2021
DOI: 10.1016/j.procs.2021.01.296
|View full text |Cite
|
Sign up to set email alerts
|

Beyond federated learning: On confidentiality-critical machine learning applications in industry

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…Only three papers [38,39,51] study the trade-of between data quality and security. Zellinger et al [51] address conidentiality protection in transfer learning (an ML approach focusing on storing knowledge gained while solving one problem and applying it to a diferent but related problem).…”
Section: Rq13: What Is the Trade-of Between Data Quality And Data Sec...mentioning
confidence: 99%
“…Only three papers [38,39,51] study the trade-of between data quality and security. Zellinger et al [51] address conidentiality protection in transfer learning (an ML approach focusing on storing knowledge gained while solving one problem and applying it to a diferent but related problem).…”
Section: Rq13: What Is the Trade-of Between Data Quality And Data Sec...mentioning
confidence: 99%
“…A large obstacle regarding data analysis in smart factories is data ownership, governance and security regarding distributed data sources [99]. This is especially evident when not only machine, but human data are also collected for data analysis.…”
Section: Data-driven Decision Makingmentioning
confidence: 99%
“…This is especially evident when not only machine, but human data are also collected for data analysis. For this reason, Zellinger et al proposed a confidentiality-preserving transfer learning method to overcome this issue [99]. Another common problem in condition-based maintenance is concept drift when distribution of fault patterns changes over time.…”
Section: Data-driven Decision Makingmentioning
confidence: 99%
“…One solution to this privacy and security problem is the use of privacy-preserving machine learning approaches [2], such as homomorphic encryption, federated learning, differential privacy, and secure multi-party computation. However, these new approaches are unfamiliar to most production workers faced with the challenges of using new data-based services.…”
Section: Introductionmentioning
confidence: 99%