Proceedings of the 28th ACM International Conference on Information and Knowledge Management 2019
DOI: 10.1145/3357384.3357909
|View full text |Cite
|
Sign up to set email alerts
|

Federated Topic Modeling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
21
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(21 citation statements)
references
References 27 publications
0
21
0
Order By: Relevance
“…Yang et al presented concepts (forming a new ontology) and methods on employing federated learning in machine learning applications [68]. Jiang et al proposed federated topic modeling that applied federated machine learning for topic models [25]. Wang et al developed a local diferential privacy based framework for federated latent Dirichlet allocation [64].…”
Section: Federated Machine Learningmentioning
confidence: 99%
“…Yang et al presented concepts (forming a new ontology) and methods on employing federated learning in machine learning applications [68]. Jiang et al proposed federated topic modeling that applied federated machine learning for topic models [25]. Wang et al developed a local diferential privacy based framework for federated latent Dirichlet allocation [64].…”
Section: Federated Machine Learningmentioning
confidence: 99%
“…Since the model updates contain much less information than the raw user data, federated learning can provide an efective way to exploit the private data of diferent users and protect their privacy at the same time [26]. Based on the idea of federated learning, Jiang et al [14] proposed a federated topic modeling approach to train topic models from the corpus owned by diferent parties. In these federated learning methods, the samples for model training are distributed on diferent clients, and each client shares the same feature space, aka horizontal federated learning [42].…”
Section: Federated Learningmentioning
confidence: 99%
“…To strengthen the security, devices can prevent data leakage against an honest-but-curious server that aggregates encrypted/masked gradients from devices. [9] It also applies to release non-IIDness across devices in topic modeling [10]. However, these FL-based algorithms have no guidelines in accordance with data distribution among the devices.…”
Section: Related Workmentioning
confidence: 99%