When federated learning meets watermarking: A comprehensive overview of techniques for intellectual property protection

M Lansari, R Bellafqira, K Kapusta… - Machine Learning and …, 2023 - mdpi.com
Federated learning (FL) is a technique that allows multiple participants to collaboratively
train a Deep Neural Network (DNN) without the need to centralize their data. Among other …

A review on client-server attacks and defenses in federated learning

A Sharma, N Marchang - Computers & Security, 2024 - Elsevier
Federated Learning (FL) offers decentralized machine learning (ML) capabilities while
potentially safeguarding data privacy. However, this architecture introduces unique security …

Fairness and privacy preserving in federated learning: A survey

TH Rafi, FA Noor, T Hussain, DK Chae - Information Fusion, 2024 - Elsevier
Federated Learning (FL) is an increasingly popular form of distributed machine learning that
addresses privacy concerns by allowing participants to collaboratively train machine …

Fedtracker: Furnishing ownership verification and traceability for federated learning model

S Shao, W Yang, H Gu, Z Qin, L Fan… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Federated learning (FL) is a distributed machine learning paradigm allowing multiple clients
to collaboratively train a global model without sharing their local data. However, FL entails …

Fedcip: Federated client intellectual property protection with traitor tracking

J Liang, R Wang - arXiv preprint arXiv:2306.01356, 2023 - arxiv.org
Federated learning is an emerging privacy-preserving distributed machine learning that
enables multiple parties to collaboratively learn a shared model while keeping each party's …

Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Computer Networks, 2024 - Elsevier
Federated Learning (FL) is an emerging Artificial Intelligence (AI) paradigm enabling
multiple parties to train a model collaboratively without sharing their data. With the upcoming …

Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution

S Shao, Y Li, H Yao, Y He, Z Qin, K Ren - arXiv preprint arXiv:2405.04825, 2024 - arxiv.org
Ownership verification is currently the most critical and widely adopted post-hoc method to
safeguard model copyright. In general, model owners exploit it to identify whether a given …

FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System

R Alexander, K Pradeep Mohan Kumar - Wireless Personal …, 2024 - Springer
Abstract The Internet of Things (IoT) is a rapidly growing technology that has been
generating increasing amounts of traffic from multiple devices. However, this growth in traffic …

[HTML][HTML] A Clinician's Guide to Sharing Data for AI in Ophthalmology

N Gim, Y Wu, M Blazes, CS Lee… - … & Visual Science, 2024 - tvst.arvojournals.org
Data is the cornerstone of using AI models, because their performance directly depends on
the diversity, quantity, and quality of the data used for training. Using AI presents unique …

Graph Neural Backdoor: Fundamentals, Methodologies, Applications, and Future Directions

X Yang, G Li, J Li - arXiv preprint arXiv:2406.10573, 2024 - arxiv.org
Graph Neural Networks (GNNs) have significantly advanced various downstream graph-
relevant tasks, encompassing recommender systems, molecular structure prediction, social …