2020
DOI: 10.1109/jiot.2020.2987843
|View full text |Cite
|
Sign up to set email alerts
|

AI at the Edge: Blockchain-Empowered Secure Multiparty Learning With Heterogeneous Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 62 publications
(21 citation statements)
references
References 18 publications
0
20
0
1
Order By: Relevance
“…The simulation results show that the proposed CrowdSFL protocol can resist the following malicious behaviors: Malicious miners, Malicious workers, and Malicious requesters. To resist poisoning attacks as well as membership inference attacks in 5G networks, Liu Wang et al [100] proposed a secure decentralized multiparty learning scheme, named BEMA, for edge computingbased IoT applications. Specifically, each part in the BEMA scheme distributes their local model and during that time, they are processing the models received from other users about their local dataset and identify the models that require certification.…”
Section: B Permissionless Blockchain-based Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The simulation results show that the proposed CrowdSFL protocol can resist the following malicious behaviors: Malicious miners, Malicious workers, and Malicious requesters. To resist poisoning attacks as well as membership inference attacks in 5G networks, Liu Wang et al [100] proposed a secure decentralized multiparty learning scheme, named BEMA, for edge computingbased IoT applications. Specifically, each part in the BEMA scheme distributes their local model and during that time, they are processing the models received from other users about their local dataset and identify the models that require certification.…”
Section: B Permissionless Blockchain-based Solutionsmentioning
confidence: 99%
“…This attacker can induce errors in their local model update process. Wang et al [100] designed a secure federated learning system based on blockchain technology that can defend against Byzantine attacks. Jebreel et al [128] designed a novel concept against Byzantine attacks where the basic concept is the analysis of a small fraction of the updates, instead of analyzing the whole updates.…”
Section: Byzantine Attackmentioning
confidence: 99%
“…Plus, Yin et al [54] investigated a blockchain-based federated deep learning in the IoT domain. This strategy was motivated by multiparty secure computation, which was also investigated in Reference [55]. Besides, Liu et al [56] used smart contracts in the self-defense of FL.…”
Section: Blockchain-enabled Aimentioning
confidence: 99%
“…In [63], the authors proposed a secure multiparty learning system called BEMA based on blockchain. is paper mentioned two forms of Byzantine attacks: (1) malicious participants broadcast a malicious local model to other parties for changing the outcomes of categorization;…”
Section: Decentralized Intelligencementioning
confidence: 99%