Computer Science ›› 2024, Vol. 51 ›› Issue (11): 368-378.doi: 10.11896/jsjkx.231100044
• Information Security • Previous Articles Next Articles
LEI Cheng1, ZHANG Lin1,2
CLC Number:
[1] ZHANG P C,JIN H Y.A Privacy-Oriented Prediction Method in Mobile Edge Environment[J].Chinese Journal of Compu-ters,2020,43(8):1555-1571. [2] MCMAHAN B,MOORE E,RAMAGE D,et al.Communica-tion-efficient learning of deep networks from decentralized data[C]//Artificial Intelligence and Statistics.PMLR,2017:1273-1282. [3] ZHANG J,CHEN B,CHENG X,et al.Poisongan:Generativepoisoning attacks against federated learning in edge computing systems[J].IEEE Internet of Things Journal,2020,8(5):3310-3322. [4] LIU Y X,CHEN H,LIU Y H,et al.Privacy Protection Technology in Federated Learning[J].Journal of Software,2022,33(3):1057-1092. [5] SATTLER F,MÜLLER K R,SAMEK W.Clustered federated learning:Model-agnostic distributed multitask optimization under privacy constraints[J].IEEE transactions on neural networks and learning systems,2020,32(8):3710-3722. [6] FRABONI Y,VIDAL R,KAMENI L,et al.Clustered sampling:Low-variance and improved representativity for clients selection in federated learning[C]//International Conference on Machine Learning.PMLR,2021:3407-3416. [7] CHAI Z,ALI A,ZAWAD S,et al.Tifl:A tier-based federated learning system[C]//Proceedings of the 29th International Symposium on High-Performance Parallel and Distributed Computing.2020:125-136. [8] MHAISEN N,ABDELLATIF A A,MOHAMED A,et al.Optimal user-edge assignment in hierarchical federated learning based on statistical properties and network topology constraints[J].IEEE Transactions on Network Science and Engineering,2021,9(1):55-66. [9] LI Y,QIN X,CHEN H,et al.Energy-Aware Edge Association for Cluster-based Personalized Federated Learning[J].IEEE Transactions on Vehicular Technology,2022,71(6):6756-6761. [10] LIU S,YU G,YIN R,et al.Joint Model Pruning and Device Selection for Communication-Efficient Federated Edge Learning[J].IEEE Transactions on Communications,2021,70(1):231-244. [11] ZOU S,XIAO M,XU Y,et al.FedDCS:Federated LearningFramework based on Dynamic Client Selection[C]//2021 IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems(MASS).IEEE,2021:627-632. [12] LAI F,ZHU X,MADHYASTHA H V,et al.Oort:Efficientfederated learning via guided participant selection[C]//15th {USENIX} Symposium on Operating Systems Design and Implementation({OSDI} 21).2021:19-35. [13] WU W,HE L,LIN W,et al.SAFA:A semi-asynchronous protocol for fast federated learning with low overhead[J].IEEE Transactions on Computers,2020,70(5):655-668. [14] NISHIO T,YONETANI R.Client selection for federated learning with heterogeneous resources in mobile edge[C]//2019 IEEE International Conference on Communications.IEEE,2019:1-7. [15] ZHAO B,FAN K,YANG K,et al.Anonymous and privacy-preserving federated learning with industrial big data[J].IEEE Transactions on Industrial Informatics,2021,17(9):6314-6323. [16] ZHAN Z,ZHANG X.Computation-Effective Personalized Fe-derated Learning:A Meta Learning Approach[C]//2023 IEEE 43rd International Conference on Distributed Computing Systems(ICDCS).IEEE,2023:957-958. [17] FENG W,LIU H,PENG X.Federated Reinforcement Learning for Sharing Experiences Between Multiple Workers[C]//2023 International Conference on Machine Learning and Cybernetics(ICMLC).IEEE,2023:440-445. [18] LI Y,LIU Z,HUANG Y,et al.FedOES:An Efficient Federated Learning Approach[C]//2023 3rd International Conference on Neural Networks,Information and Communication Engineering(NNICE).IEEE,2023:135-139. [19] JEONG E,KOUNTOURIS M.Personalized Decentralized Fe-derated Learning with Knowledge Distillation[J].arXiv:2302.12156,2023. [20] QIN Z,YANG L,WANG Q,et al.Reliable and Interpretable Personalized Federated Learning[C]//Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition.2023:20422-20431. [21] SONG Z,SUN H,YANG H H,et al.Reputation-based Federated Learning for Secure Wireless Networks[J].IEEE Internet of Things Journal,2021,9(2):1212-1226. [22] CAO X,FANG M,LIU J,et al.Fltrust:Byzantine-robust fede-rated learning via trust bootstrapping[J].arXiv:2012.13995,2020. [23] LIU Y,WANG T,PENG S L,et al.Cleaning and Equipment Clustering Method of Federated Learning Model Based on Edge[J].Chinese Journal of Computers,2021,12:2515-2528. [24] KATHAROPOULOS A,FLEURET F.Not all samples arecreated equal:Deep learning with importance sampling[C]//International Conference on Machine Learning.PMLR,2018:2525-2534. [25] ZHAO P,ZHANG T.Stochastic optimization with importance sampling for regularized loss minimization[C]//International Conference on Machine Learning.PMLR,2015:1-9. [26] SHI C,SHEN C.Federated multi-armed bandits[C]//Procee-dings of the AAAI Conference on Artificial Intelligence.2021:9603-9611. [27] FANG M,YANG G,GONG N Z,et al.Poisoning attacks tograph-based recommender systems[C]//Proceedings of the 34th Annual Computer Security Applications Conference.2018:381-392. [28] BIGGIO B,NELSON B,LASKOV P.Poisoning attacks against support vector machines[J].arXiv:1206.6389,2012. [29] CHEN X,LIU C,LI B,et al.Targeted backdoor attacks on deep learning systems using data poisoning[J].arXiv:1712.05526,2017. [30] GU T,DOLAN-GAVITT B,GARG S.Badnets:Identifying vulnerabilities in the machine learning model supply chain[J].ar-Xiv:1708.06733,2017. [31] LIU Y,MA S,AAFER Y,et al.Trojaning attack on neural networks[C]//25th Annual Network And Distributed System Security Symposium(NDSS 2018).Internet Soc,2018. [32] MUÑOZ-GONZÁLEZ L,BIGGIO B,DEMONTIS A,et al.Towards poisoning of deep learning algorithms with back-gradient optimization[C]//Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security.2017:27-38. [33] SHAFAHI A,HUANG W R,NAJIBI M,et al.Poison frogs!targeted clean-label poisoning attacks on neural networks[J].arXiv:1804.00792,2018. |
[1] | LI Zhi, LIN Sen, ZHANG Qiang. Edge Cloud Computing Approach for Intelligent Fault Detection in Rail Transit [J]. Computer Science, 2024, 51(9): 331-337. |
[2] | ZHOU Tianyang, YANG Lei. Study on Client Selection Strategy and Dataset Partition in Federated Learning Basedon Edge TB [J]. Computer Science, 2024, 51(6A): 230800046-6. |
[3] | SUN Min, DING Xining, CHENG Qian. Federated Learning Scheme Based on Differential Privacy [J]. Computer Science, 2024, 51(6A): 230600211-6. |
[4] | TAN Zhiwen, XU Ruzhi, WANG Naiyu, LUO Dan. Differential Privacy Federated Learning Method Based on Knowledge Distillation [J]. Computer Science, 2024, 51(6A): 230600002-8. |
[5] | LIU Dongqi, ZHANG Qiong, LIANG Haolan, ZHANG Zidong, ZENG Xiangjun. Study on Smart Grid AMI Intrusion Detection Method Based on Federated Learning [J]. Computer Science, 2024, 51(6A): 230700077-8. |
[6] | WANG Chenzhuo, LU Yanrong, SHEN Jian. Study on Fingerprint Recognition Algorithm for Fairness in Federated Learning [J]. Computer Science, 2024, 51(6A): 230800043-9. |
[7] | ZANG Hongrui, YANG Tingting, LIU Hongbo, MA Kai. Study on Cryptographic Verification of Distributed Federated Learning for Internet of Things [J]. Computer Science, 2024, 51(6A): 230700217-5. |
[8] | LIU Jianxun, ZHANG Xinglin. Federated Learning Client Selection Scheme Based on Time-varying Computing Resources [J]. Computer Science, 2024, 51(6): 354-363. |
[9] | XU Yicheng, DAI Chaofan, MA Wubin, WU Yahui, ZHOU Haohao, LU Chenyang. Particle Swarm Optimization-based Federated Learning Method for Heterogeneous Data [J]. Computer Science, 2024, 51(6): 391-398. |
[10] | WANG Degang, SUN Yi, GAO Qi. Active Membership Inference Attack Method Based on Multiple Redundant Neurons [J]. Computer Science, 2024, 51(4): 373-380. |
[11] | LU Yanfeng, WU Tao, LIU Chunsheng, YAN Kang, QU Yuben. Survey of UAV-assisted Energy-Efficient Edge Federated Learning [J]. Computer Science, 2024, 51(4): 270-279. |
[12] | WANG Xin, HUANG Weikou, SUN Lingyun. Survey of Incentive Mechanism for Cross-silo Federated Learning [J]. Computer Science, 2024, 51(3): 20-29. |
[13] | HUANG Nan, LI Dongdong, YAO Jia, WANG Zhe. Decentralized Federated Continual Learning Method Combined with Meta-learning [J]. Computer Science, 2024, 51(3): 271-279. |
[14] | XU Wentao, WANG Binjun, ZHU Lixin, WANG Hanxu, GONG Ying. Multi-party Co-governance Prevention Strategy for Horizontal Federated Learning Backdoors [J]. Computer Science, 2024, 51(11A): 240100176-9. |
[15] | WANG Chundong, ZHAO Liyang, ZHANG Boyu, ZHAO Yongxin. Robust Federated Learning Algorithm Based on Multi-feature Detection and Adaptive WeightAdjustment [J]. Computer Science, 2024, 51(11A): 231100072-10. |
|