Federated Learning (FL) offers significant advancements in user/data privacy, learning quality, model efficiency, scalability, and network communication latency. However, it faces notable security challenges, particul...
详细信息
ISBN:
(数字)9798350367942
ISBN:
(纸本)9798350367959
Federated Learning (FL) offers significant advancements in user/data privacy, learning quality, model efficiency, scalability, and network communication latency. However, it faces notable security challenges, particularly with the emergence of backdoor attacks. The distributed nature of FL complicates the development of backdoor-resistant systems compared to traditional machine learning environments. In this paper, we propose a novel approach to turn the perceived curse of model inversion (MI) attacks into a blessing, using them as a tool for detecting backdoor attacks in FL environments. Leveraging MI outputs, we propose a K-means-based feature extraction and Isolation-Forest-based anomaly detection algorithm to analyze behavior and detect abnormal learning performance, thereby identifying backdoor attacks. Experimental results demonstrate the effectiveness and superior performance of our method in detecting backdoor attacks within FL systems.
Mental illness is a considerable global public health problem, impacting both individual well-being and society's health. The growing popularity of social media and the increase of other data sources led to more r...
详细信息
Fitts' law is widely used as an evaluation tool for pointing or selection tasks, evolving into diverse applications, including 3D extended reality (XR) environments like virtual, augmented, and mixed reality. Desp...
详细信息
Intelligent Internet of Things (IIoT), a network paradigm, is an interconnection of intelligent edge devices, empowered by machine learning models. The recent emergence of large language models (LLMs) opens a new path...
详细信息
To reflect the nonlinear characteristics of the building structural adjustment system, an active vibration control strategy based on the nonlinear is proposed. In this method, the size of the structural control force ...
详细信息
The proliferation of Internet of Things (IoT) devices has created a ubiquitous network of interconnected sensors and devices that generate and exchange vast amounts of data. With this increased connectivity comes a pr...
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m...
详细信息
In the evolving landscape of Sri Lanka's apparel industry, the predominance of manual methods in the pre-production phase necessitates innovative technological interventions to enhance efficiency. This research ex...
详细信息
Sentiment analysis plays a crucial role in natural language processing, particularly in evaluating user comments and extracting valuable insights for classification tasks. This analysis can significantly impact custom...
详细信息
Introducing the emerging serverless paradigm into edge computing could avoid over- and under-provisioning of limited edge resources and make complex edge resource management transparent to application developers, whic...
详细信息
暂无评论