2023
DOI: 10.1109/mnet.117.2200065
|View full text |Cite
|
Sign up to set email alerts
|

Securing Federated Learning: A Covert Communication-Based Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…To solve the non-convex problem, we adopt a Successive Convex Approximation (SCA) algorithm. We would like to highlight that our work is significantly different from the previous work [6]. First, the work [6] only considers a single FJ, while our work considers multiple FJs that better support the mobile devices.…”
Section: Introductionmentioning
confidence: 94%
See 3 more Smart Citations
“…To solve the non-convex problem, we adopt a Successive Convex Approximation (SCA) algorithm. We would like to highlight that our work is significantly different from the previous work [6]. First, the work [6] only considers a single FJ, while our work considers multiple FJs that better support the mobile devices.…”
Section: Introductionmentioning
confidence: 94%
“…We would like to highlight that our work is significantly different from the previous work [6]. First, the work [6] only considers a single FJ, while our work considers multiple FJs that better support the mobile devices. Second, the work [6] does not consider the low jamming cost and the truthfulness of the FJs, while our work does.…”
Section: Introductionmentioning
confidence: 94%
See 2 more Smart Citations
“…The conventional cryptography approaches [2] usually focus on protecting the transmission content or increasing message decoding complexity, while the physical-layer security [3], [4] approaches exploit the intrinsic wireless fading channels properties to minimize the information leakage to the eavesdroppers. In fact, a higher level of security is to hide the existence of the communication, which not only can be applied in all aforementioned application scenarios [5]- [8], but also meets more critical demands from military or security agencies. To address this high level security, covert communications [9], [10], which shields the existence of message transmissions against the detection of a warden, are emerging as a cutting-edge wireless communication security technique, and have recently attracted significant research attention.…”
Section: Introductionmentioning
confidence: 99%