2021
DOI: 10.1109/access.2021.3070627
|View full text |Cite
|
Sign up to set email alerts
|

RL-PDNN: Reinforcement Learning for Privacy-Aware Distributed Neural Networks in IoT Systems

Abstract: Due to their high computational and memory demand, deep learning applications are mainly restricted to high-performance units, e.g., cloud and edge servers. Particularly, in Internet of Things (IoT) systems, the data acquired by pervasive devices is sent to the computing servers for classification. However, this approach might not be always possible because of the limited bandwidth and the privacy issues. Furthermore, it presents uncertainty in terms of latency because of the unstable remote connectivity. To s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…Proof of Theorem 2: By Lemmas 6 and 5, A is TU. By Lemmas 2 and 1, LP relaxation (7) has an integral optimal solution. It is clear that LP relaxation ( 7) is equivalent to (13).…”
Section: B Total Unimodularitymentioning
confidence: 90%
See 3 more Smart Citations
“…Proof of Theorem 2: By Lemmas 6 and 5, A is TU. By Lemmas 2 and 1, LP relaxation (7) has an integral optimal solution. It is clear that LP relaxation ( 7) is equivalent to (13).…”
Section: B Total Unimodularitymentioning
confidence: 90%
“…The slack variable s 2 is introduced to replace the inequality constraint with equality constraint again, i.e., replace y ≤ 1 with y +s 2 = 1 and s 2 ≥ 0. Putting all the equality constraints together obtains the desired result (7). Note that the polyhedron in LP relaxation (7) is the same form as in Lemma 1 with equality Ax = b, where…”
Section: A Matrix Representation Of Our Formulationmentioning
confidence: 99%
See 2 more Smart Citations
“…More specifically, the distribution system has to account for the past tasks assigned to each participant and try to maximize the re-usability of previously-stored weights, with consideration to the capacity of the devices. Minimizing the number of weights assigned to each participant, not only contributes to reduce the memory usage, but also guarantees the privacy of the structure against white-box attacks [307].…”
Section: Viib6 Data-locality-aware Algorithmsmentioning
confidence: 99%