2020
DOI: 10.1007/s00521-020-05426-0
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 31 publications
(15 citation statements)
references
References 37 publications
0
15
0
Order By: Relevance
“…It can be seen from Figure 10 that in the predicted two clustering categories, 300 detection data were predicted, respectively, and the detection error of category one was 9, and the accuracy rate reached 97%, and the detection error of category 2 is 8, and the accuracy rate reaches 97.33%. It can be seen from Figure 10 that the detection accuracy of the four clusters of the AKN algorithm is higher than that of the KN algorithm, which is about 6% higher than the traditional KN algorithm [30][31][32]. is shows that the detection accuracy of the AKN algorithm is higher, and it can more effectively defend against Dos attacks [33][34][35][36].…”
Section: Data Mining Model Based On Akn Algorithmmentioning
confidence: 99%
“…It can be seen from Figure 10 that in the predicted two clustering categories, 300 detection data were predicted, respectively, and the detection error of category one was 9, and the accuracy rate reached 97%, and the detection error of category 2 is 8, and the accuracy rate reaches 97.33%. It can be seen from Figure 10 that the detection accuracy of the four clusters of the AKN algorithm is higher than that of the KN algorithm, which is about 6% higher than the traditional KN algorithm [30][31][32]. is shows that the detection accuracy of the AKN algorithm is higher, and it can more effectively defend against Dos attacks [33][34][35][36].…”
Section: Data Mining Model Based On Akn Algorithmmentioning
confidence: 99%
“…This section briefly reviews the previous privacy-preserving recognition methods for image and video datasets [21][22][23][24][25].…”
Section: Introductionmentioning
confidence: 99%
“…They analyzed perturbation's effect satisfying -LDP on data utility regarding distance and count-based machine learning algorithms. Chen et al [25] presented a secure multi-classification scheme to address the privacy-leakage in robot system using DL. The authors adopted two pairs of activation and cost functions using HE, namely softmax plus log-likelihood function and sigmoid plus cross-entropy function, along with secure calculation protocols.…”
Section: Introductionmentioning
confidence: 99%
“…However, the approximation process more or less makes the results loss in accuracy and requires complex computational cost. Other schemes start directly from the accuracy of the underlying network by designing a comparison protocol using the special structure of the Rectified Linear Units (Relu) function 22 . Combined with homomorphic encryption to achieve calculation, such an approach obviates the unnecessary accuracy loss, but the comparison protocols in most schemes are not efficient enough due to complex modulo‐exponential operations.…”
Section: Introductionmentioning
confidence: 99%
“…Bellafqira et al 8 constructed a privacy‐preserving multilayer perceptron model based on Paillier cryptosystem, although the activation function computing on the two‐server model is achieved by comparison protocol to ensure the underlying network accuracy, the fact that one of the servers in the model is allowed to know the user's private key will cause privacy threat to raw data. Chen et al 22 utilized the Paillier homomorphic cryptosystem to implement the activation function computing with a comparison protocol, which achieves underlying network accuracy without loss, but the complicated modulo exponential operations will cause high latency. Li et al 9 proposed an optimized outsourced privacy‐preserving convolutional neural network prediction scheme, which first applies asynchronous computation and single instruction multiple data (SIMD) techniques to generate offline triplets, then adopts garbled circuit for nonlinear Relu function to assure the underlying network structure accuracy, and finally it uses average pooling to achieve similar accuracy as maximum pooling.…”
Section: Introductionmentioning
confidence: 99%