2020
DOI: 10.1109/access.2020.3011112
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Preserving Learning Framework for Face Recognition in Edge and Cloud Networks

Abstract: Offloading the computationally intensive workloads to the edge and cloud not only improves the quality of computation, but also creates an extra degree of diversity by collecting information from devices in service. Nevertheless, significant concerns on privacy are raised as the aggregated information could be misused without the permission by the third party. Sparse coding, which has been successful in computer vision, is finding application in this new domain. In this paper, we develop a secured face recogni… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…The encryption time of this scheme is 15.7% higher than the encryption time in [18]. The total time of this scheme is 76.2% higher than the total time of literature [21], and the recognition accuracy of this scheme is 4.21%, 0.68%, 1.67% higher than that of literature [16], [17], and [19], respectively.…”
Section: Performance Comparison Analysismentioning
confidence: 79%
See 1 more Smart Citation
“…The encryption time of this scheme is 15.7% higher than the encryption time in [18]. The total time of this scheme is 76.2% higher than the total time of literature [21], and the recognition accuracy of this scheme is 4.21%, 0.68%, 1.67% higher than that of literature [16], [17], and [19], respectively.…”
Section: Performance Comparison Analysismentioning
confidence: 79%
“…While ensuring the personal privacy and security of users, this scheme has better operational efficiency and practical value. Compared with the face recognition system in plaintext [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21] proposed in recent years, this scheme has almost the same level on recognition accuracy and time efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, if there exists more than one index where the associated traffic is anomaly, then any different combination of the positions of anomaly traffic corresponds to a distinguished class of Z j (t), which further pronounces the challenge of training data collection. To address this issue, we utilize SR [26], which has been successful in computer vision. The reason to adopt this technique is two-fold, Observing that most traffic anomalies affect the traffic volume in short term, i.e., only a small number of y(t − ( j + kU)V) is anomaly, we partition the formulated feature vectors into two categories as follows,…”
Section: ) Trainingmentioning
confidence: 99%
“…Nevertheless, there is a growing concern about the privacy and security of data when it comes to machine learning. In [350], the authors have introduced a secure cloud-intelligent network framework that preserves the privacy of data as opposed to [351] that authors have produced a framwork that organizes sparse coding in edge and cloud networks. In this framework for recognizing noise and error of data, they have utilized classification.…”
Section: Ai In Privacy-preserving Cloudmentioning
confidence: 99%