A Security-Oriented Architecture for Federated Learning in Cloud Environments
暂无分享,去创建一个
[1] Youssef Iraqi,et al. Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey , 2020, IEEE Access.
[2] Qiang Yang,et al. Federated Machine Learning , 2019, ACM Trans. Intell. Syst. Technol..
[3] Ernesto Damiani,et al. Blockchain-Based E-Vote-as-a-Service , 2019, 2019 IEEE 12th International Conference on Cloud Computing (CLOUD).
[4] Dave E. Eckhardt,et al. A theoretical investigation of generalized voters for redundant systems , 1989, [1989] The Nineteenth International Symposium on Fault-Tolerant Computing. Digest of Papers.
[5] Bing Chen,et al. Poisoning Attack in Federated Learning using Generative Adversarial Nets , 2019, 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[6] Hubert Eichner,et al. Towards Federated Learning at Scale: System Design , 2019, SysML.
[7] Wil M. P. van der Aalst,et al. Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.
[8] Misbah Liaqat,et al. Federated cloud resource management: Review and discussion , 2017, J. Netw. Comput. Appl..
[9] Corrado Aaron Visaggio,et al. Adversarial deep learning for energy management in buildings , 2019, SummerSim.
[10] Brian M. Gaff,et al. Privacy and Big Data , 2014, Computer.
[11] Marko Vukolic,et al. Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.
[12] Emanuele Bellini,et al. A blockchain based Trusted Persistent Identifier system for Big Data in Science , 2019, Foundations of Computing and Decision Sciences.
[13] Flora Amato,et al. A Federation of Cognitive Cloud Services for Trusting Data Sources , 2018, CISIS.
[14] Fakhri Karray,et al. Multisensor data fusion: A review of the state-of-the-art , 2013, Inf. Fusion.
[15] Franco Pirri,et al. Enhancing IoT Data Dependability through a Blockchain Mirror Model , 2019, Future Internet.
[16] Vitaly Shmatikov,et al. Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[17] Dawn Xiaodong Song,et al. Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning , 2017, ArXiv.
[18] Lukasz Golab,et al. FastFabric: Scaling Hyperledger Fabric to 20,000 Transactions per Second , 2019, International Conference on Blockchain.
[19] Anit Kumar Sahu,et al. Federated Learning: Challenges, Methods, and Future Directions , 2019, IEEE Signal Processing Magazine.
[20] Shiho Moriai,et al. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.
[21] Valentin-Alexandru Vladuta,et al. Applying Neural Network Approach to Homomorphic Encrypted Data , 2018, 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).
[22] Yanjiao Chen,et al. Privacy-Preserving Collaborative Deep Learning With Unreliable Participants , 2020, IEEE Transactions on Information Forensics and Security.
[23] Mohammad Al-Rubaie,et al. Privacy-Preserving Machine Learning: Threats and Solutions , 2018, IEEE Security & Privacy.
[24] Juan Benet,et al. IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.