2022
DOI: 10.1002/int.22992
|View full text |Cite
|
Sign up to set email alerts
|

Security of federated learning for cloud‐edge intelligence collaborative computing

Abstract: Federated Learning (FL) is one of the key technologies to solve privacy protection for cloud-edge intelligent collaborative computing, and its security and privacy issues have attracted extensive attention from academia and industry. FL is a distributed privacy protection framework. Multiple edged nodes or servers jointly train a machine learning model by sharing model parameters without exchanging local data. However, there are still many security risks and privacy threats in FL in edge-cloud collaborative co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 56 publications
0
5
0
Order By: Relevance
“…The solution to this problem can meet the capacity requirements and minimize the service delay. Yang et al (2022) considered computing resources and bandwidth resources together, aiming at reducing the execution delay and the weighted sum of energy consumption of all users, and proposes an asynchronous deep reinforcement learning algorithm under cloud-edge collaboration to make relevant migration decisions. To meet the requirements of big data scenarios and the dynamic changes of the environment under edge nodes, the algorithm considers the computing power of both cloud computing and edge computing and can adaptively adjust the migration strategy.…”
Section: Related Workmentioning
confidence: 99%
“…The solution to this problem can meet the capacity requirements and minimize the service delay. Yang et al (2022) considered computing resources and bandwidth resources together, aiming at reducing the execution delay and the weighted sum of energy consumption of all users, and proposes an asynchronous deep reinforcement learning algorithm under cloud-edge collaboration to make relevant migration decisions. To meet the requirements of big data scenarios and the dynamic changes of the environment under edge nodes, the algorithm considers the computing power of both cloud computing and edge computing and can adaptively adjust the migration strategy.…”
Section: Related Workmentioning
confidence: 99%
“…It has been proved that in the edge-case (or low-possibility sample), the backdoor-injected poisoned dataset can be irrelevant to the label description. For example, in the image classification application, the images of "Southwest airplane" are fed to the label of "truck" [33], [240]. Such implementation does decrease the dependency on the backdoored input design.…”
Section: A Backdoor Attacks On Wflmentioning
confidence: 99%
“…Puthal et al 8 applied collaborative edge computing to smart villages. Considered the privacy protection issue of edge intelligence, FL provides an effective solution 9,10 . With the help of the cloud server, an intelligent edge‐cloud collaborative computing framework is constructed by training the collaborative model on the edge nodes of the industrial Internet of Things on a large scale 9,11,12 .…”
Section: Introductionmentioning
confidence: 99%
“…Considered the privacy protection issue of edge intelligence, FL provides an effective solution 9,10 . With the help of the cloud server, an intelligent edge‐cloud collaborative computing framework is constructed by training the collaborative model on the edge nodes of the industrial Internet of Things on a large scale 9,11,12 . However, we noticed that the FL framework via edge‐cloud collaboration is vulnerable to poisoning attacks in IoT application scenarios 13,14 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation