2021
DOI: 10.3390/rs13112221
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Approach Based on Privacy-Preserving Deep Learning for Satellite Image Classification

Abstract: Satellite images have drawn increasing interest from a wide variety of users, including business and government, ever since their increased usage in important fields ranging from weather, forestry and agriculture to surface changes and biodiversity monitoring. Recent updates in the field have also introduced various deep learning (DL) architectures to satellite imagery as a means of extracting useful information. However, this new approach comes with its own issues, including the fact that many users utilize r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3
1

Relationship

2
8

Authors

Journals

citations
Cited by 64 publications
(40 citation statements)
references
References 54 publications
0
30
0
Order By: Relevance
“…The technique in [24] uses a CNN with a fully connected layer to classify satellite images into the water, soil, road, vegetation and urban classes. Alkhelaiwi et al [25] used a CNN to encode satellite images, thereby reducing the overall computational costs. To segment the road surface from the remote sensing images, MRENet [26] used an encoder-decoder architecture similar to UNet [3] and a PSP module with four subregions between the encoder and the decoder modules.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The technique in [24] uses a CNN with a fully connected layer to classify satellite images into the water, soil, road, vegetation and urban classes. Alkhelaiwi et al [25] used a CNN to encode satellite images, thereby reducing the overall computational costs. To segment the road surface from the remote sensing images, MRENet [26] used an encoder-decoder architecture similar to UNet [3] and a PSP module with four subregions between the encoder and the decoder modules.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The service-oriented computing treated in 33 , 34 can be extended and used to be adopted on the studied problem. In addition, the deep learning technics developed in 35 , 36 can be used to give an enhanced heuristics for the studied problem. Other techniques can be adopted to the studied problem 37 , 38 .…”
Section: Related Workmentioning
confidence: 99%
“…To preserve the privacy of client's data, different enabling technology are utilised with or without cryptographic techniques, perturbation techniques, and anonymisation techniques [227,255]. On the one hand, these technologies and techniques provide a means to safeguard the client's data better but simultaneously struggles to maintain the effectiveness (accuracy in case of classification problem) of the AI model [7,65,105]. On the other hand, it's not effectiveness that gets jeopardised, but efficiency (which includes training time [251,305] and inference time [97,243]) of the AI model also gets degraded.…”
Section: Privacy-preservation In Edge-aimentioning
confidence: 99%