Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye...
详细信息
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-layer aggregation federated learning architecture,which lack the consideration of cross-domain and asynchronous robustness of federated learning,and rarely integrate verification mechanisms from the perspective of *** address the above challenges,we propose a Blockchain and Signcryption enabled Asynchronous Federated Learning(BSAFL)framework based on dual aggregation for cross-domain *** particular,we first design two types of signcryption schemes to secure the interaction and access control of collaborative learning between ***,we construct a differential privacy approach that adaptively adjusts privacy budgets to ensure data privacy and local models'availability of intra-domain ***,we propose an asynchronous aggregation solution that incorporates consensus verification and elastic participation using ***,security analysis demonstrates the security and privacy effectiveness of BSAFL,and the evaluation on real datasets further validates the high model accuracy and performance of BSAFL.
Humans are responsible for the majority of delivering the packets over the area of a network. When compared to classic delivery system the Autonomous Delivery Robot(ADR's) is meant to deliver the goods instead of ...
详细信息
Federated learning, as a distributed machine learning paradigm, enhances privacy protection but faces the challenge of heterogeneity. data-free knowledge distillation (DFKD) methods attempt to overcome this challenge ...
详细信息
The outlier removal methods are usually based on Multi-Layer Perceptron (MLP) for capturing context, which neglect the underlying motion information in images. Recently, CNN-based methods have attempted to address thi...
详细信息
On international basis, one in all our century's essential problems is air pollutants. Every year, the range of individuals killed via way of means of pollutants climbs, with air pollutants being the main cause. T...
详细信息
Cloud-of-clouds storage systems are widely used in online applications, where user data are encrypted, encoded, and stored in multiple clouds. When some cloud nodes fail, the storage systems can reconstruct the lost d...
详细信息
Retrieval-augmented generation (RAG) expands the capabilities of large language models (LLMs) in various applications by integrating relevant information retrieved from external data sources. However, the RAG systems ...
Recent years have witnessed continuous optimization and innovation of reinforcement learning algorithms. Games, as a key application paradigm, have been widely employed to develop superior reinforcement learning model...
详细信息
Patients’ data constitutes the vast majority of information exchanged over the Internet. The magnitude of maintaining its security and privacy directly correlates to the importance and privacy of the patients themsel...
详细信息
作者:
Janprasit, SiwachPunkong, NarongRatanavilisagul, ChiabwootKosolsombat, Somkiat
Faculty of Applied Science Department of Computer and Information Science Bangkok Thailand
Digital Technology for Business Faculty of Management Science Kanchanaburi Thailand
Faculty of Applied Science Department of Computer and Information Sciences Bangkok Thailand Thammasat University
Data Science and Innovation College of Interdisciplinary Studies Thailand
handwritten digit recognition is a crucial task in various fields such as postal mail sorting, bank check processing, and digitizing handwritten documents. This research aims to compare the effectiveness of using Conv...
详细信息
暂无评论