Abstract:As machine learning and artificial intelligence (ML/AI) are becoming more popular and advanced, there is a wish to turn sensitive data into valuable information via ML/AI techniques revealing only data that is allowed by concerned parties or without revealing any information about the data to third parties. Collaborative ML approaches like federated learning (FL) help tackle these needs and concerns, bringing a way to use sensitive data without disclosing critically sensitive features of that data. In this pap… Show more
“…This indicates that the future development of this field is closely related to these algorithms, and many scholars are still continuing research in this field. [4,5]…”
Section: Fig 3 the Results Of Co-citation Cluster Analysismentioning
With the rapid development of big data and artificial intelligence, the importance and urgency of data privacy protection issues have become increasingly prominent, making it a hot research area worldwide. However, the future research directions and hot topics in this field are not yet clear. To this end, this article uses the Web of Science core collection as the data source and uses bibliometrics to visually analyze 1395 related literature on artificial intelligence and data privacy protection, including quantitative analysis of articles, co-citation analysis, and keyword co-occurrence analysis. The results show that although China started relatively late in this field, it has developed rapidly and has become the country with the highest number of publications. The latest research hotspots in the field of data privacy protection focus on blockchain, edge computing and federated learning.
“…This indicates that the future development of this field is closely related to these algorithms, and many scholars are still continuing research in this field. [4,5]…”
Section: Fig 3 the Results Of Co-citation Cluster Analysismentioning
With the rapid development of big data and artificial intelligence, the importance and urgency of data privacy protection issues have become increasingly prominent, making it a hot research area worldwide. However, the future research directions and hot topics in this field are not yet clear. To this end, this article uses the Web of Science core collection as the data source and uses bibliometrics to visually analyze 1395 related literature on artificial intelligence and data privacy protection, including quantitative analysis of articles, co-citation analysis, and keyword co-occurrence analysis. The results show that although China started relatively late in this field, it has developed rapidly and has become the country with the highest number of publications. The latest research hotspots in the field of data privacy protection focus on blockchain, edge computing and federated learning.
“…Furthermore, with a cloud-native approach, the RAN and CN architectures can be streamlined, e.g., reduce some complexity by removing multiple processing points for a certain message and removing duplication of functionalities among functions [30]. Cloud-native technologies can enable the creation of cloudlets at the edge of the network, with application-to-application and function-to-function communications, which are capable to satisfy a large number of interconnected assets with flexible mesh topologies.…”
Trends and Evolution Towards 6GToday, when the world is facing several unprecedented challenges in parallel and the prosperity of human society and the long-term survival of mankind are in peril, access to information and the possibility to communicate everywhere are a must. From climate change to global pandemics, social inequalities, misinformation, and distrust in democracy, addressing any challenge that impacts today's global economic, societal, and political agendas requires further and sustainable digitalization of the global economy and society. Infused by emerging and disruptive digital technologies on the horizon, wireless networks are and will be the keystone for enabling such a transformation. The network evolution during this and the next decade will enable a large scale adoption of use cases to sustainably combat our challenges and enable higher economic and societal values at a significantly decreased operational cost.As the Internet revolution played out over the past decades, with mobile broadband altering our interactions, professions, and habits in unforeseen ways, the true social impact of 6G can only be ascertained in hindsight. Nevertheless, the kernel of its potential can be considered through the current societal and economic trends
“…Second, the participants (i.e., clients) in the FL setting are able to modify the local model updates to alter the global model maliciously such as performing poisoning attacks [4,5]. A detailed analysis of security vulnerabilities and privacy threats in FL can be found in [6,7]. To overcome the first concern, i.e., sensitive information disclosure, privacy-enhancing technologies (PETs) such as Homomorphic Encryption (HE), Secure Multi-party Computation, Differential Privacy (DP), and Confidential Computing have been proposed [8,9,10], which prevent the server from accessing the original local model updates in cleartext so that the server cannot learn any information about the training data of the clients.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.