Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230600211-6.doi: 10.11896/jsjkx.230600211
• Information Security • Previous Articles Next Articles
SUN Min, DING Xining, CHENG Qian
CLC Number:
[1]LIU Y X,CHEN H,LIU Y H,et al.Privacy-preserving techniques in federated learning[J].Journal of Software,2022,33(3):1057-1092. [2]GEYER R C,KLEIN T,NABI M.Differentially private federa-ted learning:a client level perspective[J].arXiv:1712.07557,2017. [3]TRUEX S,LIU L,CHOW K H,et al.LDP-Fed:federated lear-ning with local differential privacy[C]//Proceedings of the Third ACM International Workshop on Edge Systems,Analytics and Networking.New York:ACM Press,2020:61-66. [4]LIU X Y,LI H W,XU G W,et al.Privacy-enhanced federated learning against poisoning adversaries[J].IEEE Transactions on Information Forensics and Security,2021,16:4574-4588. [5]PHONG L T,AONO Y,HAYASHI T,et al.Privacy-preserving deep learning via additively homomorphic encryption[C]//Proceedings of IEEE Transactions on Information Forensics and Security.Piscataway:IEEE Press,2019:1333-1345. [6]OU W,ZENG J,GUO Z,et al.A homomorphic-encryption-based vertical federated learning scheme for rick management[J].Computer Science and Information Systems,2020,17(3):819-834. [7]TANG L T,WANG D,ZHANG L F,et al.Federated learning scheme based on secure multi-party computation and differential privacy[J].Computer Science,2022,49(9):297-305. [8]KAIROUZ P,BONAWITZ K,RAMAGE D.Discrete distribution estimation under local privacy[C]//International Confe-rence on Machine Learning.PMLR,2016:2436-2444. [9]NASERI M,HAYES J,DE CRISTOFARO E.Toward robustness and privacy in federated learning:Experimenting with local and central differential privacy[C]//Proceedings of the 33rd International Conference on International Conference on Machine Learning(ICML’16).Volume 48.2016:2436-2444. [10]KAIROUZ P,BONAWITZ K,RAMAGE D.Discrete Distribution Estimation under Local Privacy[C]//Proceedings of the 33rd International Conference on International Conference on Machine Learning(ICML’16).2016:2436-2444. [11]HUANG J W.Federated learning data privacy security techno-logy based on differential privacy[J].Communication Technology,2022,55(12):1618-1625. |
[1] | ZHOU Tianyang, YANG Lei. Study on Client Selection Strategy and Dataset Partition in Federated Learning Basedon Edge TB [J]. Computer Science, 2024, 51(6A): 230800046-6. |
[2] | WANG Chenzhuo, LU Yanrong, SHEN Jian. Study on Fingerprint Recognition Algorithm for Fairness in Federated Learning [J]. Computer Science, 2024, 51(6A): 230800043-9. |
[3] | ZANG Hongrui, YANG Tingting, LIU Hongbo, MA Kai. Study on Cryptographic Verification of Distributed Federated Learning for Internet of Things [J]. Computer Science, 2024, 51(6A): 230700217-5. |
[4] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
[5] | SUN Jianming, ZHAO Mengxin. Survey of Application of Differential Privacy in Edge Computing [J]. Computer Science, 2024, 51(6A): 230700089-9. |
[6] | TAN Zhiwen, XU Ruzhi, WANG Naiyu, LUO Dan. Differential Privacy Federated Learning Method Based on Knowledge Distillation [J]. Computer Science, 2024, 51(6A): 230600002-8. |
[7] | LIU Dongqi, ZHANG Qiong, LIANG Haolan, ZHANG Zidong, ZENG Xiangjun. Study on Smart Grid AMI Intrusion Detection Method Based on Federated Learning [J]. Computer Science, 2024, 51(6A): 230700077-8. |
[8] | LIU Jianxun, ZHANG Xinglin. Federated Learning Client Selection Scheme Based on Time-varying Computing Resources [J]. Computer Science, 2024, 51(6): 354-363. |
[9] | XU Yicheng, DAI Chaofan, MA Wubin, WU Yahui, ZHOU Haohao, LU Chenyang. Particle Swarm Optimization-based Federated Learning Method for Heterogeneous Data [J]. Computer Science, 2024, 51(6): 391-398. |
[10] | DENG Ziwei, CHEN Ling, LIU Wei. Continuous Influence Maximization Under Independent Cascade Propagation Model [J]. Computer Science, 2024, 51(6): 161-171. |
[11] | MIN Lihua, DING Tianzhong, JIN Zhengmeng. Deformable Image Registration Model Based on Weighted Bounded Deformation Function [J]. Computer Science, 2024, 51(6): 206-214. |
[12] | WANG Zhen, NIE Kai, HAN Lin. Auto-vectorization Cost Model Based on Instruction MKS [J]. Computer Science, 2024, 51(4): 78-85. |
[13] | LU Yanfeng, WU Tao, LIU Chunsheng, YAN Kang, QU Yuben. Survey of UAV-assisted Energy-Efficient Edge Federated Learning [J]. Computer Science, 2024, 51(4): 270-279. |
[14] | WANG Degang, SUN Yi, GAO Qi. Active Membership Inference Attack Method Based on Multiple Redundant Neurons [J]. Computer Science, 2024, 51(4): 373-380. |
[15] | YOU Feifu, CAI Jianping, SUN Lan. Census Associated Multiple Attributes Data Release Based on Differential Privacy [J]. Computer Science, 2024, 51(3): 368-377. |
|