Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c...
详细信息
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication channels, semi-trusted RoadSide Unit (RSU), and collusion between vehicles and the RSU may lead to leakage of model parameters. Moreover, when aggregating data, since different vehicles usually have different computing resources, vehicles with relatively insufficient computing resources will affect the data aggregation efficiency. Therefore, in order to solve the privacy leakage problem and improve the data aggregation efficiency, this paper proposes a privacy-preserving data aggregation protocol for IoV with FL. Firstly, the protocol is designed based on methods such as shamir secret sharing scheme, pallier homomorphic encryption scheme and blinding factor protection, which can guarantee the privacy of model parameters. Secondly, the protocol improves the data aggregation efficiency by setting dynamic training time windows. Thirdly, the protocol reduces the frequent participations of Trusted Authority (TA) by optimizing the fault-tolerance mechanism. Finally, the security analysis proves that the proposed protocol is secure, and the performance analysis results also show that the proposed protocol has high computation and communication efficiency. IEEE
Owing to massive technological developments in Internet of Things(IoT)and cloud environment,cloud computing(CC)offers a highly flexible heterogeneous resource pool over the network,and clients could exploit various re...
详细信息
Owing to massive technological developments in Internet of Things(IoT)and cloud environment,cloud computing(CC)offers a highly flexible heterogeneous resource pool over the network,and clients could exploit various resources on *** IoT-enabled models are restricted to resources and require crisp response,minimum latency,and maximum bandwidth,which are outside the *** was handled as a resource-rich solution to aforementioned *** high delay reduces the performance of the IoT enabled cloud platform,efficient utilization of task scheduling(TS)reduces the energy usage of the cloud infrastructure and increases the income of service provider via minimizing processing time of user ***,this article concentration on the design of an oppositional red fox optimization based task scheduling scheme(ORFOTSS)for IoT enabled cloud *** presented ORFO-TSS model resolves the problem of allocating resources from the IoT based cloud *** achieves the makespan by performing optimum TS procedures with various aspects of incoming *** designing of ORFO-TSS method includes the idea of oppositional based learning(OBL)as to traditional RFO approach in enhancing their efficiency.A wide-ranging experimental analysis was applied on the CloudSim *** experimental outcome highlighted the efficacy of the ORFO-TSS technique over existing approaches.
Today for an organisation, data security is the most crucial topic. An organisation needs to protect its information against cyberattacks. Cryptography, DLT, and blockchain technology provide higher security for data ...
详细信息
The Metaverse depicts a parallel digitalized world where virtuality and reality are *** has economic and social systems like those in the real world and provides intelligent services and *** this paper,we introduce th...
详细信息
The Metaverse depicts a parallel digitalized world where virtuality and reality are *** has economic and social systems like those in the real world and provides intelligent services and *** this paper,we introduce the Metaverse from a new technology perspective,including its essence,corresponding technical framework,and potential technical ***,we analyze the essence of the Metaverse from its etymology and point out breakthroughs promising to be made in time,space,and contents of the Metaverse by citing Maslow's Hierarchy of ***,we conclude four pillars of the Metaverse,named ubiquitous connections,space convergence,virtuality and reality interaction,and human-centered communication,and establish a corresponding technical ***,we envision open issues and challenges of the Metaverse in the technical *** work proposes a new technology perspective of the Metaverse and will provide further guidance for its technology development in the future.
The amount of exploration done for the available medical literature is quite less and at the same time, there is less awareness of information mining in this specific field. The accessibility of immense quantity of bi...
详细信息
The immunity of multilayer perceptron (MLP) is less effective toward input noise. In this article, we have focused on the robustness of MLP with respect to input noise where noise can be additive or multiplicative. He...
详细信息
Summarizing lengthy text involves distilling crucial information into a concise form by covering the key events in the source text. Previous researchers mostly explored the supervised approaches for the task, but due ...
详细信息
The growing realm of blockchain technology has captivated researchers and practitioners alike with its promise of decentralized, secure, and transparent transactions. This paper presents a comprehensive survey and ana...
详细信息
Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie...
详细信息
Facial image captured under uncontrolled environment often degraded by blur, noise and low-light effect which significantly affect the performance of different real life applications. To solve this problem numerous fa...
详细信息
暂无评论