2022
DOI: 10.1109/tii.2021.3105492
|View full text |Cite
|
Sign up to set email alerts
|

Joint Protection of Energy Security and Information Privacy for Energy Harvesting: An Incentive Federated Learning Approach

Abstract: Energy harvesting (EH) is a promising and critical technology to mitigate the dilemma between the limited battery capacity and the increasing energy consumption in the Internet of everything. However, the current EH system suffers from energyinformation cross threats, facing the overlapping vulnerability of energy deprivation and private information leakage. Although some existing works touch on the security of energy and information in EH, they treat these two issues independently, without collaborative and i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 44 publications
(11 citation statements)
references
References 30 publications
(36 reference statements)
0
11
0
Order By: Relevance
“…Our testing was conducted out on a 4th‐generation Intel Core i5 processor with 12 GB of RAM organization Ubuntu 18.10. They utilized WEKA 3.8, an open‐sourced system which covers a variety of classifications and feature subset selecting approaches (Abawajy & Kelarev, 2019), like we did in (Ali et al, 2021; Hall et al, 2009; Pan et al, 2021; Yu et al, 2021). They was using an available to the public dataset with 6250 benign applications from of the Google Play Store and 5700 malicious applications from VirusShare, Drebin, and AndroZoo.…”
Section: Results Analysismentioning
confidence: 99%
“…Our testing was conducted out on a 4th‐generation Intel Core i5 processor with 12 GB of RAM organization Ubuntu 18.10. They utilized WEKA 3.8, an open‐sourced system which covers a variety of classifications and feature subset selecting approaches (Abawajy & Kelarev, 2019), like we did in (Ali et al, 2021; Hall et al, 2009; Pan et al, 2021; Yu et al, 2021). They was using an available to the public dataset with 6250 benign applications from of the Google Play Store and 5700 malicious applications from VirusShare, Drebin, and AndroZoo.…”
Section: Results Analysismentioning
confidence: 99%
“…Researchers have tried to optimize WFL from different aspects. Under the condition of limited wireless network resources [31] and client energy resources [32]- [33] participating in WFL local training, Zhou proposed a bandwidth allocation algorithm with low energy consumption [34], which enables clients to engage in learning more sustainably. Xu proposed to intelligently select clients participating in WFL local learning based on energy consumption from the longterm perspective of learning as a whole [35], not limited to learning rounds.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, it is highly anticipated that the AI technologies including deep learning and machine learning will be driven by a wide range of innovative applications and systems such as 5G, edge computing, cloud, Internet of Things (IoT), tactile internet, wireless networks, vehicles, blockchain, etc. [ 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 ]. Furthermore, several standpoints are studied regarding AI technology and its applicability.…”
Section: Introductionmentioning
confidence: 99%