skip to main content
review-article

Distributed computing in multi-agent systems: a survey of decentralized machine learning approaches

Published: 19 November 2024 Publication History

Abstract

At present, there is a pressing need for data scientists and academic researchers to devise advanced machine learning and artificial intelligence-driven systems that can effectively tackle forthcoming security challenges. This is due to the rapid advancement in processing capabilities of distributed client devices, as well as mounting apprehensions about the exposure of sensitive user data. This particular methodology renders the constituents of a decentralized machine learning paradigm private and allocates them to a diverse array of remote client apparatuses. Following this, a primary controller clusters the extracted machine learning data. This process effectively transforms a centrally controlled machine learning procedure into a distributed one, leading to significant potential benefits. Regrettably, the implementation of a progressive strategy for networked machine learning poses additional obstacles to the preservation of user data confidentiality and cyber-security apprehensions. The present endeavor aims to scrutinize the plausible hazards that decentralized machine learning may engender for the security and confidentiality of user data, as well as their well-being, through the lens of data transmission thresholds. These risks are contingent upon the salient stages of a machine learning model. The aforementioned procedures include: (i) establishing thresholds for raw data prior to processing; (ii) establishing thresholds for the learning framework; (iii) establishing thresholds for the obtained information; and (iv) establishing thresholds for the provisional outcome. We conducted a comprehensive analysis of state-of-the-art hacking methodologies, evaluating their potential vulnerabilities at every stage of the transaction, and subsequently deliberated on practical solutions to address these issues. Ultimately, the survey culminates in an exposition of the obstacles and prospects that confront researchers in this intricate realm.

References

[1]
Pyzer-Knapp EO, Pitera JW, Staar PW, Takeda S, Laino T, Sanders DP, Sexton J, Smith JR, and Curioni A Accelerating materials discovery using artificial intelligence, high performance computing and robotics NPJ Comput Mater 2022 8 1 1-9
[2]
Sen S, Agarwal S, Chakraborty P, and Singh KP Astronomical big data processing using machine learning: a comprehensive review Exp Astron 2022 53 1-43
[3]
Alam A, Aziz AE, Basit A, Ahmed I, Nasir AA, Khalid M (2024) Cooperative non-orthogonal multiple access-based visible light communication strategy for power-constrained inter-satellite links. IEEE Access
[4]
Shao C, Yang Y, Juneja S, and GSeetharam T Iot data visualization for business intelligence in corporate finance Inf Process Manag 2022 59 1
[5]
Ma C, Li J, Shi L, Ding M, Wang T, Han Z, and Poor HV When federated learning meets blockchain: a new distributed learning paradigm IEEE Comput Intell Mag 2022 17 3 26-33
[6]
Zou T, Liu Y, Kang Y, Liu W, He Y, Yi Z, Yang Q, Zhang Y-Q (2022) Defending batch-level label inference and replacement attacks in vertical federated learning. IEEE Trans Big Data
[7]
Iqbal F, Rehan M, Hussain M, Ahmed I, and Khalid M Multi-objective optimal antiwindup compensation of discrete-time nonlinear systems under input saturation Arab J Sci Eng 2024 49 1-15
[8]
Yarradoddi S, Gadekallu TR (2022) Federated learning role in big data, jot services and applications security, privacy and trust in jot a survey. In: Trust, security and privacy for big data. CRC Press, pp 28–49
[9]
Treleaven P, Smietanka M, and Pithadia H Federated learning: the pioneering distributed machine learning and privacy-preserving data technology Computer 2022 55 4 20-29
[10]
Nti IK, Quarcoo JA, Aning J, and Fosu GK A mini-review of machine learning in big data analytics: applications, challenges, and prospects Big Data Min Anal 2022 5 2 81-97
[11]
Tajabadi M, Martin R, Heider D (2024) Privacy-preserving decentralized learning methods for biomedical applications. Comput Struct Biotechnol J
[12]
Lin H, Han J, Wu P, Wang J, Tu J, Tang H, and Zhu L Machine learning and human-machine trust in healthcare: a systematic survey CAAI Trans Intell Technol 2024 9 2 286-302
[13]
Aboukadri S, Ouaddah A, Mezrioui A (2024) Machine learning in identity and access management systems: survey and deep dive. Comput Secur 103729
[14]
Aminizadeh S, Heidari A, Dehghan M, Toumaj S, Rezaei M, Navimipour NJ, Stroppa F, and Unal M Opportunities and challenges of artificial intelligence and distributed systems to improve the quality of healthcare service Artif Intell Med 2024 149
[15]
Schmitt M Securing the digital world: protecting smart infrastructures and digital industries with artificial intelligence (ai)-enabled malware and intrusion detection J Ind Inf Integr 2023 36
[16]
Schmitt M Automated machine learning: Ai-driven decision making in business analytics Intell Syst Appl 2023 18
[17]
Ahmad H, Gulzar MM, Aziz S, Habib S, Ahmed I (2024) Ai-based anomaly identification techniques for vehicles communication protocol systems: comprehensive investigation, research opportunities and challenges. Internet of Things 101245
[18]
Ahmed I, Asif M, Alhelou HH, Khalid M et al (2024) A review on enhancing energy efficiency and adaptability through system integration for smart buildings. J Build Eng 109354
[19]
Sreedevi A, Harshitha TN, Sugumaran V, and Shankar P Application of cognitive computing in healthcare, cybersecurity, big data and iot: A literature review Inf Process Manag 2022 59 2
[20]
Ali PR, Rehan M, Ahmed W, Basit A, and Ahmed I A novel output feedback consensus control approach for generic linear multi-agent systems under input saturation over a directed graph topology ISA Trans 2024 148 128-139
[21]
Perera C, Ranjan R, Wang L, Khan SU, and Zomaya AY Big data privacy in the internet of things era IT Professional 2015 17 3 32-39
[22]
Hajjaji Y, Boulila W, Farah IR, Romdhani I, and Hussain A Big data and iot-based applications in smart environments: a systematic review Comput Sci Rev 2021 39
[23]
Alferidah DK and Jhanjhi N A review on security and privacy issues and challenges in internet of things Int J Comput Sci Netw Secur IJCSNS 2020 20 4 263-286
[24]
Lian X, Zhang C, Zhang H, Hsieh C-J, Zhang W, Liu J (2017) Can decentralized algorithms outperform centralized algorithms? a case study for decentralized parallel stochastic gradient descent. Adv Neural Inf Process Syst 30
[25]
Wahab OA, Mourad A, Otrok H, and Taleb T Federated machine learning: survey, multi-level classification, desirable criteria and future directions in communication and networking systems IEEE Commun Surv Tutor 2021 23 2 1342-1397
[26]
Ahmed I, Rehan M, Iqbal N, Basit A, and Khalid M Free-weighting matrix approach for event-triggered cooperative control of generic linear multi-agent systems: an application for uavs Arab J Sci Eng 2024 49 5 6761-6772
[27]
Zhang K, Yang Z, and Başar T Decentralized multi-agent reinforcement learning with networked agents: recent advances Front Inf Technol Electro Eng 2021 22 6 802-814
[28]
Mustafa FE, Ahmed I, Basit A, Alqahtani M, and Khalid M An adaptive metaheuristic optimization approach for tennessee eastman process for an industrial fault tolerant control system PLoS ONE 2024 19 2 0296471
[29]
Li G, Ota K, Dong M, Wu J, and Li J Desvig: decentralized swift vigilance against adversarial attacks in industrial artificial intelligence systems IEEE Trans Industr Inf 2019 16 5 3267-3277
[30]
Sun M and Tay WP On the relationship between inference and data privacy in decentralized iot networks IEEE Trans Inf For Secur 2019 15 852-866
[31]
Ahmed I, Rehan M, Basit A, Al-Ismail FS, Khalid M (2024) Consensus and clustering approach for dynamic event-triggered distributed optimization of power system networks with saturation constraint approche de consensus et de regroupement pour l’optimisation dynamique distribuée déclenchée par les événements des réseaux électriques avec contrainte de saturation. IEEE Can J Electr Comput Eng
[32]
Qu Y, Gao L, Luan TH, Xiang Y, Yu S, Li B, and Zheng G Decentralized privacy using blockchain-enabled federated learning in fog computing IEEE Internet Things J 2020 7 6 5171-5183
[33]
Li J, Shao Y, Wei K, Ding M, Ma C, Shi L, Han Z, and Poor HV Blockchain assisted decentralized federated learning (blade-fl): performance analysis and resource allocation IEEE Trans Parallel Distrib Syst 2021 33 10 2401-2415
[34]
Khalid M, Ahmed I, AlMuhaini M, and Savkin AV A novel computational paradigm for scheduling of hybrid energy networks considering renewable uncertainty limitations Energy Rep 2024 11 1959-1978
[35]
Briggs C, Fan Z, Andras P (2021) A review of privacy-preserving federated learning for the internet-of-things. Federated Learn Syst 21–50
[36]
Amiri-Zarandi M, Dara RA, and Fraser E A survey of machine learning-based solutions to protect privacy in the internet of things Comput Secur 2020 96
[37]
Amanullah MA, Habeeb RAA, Nasaruddin FH, Gani A, Ahmed E, Nainar ASM, Akim NM, and Imran M Deep learning and big data technologies for iot security Comput Commun 2020 151 495-517
[38]
Gong M, Xie Y, Pan K, Feng K, and Qin AK A survey on differentially private machine learning IEEE Comput Intell Mag 2020 15 2 49-64
[39]
Verbraeken J, Wolting M, Katzy J, Kloppenburg J, Verbelen T, and Rellermeyer JS A survey on distributed machine learning Acm Comput Surv (csur) 2020 53 2 1-33
[40]
Enthoven D, Al-Ars Z (2021) An overview of federated deep learning privacy attacks and defensive strategies. Federated Learn Syst 173–196
[41]
De Cristofaro E A critical overview of privacy in machine learning IEEE Secur Privacy 2021 19 4 19-27
[42]
Wang Y, Tang T, Xu Y, Bai Y, Yin L, Li G, Zhang H, Liu H, and Huang Y All-weather, natural silent speech recognition via machine-learning-assisted tattoo-like electronics npj Flexible Electron 2021 5 1 1-9
[43]
Radaideh MI, Pappas C, and Cousineau S Real electronic signal data from particle accelerator power systems for machine learning anomaly detection Data Brief 2022 43
[44]
Lu Z Computational discovery of energy materials in the era of big data and machine learning: a critical review Mater Rep Energy 2021 1 3
[45]
Hashem IA, Siddiqa A, Alaba FA, Bilal M, Alhashmi SM (2024) Distributed intelligence for iot-based smart cities: a survey. Neural Comput Appl 1–36
[46]
Teo ZL, Jin L, Li S, Miao D, Zhang X, Ng WY, Tan TF, Lee DM, Chua KJ, Heng J, et al (2024) Federated machine learning in healthcare: a systematic review on clinical applications and technical architecture. Cell Repo Med
[47]
Fazel E, Nezhad MZ, Rezazadeh J, Moradi M, Ayoade J (2024) Iot convergence with machine learning & blockchain: a review. Internet Things 101187
[48]
Zhao X, Papagelis M, An A, Chen BX, Liu J, and Hu Y Zipline: an optimized algorithm for the elastic bulk synchronous parallel model Mach Learn 2021 110 10 2867-2903
[49]
Ahmed I, Alvi U-E-H, Basit A, Khursheed T, Alvi A, Hong K-S, and Rehan M A novel hybrid soft computing optimization framework for dynamic economic dispatch problem of complex non-convex contiguous constrained machines PLoS ONE 2022 17 1 0261709
[50]
Alvi U-E, Ahmed W, Rehan M, Ahmed S, Ahmad R, Ahmed I, et al (2022) A novel incremental cost consensus approach for distributed economic dispatch over directed communication topologies in a smart grid. Soft Comput 1–16
[51]
Ahmed I, Rao AR, Shah A, Alamzeb E, Khan JA (2014) Performance of various metaheuristic techniques for economic dispatch problem with valve point loading effects and multiple fueling options. Adv Electr Eng 2014
[52]
Ahmed I, Rehan M, Hong K-S, Basit A (2022) A consensus-based approach for economic dispatch considering multiple fueling strategy of electricity production sector over a smart grid. In: 2022 13th Asian control conference (ASCC). IEEE, pp 1196–1201
[53]
Ahmed I, Khan R, Ali F. Metaheuristic techniqes for power economic dispatch of units with valve-point effects and multiple fuels
[54]
Ahmed I, Rehan M, Basit A, Malik SH, Hong K-S, et al. Multi-area economic emission dispatch for large-scale multi-fueled power plants contemplating inter-connected grid tie-lines power flow limitations Energy 2022 261
[55]
Ahmed I, Basit A, Rehan M, Hong K-S, et al. Multi-objective whale optimization approach for cost and emissions scheduling of thermal plants in energy hubs Energy Rep 2022 8 9158-9174
[56]
Ahmed I, Rehan M, Basit A, and Hong K-S Greenhouse gases emission reduction for electric power generation sector by efficient dispatching of thermal plants integrated with renewable systems Sci Rep 2022 12 1 1-21
[57]
Sun H, Gui Z, Guo S, Qi Q, Wang J, Liao J (2021) Gssp: eliminating stragglers through grouping synchronous for distributed deep learning in heterogeneous cluster. IEEE Trans Cloud Comput
[58]
Xiao D, Li X, Zhou J, Du Y, and Wu W Iteration number-based hierarchical gradient aggregation for distributed deep learning J Supercomput 2022 78 4 5565-5587
[59]
Khan T, Tian W, Zhou G, Ilager S, Gong M, Buyya R (2022) Machine learning (ml)–centric resource management in cloud computing: a review and future directions. J Netw Comput Appl 103405
[60]
Banabilah S, Aloqaily M, Alsayed E, Malik N, and Jararweh Y Federated learning review: fundamentals, enabling technologies, and future applications Inf Process Manag 2022 59 6
[61]
Pham Q-V, Zeng M, Huynh-The T, Han Z, and Hwang W-J Aerial access networks for federated learning: applications and challenges IEEE Netw 2022 36 3 159-166
[62]
Ghimire B, Rawat DB (2022) Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things. IEEE Internet Things J
[63]
Zawad S, Yan F, Anwar A (2022) Introduction to federated learning systems. In: Federated learning. Springer, pp 195–212
[64]
Feng S Vertical federated learning-based feature selection with non-overlapping sample utilization Expert Syst Appl 2022 208
[65]
Lee H, Kim J, Ahn S, Hussain R, Cho S, and Son J Digestive neural networks: a novel defense strategy against inference attacks in federated learning Comput Secur 2021 109
[66]
Gao J, Hou B, Guo X, Liu Z, Zhang Y, Chen K, Li J (2021) Secure aggregation is insecure: category inference attack on federated learning. IEEE Trans Depend Secure Comput
[67]
Sun J, Li A, DiValentin L, Hassanzadeh A, Chen Y, and Li H Fl-wbc: enhancing robustness against model poisoning attacks in federated learning from a client perspective Adv Neural Inf Process Syst 2021 34 12613-12624
[68]
Samikwa E, Di Maio A, Braun T (2022) Ares: aaptive resource-aware split learning for internet of things. Comput Netw 109380
[69]
Kwak Y, Yun WJ, Kim JP, Cho H, Park J, Choi M, Jung S, Kim J (2022) Quantum distributed deep learning architectures: models, discussions, and applications. ICT Express
[70]
Chen M-S, Lin J-Q, Li X-L, Liu B-Y, Wang C-D, Huang D, Lai J-H (2022) Representation learning in multi-view clustering: a literature review. Data Sci Eng 1–17
[71]
Yuan C, Wu Y, Qin X, Qiao S, Pan Y, Huang P, Liu D, and Han N An effective image classification method for shallow densely connected convolution networks through squeezing and splitting techniques Appl Intell 2019 49 10 3570-3586
[72]
Kim J, Park Y, Kim G, Hwang SJ (2017) Splitnet: Learning to semantically split deep networks for parameter reduction and model parallelization. In: International conference on machine learning. PMLR, pp 1866–1874
[73]
Weng J, Su S, Fan X (2022) Two-stage clustering for federated learning with pseudo mini-batch sgd training on non-iid data. In: CCF conference on computer supported cooperative work and social computing. Springer, pp 29–43
[74]
Zhu W, Tang Y (2021) Dalu: adaptive learning rate update in distributed deep learning. In: 2021 IEEE smartworld, ubiquitous intelligence & computing, advanced & trusted computing, scalable computing & communications, internet of people and smart city innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI). IEEE, pp 203–209
[75]
Li J, Li P, Liu Z, Chen X, Li T (2022) Secure distributed learning. In: Privacy-preserving machine learning. Springer, pp 47–56
[76]
Dogru O, Velswamy K, and Huang B Actor-critic reinforcement learning and application in developing computer-vision-based interface tracking Engineering 2021 7 9 1248-1261
[77]
Hafiz A (2023) A survey of deep q-networks used for reinforcement learning: state of the art. Intell Commun Technol Virtual Mob Netw 393–402
[78]
Basit A, Tufail M, Rehan M, Ahmed W, Radwan A, Ahmed I (2024) Event-based secure filtering under two-channel stochastic attacks and switching topologies over wireless sensor networks. IEEE Trans Netw Sci Eng
[79]
Ahmed I, Basit A, Rehan M, Ali A, Maaruf M, Khalid M (2024) A resilient consensus-based energy 5.0 framework for micro-grids under ramp-rate constraints and stochastic fdi attacks. In: 2024 IEEE international conference on industrial technology (ICIT). IEEE, pp 1–6
[80]
Li Y, Pan Q, Cambria E (2022) Deep-attack over the deep reinforcement learning. Knowl-Based Syst 108965
[81]
Wei X, Yan H, and Li B Sparse black-box video attack with reinforcement learning Int J Comput Vis 2022 130 6 1459-1473
[82]
Xu X, Hu H, Liu Y, Tan J, Zhang H, Song H (2022) Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack. Digital Commun Netw
[83]
Hu H, Salcic Z, Sun L, Dobbie G, Yu PS, and Zhang X Membership inference attacks on machine learning: a survey ACM Comput Surv (CSUR) 2022 54 11s 1-37
[84]
Ma T, Xu C, Yang S, Huang Y, Kuang X, Tang H, and Grieco LA An intelligent proactive defense against the client-side dns cache poisoning attack via self-checking deep reinforcement learning Int J Intell Syst 2022 37 10 8170-8197
[85]
Chen J, Gao Y, Shan J, Peng K, Wang C, Jiang H (2022) Manipulating supply chain demand forecasting with targeted poisoning attacks. IEEE Trans Ind Inform
[86]
Tian Z, Cui L, Liang J, Yu S (2022) A comprehensive survey on poisoning attacks and countermeasures in machine learning. ACM Comput Surv (CSUR)
[87]
Gomathi B, Uma J (2022) Adversarial attacks and defenses against deep learning in cybersecurity. In: Society 5.0 and the future of emerging computational technologies. CRC Press, pp 281–296
[88]
Chen H, Zhang W, Liu K, Chen K, Fang H, Yu N (2022) Speech pattern based black-box model watermarking for automatic speech recognition. In: ICASSP 2022-2022 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 3059–3063
[89]
Zhang L, Jiang C, and Pang A Black-box attacks and defense for dnn-based power quality classification in smart grid Energy Rep 2022 8 12203-12214
[90]
Khosravy M, Nakamura K, Hirose Y, Nitta N, and Babaguchi N Model inversion attack by integration of deep generative models: privacy-sensitive face generation from a face recognition system IEEE Trans Inf For Secur 2022 17 357-372
[91]
Xu Q, Arafin MT, Qu G (2022) An approximate memory based defense against model inversion attacks to neural networks. IEEE Trans Emerg Top Comput
[92]
Shokri R, Stronati M, Song C, Shmatikov V (2017) Membership inference attacks against machine learning models. In: 2017 IEEE symposium on security and privacy (SP). IEEE, pp 3–18
[93]
Park C, Hong D, and Seo C An attack-based evaluation method for differentially private learning against model inversion attack IEEE Access 2019 7 124988-124999
[94]
Shi Y, Sagduyu Y (2022) Membership inference attack and defense for wireless signal classifiers with deep learning. IEEE Trans Mobile Comput
[95]
Nasr M, Shokri R, Houmansadr A (2019) Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. In: 2019 IEEE symposium on security and privacy (SP). IEEE, pp 739–753
[96]
Kasyap H and Tripathy S Privacy-preserving decentralized learning framework for healthcare system ACM Trans Multimedia Comput Commun Appl (TOMM) 2021 17 2s 1-24
[97]
Chen T, Ling J, and Sun Y White-box content camouflage attacks against deep learning Comput Secur 2022 117
[98]
Qi P, Jiang T, Wang L, Yuan X, Li Z (2022) Detection tolerant black-box adversarial attack against automatic modulation classification with deep learning. IEEE Trans Reliab
[99]
Oliynyk D, Mayer R, Rauber A (2022) I know what you trained last summer: a survey on stealing machine learning models and defences. arXiv preprint arXiv:2206.08451
[100]
Lindell Y Secure multiparty computation Commun ACM 2020 64 1 86-96
[101]
Wood A, Najarian K, and Kahrobaei D Homomorphic encryption for machine learning in medicine and bioinformatics ACM Comput Surv (CSUR) 2020 53 4 1-35
[102]
Ma X, Zhang F, Chen X, and Shen J Privacy preserving multi-party computation delegation for deep learning in cloud computing Inf Sci 2018 459 103-116
[103]
Liu J, Tian Y, Zhou Y, Xiao Y, and Ansari N Privacy preserving distributed data mining based on secure multi-party computation Comput Commun 2020 153 208-216
[104]
Hastings M, Hemenway B, Noble D, Zdancewic S (2019) Sok: general purpose compilers for secure multi-party computation. In: 2019 IEEE symposium on security and privacy (SP). IEEE, pp 1220–1237
[105]
Vu D-H, Luong T-D, and Ho T-B An efficient approach for secure multi-party computation without authenticated channel Inf Sci 2020 527 356-368
[106]
Knott B, Venkataraman S, Hannun A, Sengupta S, Ibrahim M, and Maaten L Crypten: secure multi-party computation meets machine learning Adv Neural Inf Process Syst 2021 34 4961-4973
[107]
Wang Y, Li T, Qin H, Li J, Gao W, Liu Z, and Xu Q A brief survey on secure multi-party computing in the presence of rational parties J Ambient Intell Humaniz Comput 2015 6 6 807-824
[108]
Lindell Y (2003) Composition of secure multi-party protocols: a comprehensive study. vol 2815. Springer
[109]
Canetti R (2013) Security and composition of cryptographic protocols: a tutorial. Secure Multi-Party Comput 61–119
[110]
Joseph A (2018) A framework for efficient secure three-party computation. PhD thesis, Indian Institute of Science Bangalore
[111]
Dong C, Weng J, Liu J-N, Yang A, Zhiquan L, Yang Y, Ma J (2022) Maliciously secure and efficient large-scale genome-wide association study with multi-party computation. IEEE Trans Depend Secure Comput
[112]
Blanton M, Kang A, Yuan C (2020) Improved building blocks for secure multi-party computation based on secret sharing with honest majority. In: International conference on applied cryptography and network security. Springer, pp 377–397
[113]
Ziller A, Trask A, Lopardo A, Szymkow B, Wagner B, Bluemke E, Nounahon J-M, Passerat-Palmbach J, Prakash K, Rose N et al (2021) Pysyft: a library for easy federated learning. In: Federated learning systems. Springer, pp 111–139
[114]
Acar A, Aksu H, Uluagac AS, and Conti M A survey on homomorphic encryption schemes: theory and implementation ACM Comput Surv (Csur) 2018 51 4 1-35
[115]
Hosseini E, Khisti A (2021) Secure aggregation in federated learning via multiparty homomorphic encryption. In: 2021 IEEE globecom workshops (GC Wkshps). IEEE, pp 1–6
[116]
Yousuf H, Lahzi M, Salloum SA, Shaalan K (2021) Systematic review on fully homomorphic encryption scheme and its application. Recent Adv Intell Syst Smart Appl 537–551
[117]
Peralta G, Cid-Fuentes RG, Bilbao J, and Crespo PM Homomorphic encryption and network coding in iot architectures: advantages and future challenges Electronics 2019 8 8 827
[118]
Ogburn M, Turner C, and Dahal P Homomorphic encryption Procedia Comput Sci 2013 20 502-509
[119]
Li S, Ngai E, Voigt T (2021) Byzantine-robust aggregation in federated learning empowered industrial iot. IEEE Trans Ind Inform
[120]
Xu C, Jia Y, Zhu L, Zhang C, Jin G, Sharif K (2022) Tdfl: Truth discovery based byzantine robust federated learning. IEEE Trans Parallel Distrib Syst
[121]
Jin R, Hu J, Min G, and Lin H Byzantine-robust and efficient federated learning for the internet of things IEEE Internet Things Magn 2022 5 1 114-118
[122]
Rawat A, Zizzo G, Hameed MZ, Muñoz-González L (2022) Security and robustness in federated learning. In: Federated learning. Springer, pp 363–390
[123]
Ma X, Sun X, Wu Y, Liu Z, Chen X, Dong C (2022) Differentially private byzantine-robust federated learning. IEEE Trans Parallel Distrib Syst
[124]
He Y, Chen Y, Yang X, Yu H, Huang Y-H, Gu Y (2022) Learning critically: Selective self-distillation in federated learning on non-iid data. IEEE Trans Big Data
[125]
Taya A, Nishio T, Morikura M, Yamamoto K (2022) Decentralized and model-free federated learning: Consensus-based distillation in function space. IEEE Trans Signal Inf Process Netw
[126]
Gorsline M, Smith J, Merkel C (2021) On the adversarial robustness of quantized neural networks. In: Proceedings of the 2021 on great lakes symposium on VLSI, pp 189–194
[127]
Sachdeva S and Ali A Machine learning with digital forensics for attack classification in cloud network environment Int J Syst Assur Eng Manag 2022 13 1 156-165
[128]
Regazzoni F, Palmieri P, Smailbegovic F, Cammarota R, and Polian I Protecting artificial intelligence ips: a survey of watermarking and fingerprinting for machine learning CAAI Trans Intell Technol 2021 6 2 180-191
[129]
Basit A, Tufail M, Hong K-S, Rehan M, Ahmed I (2022) Event-triggered distributed exponential h observers design for discrete-time nonlinear systems over wireless sensor networks. In: 2022 13th Asian control conference (ASCC), pp 1730–1735.
[130]
Ahmed I, Rehan M, Hong K-S, Basit A (2022) Event-triggered leaderless robust consensus control of nonlinear multi-agents under disturbances. In: 2022 13th Asian control conference (ASCC), pp 1736–1741.
[131]
Ahmed I, Rehan M, Hong K-S, Basit A (2022) A consensus-based approach for economic dispatch considering multiple fueling strategy of electricity production sector over a smart grid. In: 2022 13th Asian control conference (ASCC), pp 1196–1201.
[132]
Ahmed I, Rehan M, and Iqbal N A novel exponential approach for dynamic event-triggered leaderless consensus of nonlinear multi-agent systems over directed graphs IEEE Trans Circuits Syst II Express Briefs 2022 69 3 1782-1786
[133]
Ardizzon F, Diamant R, Casari P, Tomasin S (2022) Machine learning-based distributed authentication of uwan nodes with limited shared information. In: 2022 Sixth underwater communications and networking conference (UComms). IEEE, pp 1–5
[134]
Deng L, Li G, Han S, Shi L, and Xie Y Model compression and hardware acceleration for neural networks: a comprehensive survey Proc IEEE 2020 108 4 485-532
[135]
Filho CP, Marques E Jr, Chang V, Dos Santos L, Bernardini F, Pires PF, Ochi L, and Delicato FC A systematic literature review on distributed machine learning in edge computing Sensors 2022 22 7 2665
[136]
Wang J, Cao B, Yu P, Sun L, Bao W, Zhu X (2018) Deep learning towards mobile applications. In: 2018 IEEE 38th international conference on distributed computing systems (ICDCS). IEEE, pp 1385–1393
[137]
Huang L, Zhang Z, Du Z, Li S, Zheng H, Xie Y, and Tan N Epquant: a graph neural network compression approach based on product quantization Neurocomputing 2022 503 49-61
[138]
Harris D, Rinberg A, and Rottenstreich O Compressing distributed network sketches with traffic-aware summaries IEEE Trans Netw Serv Manag 2022
[139]
Zhou Q, Qu Z, Guo S, Luo B, Guo J, Xu Z, and Akerkar R On-device learning systems for edge intelligence: a software and hardware synergy perspective IEEE Internet Things J 2021 8 15 11916-11934
[140]
Tekalp AM, Covell M, Timofte R, and Dong C Editorial: Introduction to the issue on deep learning for image/video restoration and compression IEEE J Sel Top Signal Process 2021 15 2 157-161
[141]
Chen Y, Hu SX, Shen X, Ai C, Suykens JAK (2022) Compressing features for learning with noisy labels. IEEE Trans Neural Netw Learn Syst 1–15.
[142]
Wei K, Li J, Ma C, Ding M, Chen C, Jin S, Han Z, and Poor HV Low-latency federated learning over wireless channels with differential privacy IEEE J Sel Areas Commun 2022 40 1 290-307
[143]
Ma C, Yuan L, Han L, Ding M, Bhaskar R, and Li J Data level privacy preserving: a stochastic perturbation approach based on differential privacy IEEE Trans Knowl Data Eng 2021
[144]
Yan H, Li X, Li H, Li J, Sun W, and Li F Monitoring-based differential privacy mechanism against query flooding-based model extraction attack IEEE Trans Dependable Secure Comput 2022 19 4 2680-2694
[145]
Liu B, Ding M, Shaham S, Rahayu W, Farokhi F, and Lin Z When machine learning meets privacy: a survey and outlook ACM Comput Surv (CSUR) 2021 54 2 1-36
[146]
Liu Y, Wen R, He X, Salem A, Zhang Z, Backes M, De Cristofaro E, Fritz M, Zhang Y (2022) {ML-Doctor}: Holistic risk assessment of inference attacks against machine learning models. In: 31st USENIX security symposium (USENIX Security 22), pp 4525–4542
[147]
Kumová V, Pilát M (2021) Beating white-box defenses with black-box attacks. In: 2021 International joint conference on neural networks (IJCNN). IEEE, pp 1–8
[148]
Wang K, Yuan F, Zhao L, Hou R, Ji Z, and Meng D Secure hybrid replacement policy: mitigating conflict-based cache side channel attacks Microprocess Microsyst 2022 89
[149]
Wang Q, Yang H, Wu G, Choo K-KR, Zhang Z, Miao G, and Ren Y Black-box adversarial attacks on xss attack detection model Comput Secur 2022 113
[150]
Chen J, Wang X, Zhang Y, Zheng H, Yu S, Bao L (2022) Agent manipulator: stealthy strategy attacks on deep reinforcement learning. Appl Intell 1–28
[151]
Wu B, Zhong L, Li H, and Ye Y Efficient complementary graph convolutional network without negative sampling for item recommendation Knowl-Based Syst 2022 256
[152]
Naseer M, Khan S, Hayat M, Khan FS, Porikli F (2022) Stylized adversarial defense. IEEE Trans Pattern Anal Mach Intell
[153]
Ni C, Cang LS, Gope P, and Min G Data anonymization evaluation for big data and iot environment Inf Sci 2022 605 381-392
[154]
Hossayni H, Khan I, and Crespi N Data anonymization for maintenance knowledge sharing IT Prof 2021 23 5 23-30
[155]
Cai Z, Xiong Z, Xu H, Wang P, Li W, and Pan Y Generative adversarial networks: a survey toward private and secure applications ACM Comput Surv (CSUR) 2021 54 6 1-38
[156]
Maximov M, Elezi I, Leal-Taixé L (2020) Ciagan: Conditional identity anonymization generative adversarial networks. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 5447–5456
[157]
Khan P, Khan Y, Kumar S (2021) Single identity clustering-based data anonymization in healthcare. In: Computationally intelligent systems and their applications. Springer, pp 1–9
[158]
Ito S, Kikuchi H (2022) Estimation of cost of k–anonymity in the number of dummy records. J Ambient Intell Hum Comput 1–10
[159]
Kotal A, Piplai A, Chukkapalli SSL, Joshi A (2022) Privetab: Secure and privacy-preserving sharing of tabular data. In: Proceedings of the 2022 ACM on international workshop on security and privacy analytics, pp 35–45
[160]
Nasr M, Songi S, Thakurta A, Papernot N, Carlin N (2021) Adversary instantiation: Lower bounds for differentially private machine learning. In: 2021 IEEE symposium on security and privacy (SP). IEEE, pp 866–882
[161]
Shang F, Xu T, Liu Y, Liu H, Shen L, and Gong M Differentially private admm algorithms for machine learning IEEE Trans Inf For Secur 2021 16 4733-4745
[162]
Wei K, Li J, Ma C, Ding M, Poor HV (2021) Differentially private federated learning: algorithm, analysis and optimization. In: Federated learning systems. Springer, pp 51–78
[163]
Wang T, Zhao J, Hu Z, Yang X, Ren X, and Lam K-Y Local differential privacy for data collection and analysis Neurocomputing 2021 426 114-133
[164]
Froelicher D, Troncoso-Pastoriza JR, Pyrgelis A, Sav S, Sousa JS, Bossuat J-P, and Hubaux J-P Scalable privacy-preserving distributed learning Proc Privacy Enhanc Technol 2021 2021 2 323-347
[165]
Luo S, Fan P, Li K, Xing H, Luo L, Yu H (2022) Fast parameter synchronization for distributed learning with selective multicast. In: ICC 2022-IEEE international conference on communications. IEEE, pp 4775–4780
[166]
Zhang R and Zhu Q A game-theoretic approach to design secure and resilient distributed support vector machines IEEE Trans Neural Netw Learn Syst 2018 29 11 5512-5527
[167]
Savazzi S, Nicoli M, Bennis M, Kianoush S, and Barbieri L Opportunities of federated learning in connected, cooperative, and automated industrial systems IEEE Commun Mag 2021 59 2 16-21
[168]
Yang M, Qian H, Wang X, Zhou Y, and Zhu H Client selection for federated learning with label noise IEEE Trans Veh Technol 2021 71 2 2193-2197
[169]
Zheng J, Chan PP, Chi H, He Z (2022) A concealed poisoning attack to reduce deep neural networks’ robustness against adversarial samples. Inf Sci
[170]
Castillo J (2022) Blockchain: A decentralized solution for secure applications. PhD thesis, UNIVERSITY OF TEXAS AT SAN ANTONIO
[171]
Dahmane S, Yagoubi MB, Kerrache CA, Lorenz P, Lagraa N, and Lakas A Toward a secure edge-enabled and artificially intelligent internet of flying things using blockchain IEEE Internet Things Magn 2022 5 2 90-95
[172]
Rodríguez-Barroso N, Martínez-Cámara E, Luzón MV, and Herrera F Backdoor attacks-resilient aggregation based on robust filtering of outliers in federated learning for image classification Knowl-Based Syst 2022 245
[173]
Mukherjee S, Xu Y, Trivedi A, Patowary N, and Ferres JL privgan: protecting gans from membership inference attacks at low cost to utility Proc Priv Enhanc Technol 2021 2021 3 142-163
[174]
De Cristofaro E A critical overview of privacy in machine learning IEEE Secur Privacy 2021 19 4 19-27
[175]
Liu L, Wang Y, Liu G, Peng K, Wang C (2022) Membership inference attacks against machine learning models via prediction sensitivity. IEEE Trans Depend Secure Comput
[176]
Subramanian J, Sinha A, Seraj R, and Mahajan A Approximate information state for approximate planning and reinforcement learning in partially observed systems J Mach Learn Res 2022 23 12-1
[177]
Oroojlooyjadid A, Nazari M, Snyder LV, and Takáč M A deep q-network for the beer game: deep reinforcement learning for inventory optimization Manuf Serv Oper Manag 2022 24 1 285-304
[178]
Huang L, Wei S, Gao C, Liu N (2022) Cyclical adversarial attack pierces black-box deep neural networks. Pattern Recogn 108831
[179]
Pavlidis A, Faehn E, Louërat M-M, Stratigopoulos H-G (2022) Run-time hardware trojan detection in analog and mixed-signal ics. In: 40th IEEE VLSI test symposium 2022
[180]
Sethi K, Madhav YV, Kumar R, and Bera P Attention based multi-agent intrusion detection systems using reinforcement learning J Inf Secur Appl 2021 61
[181]
Jafari M, Rahman MA, Paudyal S (2022) Optimal false data injection attacks against power system frequency stability. IEEE Trans Smart Grid
[182]
Barua A, Al Alamin MA, Hossain MS, Hossain E (2022) Security and privacy threats for bluetooth low energy in iot and wearable devices: a comprehensive survey. IEEE Open J Commun Soc
[183]
Lee XY, Esfandiari Y, Tan KL, Sarkar S (2021) Query-based targeted action-space adversarial policies on deep reinforcement learning agents. In: Proceedings of the ACM/IEEE 12th international conference on cyber-physical systems, pp 87–97
[184]
García J and Sagredo I Instance-based defense against adversarial attacks in deep reinforcement learning Eng Appl Artif Intell 2022 107
[185]
Suya F, Chi J, Evans D, Tian Y (2020) Hybrid batch attacks: Finding black-box adversarial examples with limited queries. In: 29th USENIX security symposium (USENIX Security 20), pp 1327–1344
[186]
Wang X, Cai M, Sohel F, Sang N, and Chang Z Adversarial point cloud perturbations against 3d object detection in autonomous driving systems Neurocomputing 2021 466 27-36
[187]
Bharath Kumar D, Kumar N, Dunston SD, Rajam V (2022) Analysis of the impact of white box adversarial attacks in resnet while classifying retinal fundus images. In: International conference on computational intelligence in data science. Springer, pp 162–175
[188]
Wang Z, Ma J, Wang X, Hu J, Qin Z, Ren K (2022) Threats to training: a survey of poisoning attacks and defenses on machine learning systems. ACM J ACM (JACM)
[189]
Sheatsley R, Papernot N, Weisman MJ, Verma G, McDaniel P (2022) Adversarial examples for network intrusion detection systems. J Comput Secur (Preprint), 1–26
[190]
Alpdemir MN Tactical uav path optimization under radar threat using deep reinforcement learning Neural Comput Appl 2022 34 7 5649-5664
[191]
Alavizadeh H, Jang-Jaccard J, Enoch SY, Al-Sahaf H, Welch I, Camtepe SA, Kim DD (2022) A survey on cyber situation awareness systems: framework, techniques, and insights. ACM Comput Surv (CSUR)
[192]
Sewak M, Sahay SK, Rathore H (2022) Deep reinforcement learning in the advanced cybersecurity threat detection and protection. Inf Syst Front 1–23
[193]
Pessach D and Shmueli E A review on fairness in machine learning ACM Comput Surv (CSUR) 2022 55 3 1-44
[194]
Guo Y, Zhou Y, and Zhang Z Fault diagnosis of multi-channel data by the cnn with the multilinear principal component analysis Measurement 2021 171
[195]
Liu J, Huang J, Zhou Y, Li X, Ji S, Xiong H, Dou D (2022) From distributed machine learning to federated learning: a survey. Knowl Inf Syst 1–33
[196]
Hu Y, Chen M, Saad W, Poor HV, and Cui S Distributed multi-agent meta learning for trajectory design in wireless drone networks IEEE J Sel Areas Commun 2021 39 10 3177-3192
[197]
Wang J, Li Q, Hu Y, Li X, et al. A privacy preservation framework for feedforward-designed convolutional neural networks Neural Netw 2022 155 14-27
[198]
Chen W-N, Choo CAC, Kairouz P, Suresh AT (2022) The fundamental price of secure aggregation in differentially private federated learning. In: International conference on machine learning. PMLR, pp 3056–3089
[199]
Duan Q, Hu S, Deng R, and Lu Z Combined federated and split learning in edge computing for ubiquitous intelligence in internet of things: State-of-the-art and future directions Sensors 2022 22 16 5983
[200]
Gandikota V, Kane D, Maity RK, Mazumdar A (2021) vqsgd: vector quantized stochastic gradient descent. In: International conference on artificial intelligence and statistics. PMLR, pp 2197–2205
[201]
Dobraunig C, Grassi L, Helminger L, Rechberger C, Schofnegger M, Walch R (2021) Pasta: a case for hybrid homomorphic encryption. Cryptology ePrint Archive
[202]
Takahashi A, Zaverucha G (2021) Verifiable encryption from mpc-in-the-head. Cryptology ePrint Archive
[203]
Lakshmi TN, Jyothi S, Kumar MR (2021) Image encryption algorithms using machine learning and deep learning techniques-a survey. In: Modern approaches in machine learning and cognitive science: a walkthrough. Springer, pp 507–515
[204]
Xu G, Li H, Liu S, Yang K, and Lin X Verifynet: secure and verifiable federated learning IEEE Trans Inf For Secur 2019 15 911-926
[205]
Bowler AL, Pound MP, and Watson NJ Domain adaptation and federated learning for ultrasonic monitoring of beer fermentation Fermentation 2021 7 4 253
[206]
Sun W, Lei S, Wang L, Liu Z, and Zhang Y Adaptive federated learning and digital twin for industrial internet of things IEEE Trans Ind Inf 2020 17 8 5605-5614
[207]
Khoa TV, Saputra YM, Hoang DT, Trung NL, Nguyen D, Ha NV, Dutkiewicz E (2020) Collaborative learning model for cyberattack detection systems in iot industry 4.0. In: 2020 IEEE wireless communications and networking conference (WCNC). IEEE, pp 1–6
[208]
Neudecker D, Grosskopf M, Herman M, Haeck W, Grechanuk P, Vander Wiel S, Rising ME, Kahler A, Sly N, and Talou P Enhancing nuclear data validation analysis by using machine learning Nucl Data Sheets 2020 167 36-60
[209]
Li X, Qu Z, Zhao S, Tang B, Lu Z, Liu Y (2021) Lomar: A local defense against poisoning attack on federated learning. IEEE Trans Dependable Secure Comput
[210]
Mahela OP, Khosravy M, Gupta N, Khan B, Alhelou HH, Mahla R, Patel N, Siano P (2020) Comprehensive overview of multi-agent systems for controlling smart grids. CSEE J Power Energy Syst
[211]
Ahmad S and Bokhari M A new approach to multi agent based architecture for secure and effective e-learning Int J Comput Appl 2012 46 22 26-29
[212]
Morris A, Guan J, Azhar A (2021) An xri mixed-reality internet-of-things architectural framework toward immersive and adaptive smart environments. In: 2021 IEEE international symposium on mixed and augmented reality adjunct (ISMAR-Adjunct). IEEE, pp 68–74
[213]
Zhu Q, Ishii H (2022) Introduction to the special section on learning and security for multi-agent systems. Annual Reviews in Control
[214]
Drawel N, Bentahar J, Laarej A, and Rjoub G Formal verification of group and propagated trust in multi-agent systems Auton Agent Multi-Agent Syst 2022 36 1 1-31
[215]
Alsamhi SH, Shvetsov AV, Shvetsova SV, Hawbani A, Guizan M, Alhartomi MA, Ma O (2022) Blockchain-empowered security and energy efficiency of drone swarm consensus for environment exploration. IEEE Trans Green Commun Netw
[216]
Zulfiqar M, Kamran M, and Rasheed M A blockchain-enabled trust aware energy trading framework using games theory and multi-agent system in smat grid Energy 2022 255
[217]
Singh P, Singh MK, Singh R, Singh N (2022) Federated learning: Challenges, methods, and future directions. In: Federated learning for IoT applications. Springer, pp 199–214
[218]
Wu C, Wu F, Lyu L, Huang Y, and Xie X Communication-efficient federated learning via knowledge distillation Nat Commun 2022 13 1 1-8
[219]
Gong X, Sharma A, Karanam S, Wu Z, Chen T, Doermann D, Innanje A (2021) Ensemble attention distillation for privacy-preserving federated learning. In: Proceedings of the IEEE/CVF international conference on computer vision, pp 15076–15086
[220]
Luo X, Wu Y, Xiao X, Ooi BC (2021) Feature inference attack on model predictions in vertical federated learning. In: 2021 IEEE 37th international conference on data engineering (ICDE). IEEE, pp 181–192
[221]
Feng C-M, Yang Z, Fu H, Xu Y, Yang J, Shao L (2021) Donet: dual-octave network for fast mr image reconstruction. IEEE Trans Neural Netw Learn Syst
[222]
Batina L, Bhasin S, Jap D, Picek S (2021) Sca strikes back: Reverse engineering neural network architectures using side channels. IEEE Design & Test
[223]
Al Aziz MM, Anjum MM, Mohammed N, Jiang X (2022) Generalized genomic data sharing for differentially private federated learning. J Biomed Inform 104113
[224]
Zhao P, Cao Z, Jiang J, Gao F (2022) Practical private aggregation in federated learning against inference attack. IEEE Internet Things J
[225]
Zhang A, Wan W, and Harada K Fast pivoting gait generation by model predictive control designed with basis functions Adv Robot 2022 36 15 735-749
[226]
Wibawa F, Catak FO, Kuzlu M, Sarp S, Cali U (2022) Homomorphic encryption and federated learning based privacy-preserving cnn training: Covid-19 detection use-case. In: Proceedings of the 2022 European interdisciplinary cybersecurity conference, pp 85–90
[227]
Cheng K, Fan T, Jin Y, Liu Y, Chen T, Papadopoulos D, and Yang Q Secureboost: a lossless federated learning framework IEEE Intell Syst 2021 36 6 87-98
[228]
Maddock S, Cormode G, Wang T, Maple C, Jha S (2022) Federated boosted decision trees with differential privacy. arXiv preprint arXiv:2210.02910
[229]
Li A, Duan Y, Yang H, Chen Y, Yang J (2020) Tiprdc: task-independent privacy-respecting data crowdsourcing framework for deep learning with anonymized intermediate representations. In: Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining, pp 824–832
[230]
Prieto VM, Alvarez M, López-García R, and Cacheda F A scale for crawler effectiveness on the client-side hidden web Comput Sci Inf Syst 2012 9 2 561-583
[231]
Zhu B, Liu JZ, Cauley SF, Rosen BR, and Rosen MS Image reconstruction by domain-transform manifold learning Nature 2018 555 7697 487-492
[232]
Li C, Li H, and Chen X A framework for fast estimation of structural seismic responses using ensemble machine learning model Smart Struct Syst 2021 28 3 425-441
[233]
Handa A, Sharma A, and Shukla SK Machine learning in cybersecurity: a review Wiley Interdiscip Rev Data Min Knowl Discov 2019 9 4 1306
[234]
Hao W, Huang Y, and Zhao G Acoustic sources localization for composite pate using arrival time and bp neural network Polym Testing 2022 115
[235]
Su L, Zhou R, Wang N, Chen J, Li Z (2022) Multi-agent multi-armed bandit learning for content caching in edge networks. In: 2022 IEEE international conference on web services (ICWS). IEEE, pp 11–16
[236]
El Sayed H, Zeadally S, and Puthal D Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks Veh Commun 2020 24
[237]
Dan Y, Zhao Y, Li X, Li S, Hu M, and Hu J Generative adversarial networks (gan) based efficient sampling of chemical composition space for inverse design of inorganic materials npj Comput Mater 2020 6 1 1-7
[238]
Ball JE, Anderson DT, and Chan CS Sr Comprehensive survey of deep learning in remote sensing: theories, tools, and challenges for the community J Appl Remote Sens 2017 11 4
[239]
Chen D, Yu N, Zhang Y, Fritz M (2020) Gan-leaks: A taxonomy of membership inference attacks against generative models. In: Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, pp 343–362
[240]
Ordway-West E, Parveen P, Henslee A (2018) Autoencoder evaluation and hyper-parameter tuning in an unsupervised setting. In: 2018 IEEE international congress on big data (BigData Congress). IEEE, pp 205–209
[241]
Ye D, Zhu T, Zhou W, and Philip SY Differentially private malicious agent avoidance in multiagent advising learning IEEE Trans Cybern 2019 50 10 4214-4227
[242]
Vietri G, Balle B, Krishnamurthy A, Wu S (2020) Private reinforcement learning with pac and regret guarantees. In: International conference on machine learning. PMLR, pp 9754–9764
[243]
Zhou J, Zeng S, and Zhang B Two-stage knowledge transfer framework for image classification Pattern Recogn 2020 107
[244]
Mühl C. Personalizing private aggregation of teacher ensembles
[245]
Wei X, Shen C (2022) Federated learning over noisy channels: Convergence analysis and design examples. IEEE Trans Cogn Commun Netw
[246]
Loukil F, Abed M, and Boukadi K Blockchain adoption in education: a systematic literature review Educ Inf Technol 2021 26 5 5779-5797
[247]
Nguyen DC, Ding M, Pham Q-V, Pathirana PN, Le LB, Seneviratne A, Li J, Niyato D, and Poor HV Federated learning meets blockchain in edge computing: opportunities and challenges IEEE Internet Things J 2021 8 16 12806-12825
[248]
Bistritz I, Baharav T, Leshem A, Bambos N (2020) My fair bandit: distributed learning of max-min fairness with multi-player bandits. In: International conference on machine learning. PMLR, pp 930–940
[249]
Berguig Y, Laassiri J, and Hanaoui S Anonymous and lightweight secure authentication protocol for mobile agent system J Inf Secur Appl 2021 63
[250]
Uddin MA, Stranieri A, Gondal I, and Balasubramanian V A survey on the adoption of blockchain in iot: challenges and solutions Blockchain Res Appl 2021 2 2
[251]
Kaliyar RK, Goswami A, and Narang P Deepfake: improving fake news detection using tensor decomposition-based deep neural network J Supercomput 2021 77 2 1015-1037
[252]
Abrahamyan L, Chen Y, Bekoulis G, Deligiannis N (2021) Learned gradient compression for distributed deep learning. IEEE Trans Neural Netw Learn Syst
[253]
Emaminejad N and Akhavian R Trustworthy ai and robotics: Implications for the aec industry Autom Constr 2022 139
[254]
Vásquez-Carbonell M A systematic literature review of augmented reality in engineering education: hardware, software, student motivation & development recommendations Digital Educ Rev 2022 41 249-267

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Computing
Computing  Volume 107, Issue 1
Jan 2025
1217 pages

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 19 November 2024
Accepted: 05 November 2024
Received: 06 August 2024

Author Tags

  1. Machine learning
  2. Multi-agent system
  3. User data safety
  4. Distributed systems

Author Tags

  1. 93A16
  2. 68Q01
  3. 68P27
  4. 68M25

Qualifiers

  • Review-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media