Yu et al., 2023 - Google Patents
Communication-efficient personalized federated meta-learning in edge networksYu et al., 2023
View PDF- Document ID
- 4902944826170796719
- Author
- Yu F
- Lin H
- Wang X
- Garg S
- Kaddoum G
- Singh S
- Hassan M
- Publication year
- Publication venue
- IEEE Transactions on Network and Service Management
External Links
Snippet
Due to the privacy breach risks and data aggregation of traditional centralized machine learning (ML) approaches, applications, data and computing power are being pushed from centralized data centers to network edge nodes. Federated Learning (FL) is an emerging …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yu et al. | Communication-efficient personalized federated meta-learning in edge networks | |
| Kwabena et al. | MSCryptoNet: Multi-scheme privacy-preserving deep learning in cloud computing | |
| Qi et al. | FedBKD: Heterogenous federated learning via bidirectional knowledge distillation for modulation classification in IoT-edge system | |
| Liu et al. | From distributed machine learning to federated learning: A survey | |
| Horvath et al. | Fjord: Fair and accurate federated learning under heterogeneous targets with ordered dropout | |
| Wang et al. | Safeguarding cross-silo federated learning with local differential privacy | |
| Shlezinger et al. | UVeQFed: Universal vector quantization for federated learning | |
| WO2020229684A1 (en) | Concepts for federated learning, client classification and training data similarity measurement | |
| Chamikara et al. | Local differential privacy for federated learning | |
| Zhao et al. | Utility optimization of federated learning with differential privacy | |
| Kerkouche et al. | Federated learning in adversarial settings | |
| Zhao et al. | Fedusc: Collaborative unsupervised representation learning from decentralized data for internet of things | |
| Kim et al. | Addressing bias and fairness using fair federated learning: A synthetic review | |
| Gad et al. | Joint knowledge distillation and local differential privacy for communication-efficient federated learning in heterogeneous systems | |
| Wang et al. | Feature-based federated transfer learning: communication efficiency, robustness and privacy | |
| Pan et al. | Privacy-preserving heterogeneous personalized federated learning with knowledge | |
| Tchaye-Kondi et al. | Privacy-preserving offloading in edge intelligence systems with inductive learning and local differential privacy | |
| Shi et al. | Feature-imitation federated learning: An efficient approach for specific emitter identification in low-resource environments | |
| Dasari et al. | 2p3fl: A novel approach for privacy preserving in financial sectors using flower federated learning | |
| Wang et al. | P2cefl: Privacy-preserving and communication efficient federated learning with sparse gradient and dithering quantization | |
| Li et al. | VAEFL: Integrating variational autoencoders for privacy preservation and performance retention in federated learning | |
| Xu et al. | Lightweight and unobtrusive privacy preservation for remote inference via edge data obfuscation | |
| CN116719607A (en) | Model updating method and system based on federal learning | |
| He et al. | Towards Secure Weighted Aggregation for Privacy-Preserving Federated Learning | |
| Refael et al. | LORENZA: Enhancing generalization in low-rank gradient LLM training via efficient zeroth-order adaptive SAM |