NVAS: A non-interactive verifiable federated learning aggregation scheme for COVID-19 based on game theory

[1]  Chunhua Su,et al.  Blockchain-Based Two-Stage Federated Learning With Non-IID Data in IoMT System , 2023, IEEE Transactions on Computational Social Systems.

[2]  B. B. Gupta,et al.  Attribute-Based Secure Data Aggregation for Isolated IoT-Enabled Maritime Transportation Systems , 2023, IEEE Transactions on Intelligent Transportation Systems.

[3]  M. Alazab,et al.  Mixed Game-Based AoI Optimization for Combating COVID-19 With AI Bots , 2022, IEEE Journal on Selected Areas in Communications.

[4]  Jian Shen,et al.  Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems , 2022, Future Gener. Comput. Syst..

[5]  Ayan Paul,et al.  Causal connections between socioeconomic disparities and COVID-19 in the USA , 2022, Scientific Reports.

[6]  Xiaofeng Yu,et al.  BSMD: A blockchain-based secure storage mechanism for big spatio-temporal data , 2022, Future Gener. Comput. Syst..

[7]  O. Rana,et al.  Distributed hierarchical deep optimization for federated learning in mobile edge computing , 2022, Comput. Commun..

[8]  Gautam Srivastava,et al.  Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks , 2022, IEEE Internet of Things Journal.

[9]  Mamoun Alazab,et al.  PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare , 2022, IEEE Transactions on Industrial Informatics.

[10]  Adamu Sani Yahaya,et al.  IoMT: A COVID-19 Healthcare System Driven by Federated Learning and Blockchain , 2022, IEEE Journal of Biomedical and Health Informatics.

[11]  Yi-Ping Phoebe Chen,et al.  A comprehensive review of federated learning for COVID‐19 detection , 2021, Int. J. Intell. Syst..

[12]  Dusit Niyato,et al.  Incentive Mechanisms for Federated Learning: From Economic and Game Theoretic Perspective , 2021, IEEE Transactions on Cognitive Communications and Networking.

[13]  Huansheng Ning,et al.  Federated learning attack surface: taxonomy, cyber defences, challenges, and future directions , 2021, Artificial Intelligence Review.

[14]  Uttam Ghosh,et al.  Novel Vote Scheme for Decision-Making Feedback Based on Blockchain in Internet of Vehicles , 2021, IEEE Transactions on Intelligent Transportation Systems.

[15]  Lingyang Song,et al.  Privacy-Preserving Incentive Mechanism Design for Federated Cloud-Edge Learning , 2021, IEEE Transactions on Network Science and Engineering.

[16]  Gautam Srivastava,et al.  PPSF: A Privacy-Preserving and Secure Framework Using Blockchain-Based Machine-Learning for IoT-Driven Smart Cities , 2021, IEEE Transactions on Network Science and Engineering.

[17]  Xiaosong Zhang,et al.  Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT , 2021, IEEE Transactions on Industrial Informatics.

[18]  Zhiwen Yu,et al.  KNN-BLOCK DBSCAN: Fast Clustering for Large-Scale Data , 2021, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[19]  Khan Muhammad,et al.  Federated learning for COVID-19 screening from Chest X-ray images , 2021, Applied Soft Computing.

[20]  Xiang Cheng,et al.  PoisonGAN: Generative Poisoning Attacks Against Federated Learning in Edge Computing Systems , 2021, IEEE Internet of Things Journal.

[21]  Yongjun Ren,et al.  Multiple cloud storage mechanism based on blockchain in smart homes , 2021, Future Gener. Comput. Syst..

[22]  Neetesh Saxena,et al.  Security and Privacy in IoT Smart Healthcare , 2021, IEEE Internet Computing.

[23]  Kavita,et al.  A Comprehensive Survey on Machine Learning-Based Big Data Analytics for IoT-Enabled Smart Healthcare System , 2021, Mobile Networks and Applications.

[24]  Cem Ersoy,et al.  Privacy-preserving Federated Deep Learning for Wearable IoT-based Biomedical Monitoring , 2021, ACM Trans. Internet Techn..

[25]  Salvatore Pontarelli,et al.  Cuckoo Filters and Bloom Filters: Comparison and Application to Packet Classification , 2020, IEEE Transactions on Network and Service Management.

[26]  Anmin Fu,et al.  VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.

[27]  Noorbakhsh Amiri Golilarz,et al.  Blockchain-Federated-Learning and Deep Learning Models for COVID-19 Detection Using CT Imaging , 2020, IEEE Sensors Journal.

[28]  Zhifei Zhang,et al.  Analyzing User-Level Privacy Attack Against Federated Learning , 2020, IEEE Journal on Selected Areas in Communications.

[29]  Rickmer Braren,et al.  Secure, privacy-preserving and federated machine learning in medical imaging , 2020, Nature Machine Intelligence.

[30]  Yanyan Chen,et al.  A collaborative online AI engine for CT-based COVID-19 diagnosis , 2020, medRxiv.

[31]  Yuanman Li,et al.  Privacy-Preserving distributed deep learning based on secret sharing , 2020, Inf. Sci..

[32]  Yongjun Ren,et al.  Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things , 2019, Sensors.

[33]  M. Schutz,et al.  Secure , 2019, Definitions.

[34]  Walid Saad,et al.  Federated Learning for Edge Networks: Resource Optimization and Incentive Mechanism , 2019, IEEE Communications Magazine.

[35]  Tony Q. S. Quek,et al.  On Safeguarding Privacy and Security in the Framework of Federated Learning , 2019, IEEE Network.

[36]  P. Malik,et al.  Artificial intelligence as an emerging technology in the current care of neurological disorders , 2019, Journal of Neurology.

[37]  Yan Leng,et al.  Secure data storage based on blockchain and coding in edge computing. , 2019, Mathematical biosciences and engineering : MBE.

[38]  Qiang Yang,et al.  Federated Machine Learning , 2019, ACM Trans. Intell. Syst. Technol..

[39]  Tassilo Klein,et al.  Differentially Private Federated Learning: A Client Level Perspective , 2017, ArXiv.

[40]  Sarvar Patel,et al.  Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..

[41]  Yuval Ishai,et al.  Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation , 2017, EUROCRYPT.

[42]  Blaise Agüera y Arcas,et al.  Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.

[43]  Naixue Xiong,et al.  Adaptive GTS allocation in IEEE 802.15.4 for real-time wireless sensor networks , 2013, J. Syst. Archit..

[44]  Naixue Xiong,et al.  Privacy-preserving max/min query in two-tiered wireless sensor networks , 2013, Comput. Math. Appl..

[45]  Mihir Bellare,et al.  The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..

[46]  Koji Nuida,et al.  Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-degree Polynomials , 2021, IACR Cryptol. ePrint Arch..

[47]  Ali Kashif Bashir,et al.  Medical Diagnosis Using Machine Learning: A Statistical Review , 2021, Computers, Materials & Continua.

[48]  Ignacio Cascudo,et al.  ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing , 2020, IACR Cryptol. ePrint Arch..