Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230700217-5.doi: 10.11896/jsjkx.230700217
• Information Security • Previous Articles Next Articles
ZANG Hongrui, YANG Tingting, LIU Hongbo, MA Kai
CLC Number:
[1]JIA B,ZHANG X,LIU J,et al.Blockchain-enabled federatedlearning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT[J].IEEE Transactions on Industrial Informatics,2021,18(6):4049-4058. [2]FU L Y,LU G H,WU Y M,et al.Overview of Research and Development of Blockchain Technology[J].Computer Science,2022,49(S1):447-461. [3]MIAO Y,LIU Z,LI H,et al.Privacy-preserving Byzantine-ro-bust federated learning via blockchain systems[J].IEEE Transactions on Information Forensics and Security,2022,17:2848-2861. [4]SUN Z,WAN J,YIN L,et al.A blockchain-based audit ap-proach for encrypted data in federated learning[J].Digital Communications and Networks,2022,8(5):614-624 [5]BHAGOJI A N,CHAKRABORTY S,MITTAL P,et al.Analyzing federated learning through an adversarial lens[C]//International Conference on Machine Learning.PMLR,2019:634-643. [6]SHEN S,TOPLE S,SAXENA P.Auror:Defending against poisoning attacks in collaborative deep learning systems[C]//Proceedings of the 32nd Annual Conference on Computer Security Applications.2016:508-519. [7]QU X,WANG S,HU Q,et al.Proof of federated learning:A novel energy-recycling consensus algorithm[J].IEEE Transactions on Parallel and Distributed Systems,2021,32(8):2074-2085. [8]LIU Y,QU Y,XU C,et al.Blockchain-enabled asynchronousfederated learning in edge computing[J].Sensors,2021,21(10):3335. [9]LIU X,LI H,XU G,et al.Privacy-enhanced federated learning against poisoning adversaries[J].IEEE Transactions on Information Forensics and Security,2021,16:4574-4588. [10]LU Y,HUANG X,DAI Y,et al.Blockchain and FederatedLearning for Privacy-Preserved Data Sharing in Industrial IoT[J].IEEE Transactions on Industrial Informatics,2020,16(6):4177-4186. [11]QU X,WANG S,HU Q,et al.Proof of federated learning:A novel energy-recycling consensus algorithm[J].IEEE Transactions on Parallel and Distributed Systems,2021,32(8):2074-2085. [12]BLANCHARD P,EL MHAMDI E M,GUERRAOUI R,et al.Machine learning with adversaries:Byzantine tolerant gradient descent[J].Advances in Neural Information Processing Systems,2017,30:118-128. [13]FUNG C,YOON C J M,BESCHASTNIKH I.Mitigating sybils in federated learning poisoning[J].arXiv:1808.04866,2018. [14]ZHU L,LIU Z,HAN S.Deep leakage from gradients[J].Advances in Neural Information Processing Systems,2019,32:17-31. [15]ZHU H,WANG R,JINY,et al.Distributed Additive Encryption and Quantization for Privacy Preserving Federated Deep Lear-ning[J].Neurocomputing,2020,463:309-327. [16]ZHOU H,WORNELL G.Efficient homomorphic encryption on integer vectors and its applications[C]//2014 Information Theory and Applications Workshop(ITA).2014:1-9. [17]KETKAR N,SANTANA E.Deep learning with Python[M].Berkeley,CA:Apress,2017:97-111. [18]DILLON,JOSHUA V,et al.Tensorflow distributions[J].ar-Xiv:1711.10604,2017. [19]“Fiscobcos”[EB/OL].https://github.com/fisco-bcos. [20]AONO Y,HAYASHI T,WANG L,et al.Privacy-preserving deep learning via additively homomorphic encryption[J].IEEE Transactions on Information Forensics and Security,2017,13(5):1333-1345. |
[1] | ZHOU Tianyang, YANG Lei. Study on Client Selection Strategy and Dataset Partition in Federated Learning Basedon Edge TB [J]. Computer Science, 2024, 51(6A): 230800046-6. |
[2] | ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5. |
[3] | LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14. |
[4] | SUN Min, DING Xining, CHENG Qian. Federated Learning Scheme Based on Differential Privacy [J]. Computer Science, 2024, 51(6A): 230600211-6. |
[5] | TAN Zhiwen, XU Ruzhi, WANG Naiyu, LUO Dan. Differential Privacy Federated Learning Method Based on Knowledge Distillation [J]. Computer Science, 2024, 51(6A): 230600002-8. |
[6] | LIU Dongqi, ZHANG Qiong, LIANG Haolan, ZHANG Zidong, ZENG Xiangjun. Study on Smart Grid AMI Intrusion Detection Method Based on Federated Learning [J]. Computer Science, 2024, 51(6A): 230700077-8. |
[7] | TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8. |
[8] | KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6. |
[9] | GENG Qian, CHUAI Ziang, JIN Jian. Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange [J]. Computer Science, 2024, 51(6A): 230800145-9. |
[10] | WANG Chenzhuo, LU Yanrong, SHEN Jian. Study on Fingerprint Recognition Algorithm for Fairness in Federated Learning [J]. Computer Science, 2024, 51(6A): 230800043-9. |
[11] | TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7. |
[12] | LIU Jianxun, ZHANG Xinglin. Federated Learning Client Selection Scheme Based on Time-varying Computing Resources [J]. Computer Science, 2024, 51(6): 354-363. |
[13] | XU Yicheng, DAI Chaofan, MA Wubin, WU Yahui, ZHOU Haohao, LU Chenyang. Particle Swarm Optimization-based Federated Learning Method for Heterogeneous Data [J]. Computer Science, 2024, 51(6): 391-398. |
[14] | ZHANG Ruirong, NIU Baoning, FAN Xing. Multi-attribute Blockchain Decentralization Degree Measurement Model [J]. Computer Science, 2024, 51(5): 382-389. |
[15] | DING Hongfa, YU Yingying, JIANG Heling. Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [J]. Computer Science, 2024, 51(5): 400-413. |
|