Towards asynchronous federated learning for heterogeneous edge-powered internet of things
暂无分享,去创建一个
Wei Yu | Weixian Liao | Kun Hua | Zheyi Chen | Chao Lu | Wei Yu | Chao Lu | Zheyi Chen | Weixian Liao | Kun Hua
[1] Steven Skiena,et al. Who is interested in algorithms and why?: lessons from the Stony Brook algorithms repository , 1999, SIGA.
[2] Nada Golmie,et al. Toward Edge-Based Deep Learning in Industrial Internet of Things , 2020, IEEE Internet of Things Journal.
[3] Weixian Liao,et al. Machine Learning for Security and the Internet of Things: The Good, the Bad, and the Ugly , 2019, IEEE Access.
[4] H. Brendan McMahan,et al. Learning Differentially Private Recurrent Language Models , 2017, ICLR.
[5] David Danks,et al. The Value of Trustworthy AI , 2019, AIES.
[6] Feng Qian,et al. An in-depth study of LTE: effect of network protocol and application behavior on performance , 2013, SIGCOMM.
[7] Lewis Tseng,et al. Blockchain for Managing Heterogeneous Internet of Things: A Perspective Architecture , 2020, IEEE Network.
[8] ZhouYuanyuan,et al. An in-depth study of LTE , 2013 .
[9] Zheyi Chen,et al. A Game Theory Based Approach for Power Efficient Vehicular Ad Hoc Networks , 2017, Wirel. Commun. Mob. Comput..
[10] Sameh Sorour,et al. Adaptive Task Allocation for Mobile Edge Learning , 2018, 2019 IEEE Wireless Communications and Networking Conference Workshop (WCNCW).
[11] Pachamuthu Rajalakshmi,et al. Saturated Throughput Analysis of IEEE 802.11ad EDCA For High Data Rate 5G-IoT Applications , 2019, IEEE Transactions on Vehicular Technology.
[12] Mohsen Guizani,et al. Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[13] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[14] Kin K. Leung,et al. Mobility-Induced Service Migration in Mobile Micro-clouds , 2014, 2014 IEEE Military Communications Conference.
[15] Hang Shi,et al. A Feature-Based Learning System for Internet of Things Applications , 2019, IEEE Internet of Things Journal.
[16] Kin K. Leung,et al. When Edge Meets Learning: Adaptive Control for Resource-Constrained Distributed Machine Learning , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[17] M. Zulfiker Ali,et al. Performance Evaluation of Heterogeneous IoT Nodes With Differentiated QoS in IEEE 802.11ah RAW Mechanism , 2019, IEEE Transactions on Vehicular Technology.
[18] Michael P. Wellman,et al. SoK: Security and Privacy in Machine Learning , 2018, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[19] Xing Liu,et al. Reinforcement Learning-Based Control and Networking Co-Design for Industrial Internet of Things , 2020, IEEE Journal on Selected Areas in Communications.
[20] Wei Yu,et al. Zero Knowledge Clustering Based Adversarial Mitigation in Heterogeneous Federated Learning , 2021, IEEE Transactions on Network Science and Engineering.
[21] Kim-Kwang Raymond Choo,et al. Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog , 2019, IEEE Transactions on Information Forensics and Security.
[22] Samy Bengio,et al. Revisiting Distributed Synchronous SGD , 2016, ArXiv.
[23] Jun Li,et al. Online Resource Allocation for Arbitrary User Mobility in Distributed Edge Clouds , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[24] Nenghai Yu,et al. Asynchronous Stochastic Gradient Descent with Delay Compensation , 2016, ICML.
[25] Chuan Wu,et al. Distributed Machine Learning through Heterogeneous Edge Systems , 2019, AAAI.
[26] Tim Verbelen,et al. A Survey on Distributed Machine Learning , 2019, ACM Comput. Surv..
[27] Teng Wang,et al. Survey on Improving Data Utility in Differentially Private Sequential Data Publishing , 2017, IEEE Transactions on Big Data.
[28] Martin J. Wainwright,et al. Privacy Aware Learning , 2012, JACM.
[29] Wei Zhang,et al. Asynchronous Decentralized Parallel Stochastic Gradient Descent , 2017, ICML.
[30] Xinyu Yang,et al. A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.
[31] Zdenek Becvar,et al. Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.
[32] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[33] Michael P. Wellman,et al. Towards the Science of Security and Privacy in Machine Learning , 2016, ArXiv.
[34] Honggang Wang,et al. Artificial Intelligence (AI) Driven Wireless Body Area Networks: Challenges and Directions , 2019, 2019 IEEE International Conference on Industrial Internet (ICII).
[35] Blaise Agüera y Arcas,et al. Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.
[36] Ling Liu,et al. Adversarial Examples in Deep Learning: Characterization and Divergence , 2018, ArXiv.
[37] Takayuki Nishio,et al. Client Selection for Federated Learning with Heterogeneous Resources in Mobile Edge , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[38] Moran Baruch,et al. A Little Is Enough: Circumventing Defenses For Distributed Learning , 2019, NeurIPS.
[39] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[40] Vincent W. S. Wong,et al. Hierarchical Fog-Cloud Computing for IoT Systems: A Computation Offloading Game , 2017, IEEE Internet of Things Journal.
[41] Mohan Li,et al. Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems , 2020, IEEE Internet of Things Journal.
[42] Nada Golmie,et al. A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective , 2018, IEEE Access.
[43] Wei Yu,et al. A Survey of Deep Learning: Platforms, Applications and Emerging Research Trends , 2018, IEEE Access.
[44] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[45] Xinyu Yang,et al. Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense , 2018, IEEE Transactions on Vehicular Technology.
[46] Jiangchuan Liu,et al. Task Scheduling with Optimized Transmission Time in Collaborative Cloud-Edge Learning , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).