages is necessary for preventing a …

Privacy amplification via shuffling: Unified, simplified, and tightened

S Wang, Y Peng, J Li, Z Wen, Z Li, S Yu… - arXiv preprint arXiv …, 2023 - arxiv.org
The shuffle model of differential privacy provides promising privacy-utility balances in
decentralized, privacy-preserving data analysis. However, the current analyses of privacy …

Privacy preserving federated learning for full heterogeneity

K Chen, X Zhang, X Zhou, B Mi, Y Xiao, L Zhou, Z Wu… - ISA transactions, 2023 - Elsevier
Federated learning is a novel distribute machine learning paradigm to support cooperative
model training among multiple participant clients, where each client keeps its private data …

Enhancing Blockchain Security Against Data Tampering: Leveraging Hybrid Model in Multimedia Forensics and Multi-Party Computation for Supply Chain Data …

U Islam, A Alshammari, Z Alzaid, A Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
Over the past few years, there has been a notable surge in the integration of Blockchain
technology into supply chain management systems. This integration holds the promise of …

Joint Top-K Sparsification and Shuffle Model for Communication-Privacy-Accuracy Tradeoffs in Federated Learning-Based IoV

K Sun, H Xu, K Hua, X Lin, G Li… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) connects a massive amount of smart vehicles for inter/intra-
vehicle information sharing. Data privacy issues, such as privacy leakage and privacy cost …

Unknown Worker Recruitment with Long-Term Incentive in Mobile Crowdsensing

Q Zhou, X Zhang, Z Yang - IEEE Transactions on Mobile …, 2024 - ieeexplore.ieee.org
Many mobile crowdsensing applications require efficient recruitment of workers whose
qualities are often unknown a priori. While prior research has explored multi-armed bandit …

Efficient Secure Data Aggregation for Real-Time Smart Grid Monitoring: A Lightweight Privacy-Preserving Approach

J Zhang, C Shi - IEEE Transactions on Computational Social …, 2024 - ieeexplore.ieee.org
Data aggregation protocols play a crucial role in enabling real-time monitoring of the smart
grid's operational status by the power control center. To ensure robust security, a data …

Differentially Private Numerical Vector Analyses in the Local and Shuffle Model

S Wang, S Yu, X Ren, J Li, Y Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Numerical vector aggregation plays a crucial role in privacy-sensitive applications, such as
distributed gradient estimation in federated learning and statistical analysis of key-value …