2022
DOI: 10.1109/tpds.2021.3137321
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Efficient Federated-Learning Model Debugging

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Due to its lightweight deployment scheme, FL has become the mainstream solution and product choice in many privacy computing application scenarios. FL techniques can achieve multiple federated agencies to build a unified machine learning model among the safe and efficient multi-source data systems [18]. However, with the explosive increase in privacy computing platforms, the number of FL devices put into practical application gradually increases, the main bottleneck for the current FL technique is the huge communication overhead in optimizing and deploying the FL framework [19].…”
Section: Review Of the Typical Icac Techniquementioning
confidence: 99%
“…Due to its lightweight deployment scheme, FL has become the mainstream solution and product choice in many privacy computing application scenarios. FL techniques can achieve multiple federated agencies to build a unified machine learning model among the safe and efficient multi-source data systems [18]. However, with the explosive increase in privacy computing platforms, the number of FL devices put into practical application gradually increases, the main bottleneck for the current FL technique is the huge communication overhead in optimizing and deploying the FL framework [19].…”
Section: Review Of the Typical Icac Techniquementioning
confidence: 99%
“…To enhance the traditional FL inference performance, many FL optimization methods have been presented. Specifically, these methods can be classified into three categories, i.e., global variable-based FL methods (Li et al 2020;Karimireddy et al 2020), device grouping-based FL methods (Fraboni et al 2021;Chen et al 2020;Li et al 2021b), and knowledge distillation-based FL methods (Sattler et al 2021;Lin et al 2020;Zhu, Hong, and Zhou 2021).…”
Section: Related Workmentioning
confidence: 99%
“…This can also include adversarial sample attacks. There are many studies on attack prevention in federated learning [16][17][18]. The literature [16] proposes a federated learning framework, where the server learns to use a powerful detection model to detect and remove malicious model updates, thereby enabling targeted defense.…”
Section: Related Workmentioning
confidence: 99%