連合学習

FedFisher: Leveraging Fisher Information for One-Shot Federated Learning

Authors: Divyansh Jhunjhunwala, Shiqiang Wang, Gauri Joshi | Published: 2024-03-19
収束保証
通信効率
連合学習

Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption

Authors: Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu | Published: 2024-03-17
トレーニングプロトコル
プライバシー保護手法
連合学習

Securing Federated Learning with Control-Flow Attestation: A Novel Framework for Enhanced Integrity and Resilience against Adversarial Attacks

Authors: Zahir Alsulaimawi | Published: 2024-03-15
スケーラビリティ分析
セキュリティ分析
連合学習

Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems

Authors: Ayoub Si-ahmed, Mohammed Ali Al-Garadi, Narhimene Boustia | Published: 2024-03-14
IoMTセキュリティ
異常検出手法
連合学習

Don’t Forget What I did?: Assessing Client Contributions in Federated Learning

Authors: Bishwamittra Ghosh, Debabrota Basu, Fu Huazhu, Wang Yuan, Renuga Kanagavelu, Jiang Jin Peng, Liu Yong, Goh Siow Mong Rick, Wei Qingsong | Published: 2024-03-11
クライアント貢献評価
最適化手法
連合学習

Provable Mutual Benefits from Federated Learning in Privacy-Sensitive Domains

Authors: Nikita Tsoy, Anna Mihalkova, Teodora Todorova, Nikola Konstantinov | Published: 2024-03-11 | Updated: 2024-11-07
ポイズニング
最適化問題
連合学習

Fluent: Round-efficient Secure Aggregation for Private Federated Learning

Authors: Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang | Published: 2024-03-10
計算効率
通信効率
連合学習

Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem

Authors: Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Perez-Cruz | Published: 2024-03-06
プロンプトインジェクション
マルウェア分類
連合学習

Enhancing Security in Federated Learning through Adaptive Consensus-Based Model Update Validation

Authors: Zahir Alsulaimawi | Published: 2024-03-05
ポイズニング
連合学習
防御手法

Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks

Authors: Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti | Published: 2024-03-05
バックドア攻撃
ポイズニング
連合学習