Computer Science ›› 2021, Vol. 48 ›› Issue (8): 32-40.doi: 10.11896/jsjkx.201000093
• Database & Big Data & Data Science • Previous Articles Next Articles
LUO Chang-yin1,2,3, CHEN Xue-bin1,2,3, MA Chun-di1, ZHANG Shu-fen1,2,3
CLC Number:
[1]MCMAHAN H B,MOORE E,RAMAG E,et al.Communi-cation-efficient learning of deep networks from decentralized data[C]//Proceedings of the 20th International Conference on Artificial Intelligence and Statistics.Fort Lauderdale:JMLR,2017:1-11. [2]KONECNY J,MCMAHAN H B,YU F X,et al.Federatedlearning:Strategies for improving communicaton efficiency[C]//Proceedings of the 30th Annual Conference on Neural Information Processing Systems.Cambridge,MA:MIT Press,2016:1-10. [3]YANG Q.Challengs of GDPR to AI and countermeasures based on federal transfer learning[J].Communications of Chinese Association of Artificial Intelligence,2018,8:1-8. [4]YANG Q,LIU Y,CHEN T,et al.Federated Machine Learning:Concept and Applications[J].ACM Transactions on Intelligent Systems and Technology,2019,10(2):1-19. [5]WANG S,TUOR T,SALONIDIS T,et al.Adaptive federated learning in resource constrained edge computing systems[J].IEEE Journal on Selected Areas in Communications,2019,37(6):1205-1221. [6]LIU Y,LIU Y T,LIU Z J,et al.Federated Forest[EB/OL].[2019-05-24].https://arxiv.org/pdf/1905.10053v1.pdf. [7]SHARMA S,CHEN K.Poster:Privacy-Preserving Boostingwith Random Linear Classifiers[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2018:1-13. [8]SUN C,SHRIVASTAVA A,SINGH S,et al.Revisiting Unreasonable Effectiveness of Data in Deep Learning Era[EB/OL].[2017-08-04].https://arxiv.org/abs/1707.02968v2.pdf. [9]KIM H,PARK J,BENNIS M,et al.On-Device Federated Lear-ning via Blockchain and its Latency Analysis[EB/OL].[2018-07-01].https://arxiv.org/pdf/1808.03949.pdf. [10]LI S Y,CHENG Y,LIU Y,et al.Abnormal Client Behavior Detection in Federated Learning[EB/OL].[2019-12-06].https://arxiv.org /pdf/1910.09933.pdf. [11]ZHU L G,LIU Z J,HAN S,et al.Deep Leakage from Gradients[EB/OL].[2019-12-19].https://arxiv.org/pdf/1906.08935. [12]CHEN Y S,YANG Y H,YANG Y H,et al.Nuclear Power Plant Fault Diagnosis Technology Based on Deep Learning Neural Network [J].Journal of Shanghai Jiaotong University,2018,52(S1):58-61. [13]GAO H H,HUANG W Q,YANG X X.Applying Probabilistic Model Checking to Path Planning in an Intelligent Transportation System Using Mobility Trajectories and Their Statistical Data[J].Intelligent Automation and Soft Computing(Autosoft),2019,25(3):547-559. [14]GAO H H,HUANG W Q,DUAN Y C,et al.Research on Cost-Driven Services Composition in an Uncertain Environment[J].Journal of Internet Technology (JIT).2019,20(3):755-769. [15]PREUVENEERS D,RIMMER V,TSINGENOPOULOS I,et al.Chained Anomaly Detection Models for Federated Lear-ning:An Intrusion Detection Case Study[J].Applied Sciences,2018,8(12):2663. [16]BRISIMI T S,CHEN R,MELA T,et al.Federated learning of predictive models from federated Electronic Health Records[J].International Journal of Medical Informatics,2018,112:59-67. [17]ZHANG W S,ZHANG Y J,ZHAI J,et al.Multi-source data fu-sion using deep learning for smart refrigerators[J].Computers in Industry,2018,95:15-21. [18]LEE J,WANG F,SUN J M,et al.Privacy-Preserving Patient Similarity Learning in a Federated Environment:Development and Analysis[J].JMIR Medical Informatics,2018,6(2):e20. [19]SHEN G J,HAN X,ZHOU J J,et al.Research on IntelligentAnalysis and Depth Fusion of Multi-Source Traffic Data[J].IEEE Access,2018(6):59329-59335. [20]LIU J,LI T R,XIE P,et al.Urban big data fusion based on deep learning:An overview[J].Information Fusion,2020(53):123-133. [21]WANG X D,XIONG Y L.Evaluation of the effect of rurale-commerce support policies-a text analysis based on the entropy method[J].Technology Management Research,2020,40(14):218-226. [22]CHEN M Q.Heilongjiang Province Producer Service Industry Development Heterogeneity Analysis-Based on the Application of Entropy Method[J].Business Economy,2020(7):9-10,44. [23]LIU B J,ZHANG S,LUO X Y,et al.Application of Aircraft Battle Damage Evaluation Based on Extension Entropy Method[J].Ordnance Industry Automation,2020,39(7):42-44. [24]ZENG Y J.Application of improved entropy weight model in risk assessment of flood discharge and storage area[J].Yangtze River Technology and Economy,2020,4(S1):22-23. [25]LI X,LI J C,ZHENG X F,et al.A Quantitative EvaluationMethod of Information System Vulnerabilities Based on Analytic Hierarchy Process[J].Computer Science,2012,39(7):58-63. [26]WANG L,YE J,ZHANG H L.A method of supplier selection based on rough set and analytic hierarchy process[J].Computer Science,2014,41(3):80-84. |
[1] | YU Ben-gong, ZHANG Zi-wei, WANG Hui-ling. TS-AC-EWM Online Product Ranking Method Based on Multi-level Emotion and Topic Information [J]. Computer Science, 2022, 49(6A): 165-171. |
[2] | SHI Chao-wei, MENG Xiang-ru, MA Zhi-qiang, HAN Xiao-yang. Virtual Network Embedding Algorithm Based on Topology Comprehensive Evaluation and Weight Adaptation [J]. Computer Science, 2020, 47(7): 236-242. |
[3] | YE Jun and ZHANG Zheng-jun. Face Detection Based on DS-Adaboost Algorithm [J]. Computer Science, 2013, 40(Z11): 318-319. |
|