+

Yu et al., 2023 - Google Patents

Communication-efficient personalized federated meta-learning in edge networks

Yu et al., 2023

View PDF
Document ID
4902944826170796719
Author
Yu F
Lin H
Wang X
Garg S
Kaddoum G
Singh S
Hassan M
Publication year
Publication venue
IEEE Transactions on Network and Service Management

External Links

Snippet

Due to the privacy breach risks and data aggregation of traditional centralized machine learning (ML) approaches, applications, data and computing power are being pushed from centralized data centers to network edge nodes. Federated Learning (FL) is an emerging …
Continue reading at xiaodingwang.github.io (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Similar Documents

Publication Publication Date Title
Yu et al. Communication-efficient personalized federated meta-learning in edge networks
Kwabena et al. MSCryptoNet: Multi-scheme privacy-preserving deep learning in cloud computing
Qi et al. FedBKD: Heterogenous federated learning via bidirectional knowledge distillation for modulation classification in IoT-edge system
Liu et al. From distributed machine learning to federated learning: A survey
Horvath et al. Fjord: Fair and accurate federated learning under heterogeneous targets with ordered dropout
Wang et al. Safeguarding cross-silo federated learning with local differential privacy
Shlezinger et al. UVeQFed: Universal vector quantization for federated learning
WO2020229684A1 (en) Concepts for federated learning, client classification and training data similarity measurement
Chamikara et al. Local differential privacy for federated learning
Zhao et al. Utility optimization of federated learning with differential privacy
Kerkouche et al. Federated learning in adversarial settings
Zhao et al. Fedusc: Collaborative unsupervised representation learning from decentralized data for internet of things
Kim et al. Addressing bias and fairness using fair federated learning: A synthetic review
Gad et al. Joint knowledge distillation and local differential privacy for communication-efficient federated learning in heterogeneous systems
Wang et al. Feature-based federated transfer learning: communication efficiency, robustness and privacy
Pan et al. Privacy-preserving heterogeneous personalized federated learning with knowledge
Tchaye-Kondi et al. Privacy-preserving offloading in edge intelligence systems with inductive learning and local differential privacy
Shi et al. Feature-imitation federated learning: An efficient approach for specific emitter identification in low-resource environments
Dasari et al. 2p3fl: A novel approach for privacy preserving in financial sectors using flower federated learning
Wang et al. P2cefl: Privacy-preserving and communication efficient federated learning with sparse gradient and dithering quantization
Li et al. VAEFL: Integrating variational autoencoders for privacy preservation and performance retention in federated learning
Xu et al. Lightweight and unobtrusive privacy preservation for remote inference via edge data obfuscation
CN116719607A (en) Model updating method and system based on federal learning
He et al. Towards Secure Weighted Aggregation for Privacy-Preserving Federated Learning
Refael et al. LORENZA: Enhancing generalization in low-rank gradient LLM training via efficient zeroth-order adaptive SAM
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载