2020
DOI: 10.1016/j.comcom.2020.07.045
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving model training architecture for intelligent edge computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Case2 : µi qti p ti + ψ qmi p mi − ρ i µ i q 2 ti − ρ i ψq 2 mi = 0, ψ qti p ti − R ti = 0, α 2 = 0, ∀i. By solving the above equations, we get (19) and (20). We can verify that the solutions above is incentive compatible and satisfy all the KKT conditions.…”
Section: Appendix C Proof Of Theorem 41mentioning
confidence: 94%
See 2 more Smart Citations
“…Case2 : µi qti p ti + ψ qmi p mi − ρ i µ i q 2 ti − ρ i ψq 2 mi = 0, ψ qti p ti − R ti = 0, α 2 = 0, ∀i. By solving the above equations, we get (19) and (20). We can verify that the solutions above is incentive compatible and satisfy all the KKT conditions.…”
Section: Appendix C Proof Of Theorem 41mentioning
confidence: 94%
“…To guarantee the fairness of reward distribution, we allocate rewards based on the contribution of each client in the training process. Considering that Shapely Value (SV) [19] is a methodology which can distribute the rewards to participants according to their respective contributions, here we apply it to facilitate reward distribution. The SV of client i is defined as…”
Section: Upper Bound Of Rewards For Trainingmentioning
confidence: 99%
See 1 more Smart Citation
“…Poularakis et al studied the joint optimization of service placement and request routing in MECenabled multi-cell networks with storage-computationcommunication constraints [33]. Data security and privacy protection in the field of edge computing have also attracted the attention of many scholars [34,35]. The integration of blockchain and edge computing is becoming an important concept that leverages their decentralized management and distributed service to meet the security, privacy protection, scalability and performance requirements in future networks and systems [36].…”
Section: Related Workmentioning
confidence: 99%
“…3) Shapley-Value based Schemes: Qu et al [64] designed a two-phase ML framework for the incentivization of edge servers in a cloud-edge-device cooperative manner. The first phase deals with the FL process between cloud and edge servers while the second phase deals with global model segmentation for personalized requirements.…”
Section: B Game Theory Based Mechanismsmentioning
confidence: 99%