2023
DOI: 10.1109/tmc.2021.3092271
|View full text |Cite
|
Sign up to set email alerts
|

Camouflage Learning: Feature Value Obscuring Ambient Intelligence for Constrained Devices

Abstract: Ambient intelligence demands collaboration schemes for distributed constrained devices which are not only highly energy efficient with respect to distributed sensing, processing and communication, but which also respect data privacy. Traditional algorithms for distributed processing suffer in Ambient intelligence domains either from limited data privacy, or from their excessive processing demands for constrained distributed devices. In this paper, we present Camouflage learning, a distributed machine learning … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 139 publications
0
2
0
Order By: Relevance
“…While IoT has made it possible for things and people to interact with each other anytime and any place, the security of IoT devices has become a concern [1], [2]. Ambient Intelligence is based on collecting and using data from distributed sensing devices [3]. As the devices are communicating with each other or to some coordinator, it is important that the devices can trust to each other.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…While IoT has made it possible for things and people to interact with each other anytime and any place, the security of IoT devices has become a concern [1], [2]. Ambient Intelligence is based on collecting and using data from distributed sensing devices [3]. As the devices are communicating with each other or to some coordinator, it is important that the devices can trust to each other.…”
Section: Introductionmentioning
confidence: 99%
“…Instead of using a fixed infrastructure for key distribution, it would be more practical to generate the keys automatically when needed [5], [9]. In Camouflage Learning [3], data privacy is achieved using non-reversible aggregation of feature values, as no party has at time complete information on the underlying machine learning model.…”
Section: Introductionmentioning
confidence: 99%