Search results

1 – 10 of over 1000
Open Access
Article
Publication date: 20 September 2022

Joo Hun Yoo, Hyejun Jeong, Jaehyeok Lee and Tai-Myoung Chung

This study aims to summarize the critical issues in medical federated learning and applicable solutions. Also, detailed explanations of how federated learning techniques can be…

2907

Abstract

Purpose

This study aims to summarize the critical issues in medical federated learning and applicable solutions. Also, detailed explanations of how federated learning techniques can be applied to the medical field are presented. About 80 reference studies described in the field were reviewed, and the federated learning framework currently being developed by the research team is provided. This paper will help researchers to build an actual medical federated learning environment.

Design/methodology/approach

Since machine learning techniques emerged, more efficient analysis was possible with a large amount of data. However, data regulations have been tightened worldwide, and the usage of centralized machine learning methods has become almost infeasible. Federated learning techniques have been introduced as a solution. Even with its powerful structural advantages, there still exist unsolved challenges in federated learning in a real medical data environment. This paper aims to summarize those by category and presents possible solutions.

Findings

This paper provides four critical categorized issues to be aware of when applying the federated learning technique to the actual medical data environment, then provides general guidelines for building a federated learning environment as a solution.

Originality/value

Existing studies have dealt with issues such as heterogeneity problems in the federated learning environment itself, but those were lacking on how these issues incur problems in actual working tasks. Therefore, this paper helps researchers understand the federated learning issues through examples of actual medical machine learning environments.

Details

International Journal of Web Information Systems, vol. 18 no. 2/3
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 30 August 2022

Trung Ha and Tran Khanh Dang

In the digital age, organizations want to build a more powerful machine learning model that can serve the increasing needs of people. However, enhancing privacy and data security…

Abstract

Purpose

In the digital age, organizations want to build a more powerful machine learning model that can serve the increasing needs of people. However, enhancing privacy and data security is one of the challenges for machine learning models, especially in federated learning. Parties want to collaborate with each other to build a better model, but they do not want to reveal their own data. This study aims to introduce threats and defenses to privacy leaks in the collaborative learning model.

Design/methodology/approach

In the collaborative model, the attacker was the central server or a participant. In this study, the attacker is on the side of the participant, who is “honest but curious.” Attack experiments are on the participant’s side, who performs two tasks: one is to train the collaborative learning model; the second task is to build a generative adversarial networks (GANs) model, which will perform the attack to infer more information received from the central server. There are three typical types of attacks: white box, black box without auxiliary information and black box with auxiliary information. The experimental environment is set up by PyTorch on Google Colab platform running on graphics processing unit with labeled faces in the wild and Canadian Institute For Advanced Research-10 data sets.

Findings

The paper assumes that the privacy leakage attack resides on the participant’s side, and the information in the parameter server contains too much knowledge to train a collaborative machine learning model. This study compares the success level of inference attack from model parameters based on GAN models. There are three GAN models, which are used in this method: condition GAN, control GAN and Wasserstein generative adversarial networks (WGAN). Of these three models, the WGAN model has proven to obtain the highest stability.

Originality/value

The concern about privacy and security for machine learning models are more important, especially for collaborative learning. The paper has contributed experimentally to private attack on the participant side in the collaborative learning model.

Details

International Journal of Web Information Systems, vol. 18 no. 2/3
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 7 March 2024

Nehemia Sugianto, Dian Tjondronegoro and Golam Sorwar

This study proposes a collaborative federated learning (CFL) framework to address personal data transmission and retention issues for artificial intelligence (AI)-enabled video…

Abstract

Purpose

This study proposes a collaborative federated learning (CFL) framework to address personal data transmission and retention issues for artificial intelligence (AI)-enabled video surveillance in public spaces.

Design/methodology/approach

This study examines specific challenges for long-term people monitoring in public spaces and defines AI-enabled video surveillance requirements. Based on the requirements, this study proposes a CFL framework to gradually adapt AI models’ knowledge while reducing personal data transmission and retention. The framework uses three different federated learning strategies to rapidly learn from different new data sources while minimizing personal data transmission and retention to a central machine.

Findings

The findings confirm that the proposed CFL framework can help minimize the use of personal data without compromising the AI model's performance. The gradual learning strategies help develop AI-enabled video surveillance that continuously adapts for long-term deployment in public spaces.

Originality/value

This study makes two specific contributions to advance the development of AI-enabled video surveillance in public spaces. First, it examines specific challenges for long-term people monitoring in public spaces and defines AI-enabled video surveillance requirements. Second, it proposes a CFL framework to minimize data transmission and retention for AI-enabled video surveillance. The study provides comprehensive experimental results to evaluate the effectiveness of the proposed framework in the context of facial expression recognition (FER) which involves large-scale datasets.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 3 November 2022

Yaqi Liu, Shuzhen Fang, Lingyu Wang, Chong Huan and Ruixue Wang

In recent years, personalized recommendations have facilitated easy access to users' personal information and historical interactions, thereby improving recommendation…

Abstract

Purpose

In recent years, personalized recommendations have facilitated easy access to users' personal information and historical interactions, thereby improving recommendation effectiveness. However, due to privacy risk concerns, it is essential to balance the accuracy of personalized recommendations with privacy protection. Accordingly, this paper aims to propose a neural graph collaborative filtering personalized recommendation framework based on federated transfer learning (FTL-NGCF), which achieves high-quality personalized recommendations with privacy protection.

Design/methodology/approach

FTL-NGCF uses a third-party server to coordinate local users to train the graph neural networks (GNN) model. Each user client integrates user–item interactions into the embedding and uploads the model parameters to a server. To prevent attacks during communication and thus promote privacy preservation, the authors introduce homomorphic encryption to ensure secure model aggregation between clients and the server.

Findings

Experiments on three real data sets (Gowalla, Yelp2018, Amazon-Book) show that FTL-NGCF improves the recommendation performance in terms of recall and NDCG, based on the increased consideration of privacy protection relative to original federated learning methods.

Originality/value

To the best of the authors’ knowledge, no previous research has considered federated transfer learning framework for GNN-based recommendation. It can be extended to other recommended applications while maintaining privacy protection.

Article
Publication date: 14 July 2022

Pradyumna Kumar Tripathy, Anurag Shrivastava, Varsha Agarwal, Devangkumar Umakant Shah, Chandra Sekhar Reddy L. and S.V. Akilandeeswari

This paper aims to provide the security and privacy for Byzantine clients from different types of attacks.

Abstract

Purpose

This paper aims to provide the security and privacy for Byzantine clients from different types of attacks.

Design/methodology/approach

In this paper, the authors use Federated Learning Algorithm Based On Matrix Mapping For Data Privacy over Edge Computing.

Findings

By using Softmax layer probability distribution for model byzantine tolerance can be increased from 40% to 45% in the blocking-convergence attack, and the edge backdoor attack can be stopped.

Originality/value

By using Softmax layer probability distribution for model the results of the tests, the aggregation method can protect at least 30% of Byzantine clients.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 28 November 2023

Tingting Tian, Hongjian Shi, Ruhui Ma and Yuan Liu

For privacy protection, federated learning based on data separation allows machine learning models to be trained on remote devices or in isolated data devices. However, due to the…

Abstract

Purpose

For privacy protection, federated learning based on data separation allows machine learning models to be trained on remote devices or in isolated data devices. However, due to the limited resources such as bandwidth and power of local devices, communication in federated learning can be much slower than in local computing. This study aims to improve communication efficiency by reducing the number of communication rounds and the size of information transmitted in each round.

Design/methodology/approach

This paper allows each user node to perform multiple local trainings, then upload the local model parameters to a central server. The central server updates the global model parameters by weighted averaging the parameter information. Based on this aggregation, user nodes first cluster the parameter information to be uploaded and then replace each value with the mean value of its cluster. Considering the asymmetry of the federated learning framework, adaptively select the optimal number of clusters required to compress the model information.

Findings

While maintaining the loss convergence rate similar to that of federated averaging, the test accuracy did not decrease significantly.

Originality/value

By compressing uplink traffic, the work can improve communication efficiency on dynamic networks with limited resources.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 22 August 2022

Ratnmala Nivrutti Bhimanpallewar, Sohail Imran Khan, K. Bhavana Raj, Kamal Gulati, Narinder Bhasin and Roop Raj

Federation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information…

34

Abstract

Purpose

Federation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information about on-device data by training machine learning models using federated learning techniques without any of the raw data ever having to leave the devices in the issue. Web browser forensics research has been focused on individual Web browsers or architectural analysis of specific log files rather than on broad topics. This paper aims to propose major tools used for Web browser analysis.

Design/methodology/approach

Each kind of Web browser has its own unique set of features. This allows the user to choose their preferred browsers or to check out many browsers at once. If a forensic examiner has access to just one Web browser's log files, he/she makes it difficult to determine which sites a person has visited. The agent must thus be capable of analyzing all currently available Web browsers on a single workstation and doing an integrated study of various Web browsers.

Findings

Federated learning has emerged as a training paradigm in such settings. Web browser forensics research in general has focused on certain browsers or the computational modeling of specific log files. Internet users engage in a wide range of activities using an internet browser, such as searching for information and sending e-mails.

Originality/value

It is also essential that the investigator have access to user activity when conducting an inquiry. This data, which may be used to assess information retrieval activities, is very critical. In this paper, the authors purposed a major tool used for Web browser analysis. This study's proposed algorithm is capable of protecting data privacy effectively in real-world experiments.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 24 June 2022

Maitri Patel, Rajan Patel, Nimisha Patel, Parita Shah and Kamal Gulati

In the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates…

Abstract

Purpose

In the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates endorsed through CA to substantiate users for the barter of encoded communications is one of the most significant constraints for the extensive recognition of PKC, as the technique takes too much time and susceptible to error. PKC’s certificate and key management operating costs are reduced with IBC. IBE is a crucial primeval in IBC. The thought behind presenting the IBE scheme was to diminish the complexity of certificate and key management, but it also gives rise to key escrow and key revocation problem, which provides access to unauthorised users for the encrypted information.

Design/methodology/approach

This paper aims to compare the result of IIBES with the existing system and to provide security analysis for the same and the proposed system can be used for the security in federated learning.

Findings

Furthermore, it can be implemented using other encryption/decryption algorithms like elliptic curve cryptography (ECC) to compare the execution efficiency. The proposed system can be used for the security in federated learning.

Originality/value

As a result, a novel enhanced IBE scheme: IIBES is suggested and implemented in JAVA programming language using RSA algorithm, which eradicates the key escrow problem through eliminating the need for a KGC and key revocation problem by sing sub-KGC (SKGC) and a shared secret with nonce. IIBES also provides authentication through IBS as well as it can be used for securing the data in federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 2 April 2024

R.S. Vignesh and M. Monica Subashini

An abundance of techniques has been presented so forth for waste classification but, they deliver inefficient results with low accuracy. Their achievement on various repositories…

Abstract

Purpose

An abundance of techniques has been presented so forth for waste classification but, they deliver inefficient results with low accuracy. Their achievement on various repositories is different and also, there is insufficiency of high-scale databases for training. The purpose of the study is to provide high security.

Design/methodology/approach

In this research, optimization-assisted federated learning (FL) is introduced for thermoplastic waste segregation and classification. The deep learning (DL) network trained by Archimedes Henry gas solubility optimization (AHGSO) is used for the classification of plastic and resin types. The deep quantum neural networks (DQNN) is used for first-level classification and the deep max-out network (DMN) is employed for second-level classification. This developed AHGSO is obtained by blending the features of Archimedes optimization algorithm (AOA) and Henry gas solubility optimization (HGSO). The entities included in this approach are nodes and servers. Local training is carried out depending on local data and updations to the server are performed. Then, the model is aggregated at the server. Thereafter, each node downloads the global model and the update training is executed depending on the downloaded global and the local model till it achieves the satisfied condition. Finally, local update and aggregation at the server is altered based on the average method. The Data tag suite (DATS_2022) dataset is used for multilevel thermoplastic waste segregation and classification.

Findings

By using the DQNN in first-level classification the designed optimization-assisted FL has gained an accuracy of 0.930, mean average precision (MAP) of 0.933, false positive rate (FPR) of 0.213, loss function of 0.211, mean square error (MSE) of 0.328 and root mean square error (RMSE) of 0.572. In the second level classification, by using DMN the accuracy, MAP, FPR, loss function, MSE and RMSE are 0.932, 0.935, 0.093, 0.068, 0.303 and 0.551.

Originality/value

The multilevel thermoplastic waste segregation and classification using the proposed model is accurate and improves the effectiveness of the classification.

Article
Publication date: 14 August 2009

Andrew G. Booth and Brian P. Clark

The purpose of this paper is to present a prototype pluggable service‐oriented virtual learning environment, enabling teachers to create an integrated teaching environment using

1022

Abstract

Purpose

The purpose of this paper is to present a prototype pluggable service‐oriented virtual learning environment, enabling teachers to create an integrated teaching environment using tools that have been chosen to best meet their academic requirements.

Design/methodology/approach

This is an implementation of a WAFFLE Bus. A microkernel software design pattern is used to enable tools to be added and removed from the system. An enterprise service bus is used to provide workflow and message transformation functionality. Tools are managed through web service interfaces and Shibboleth is used to effect interoperability at the web application user interface. The initial services for the prototype were chosen to implement a simple web service teaching workflow.

Findings

First, Shibboleth is shown to provide a solution to the virtual learning environment tools' interoperability problem. Second, the service‐oriented virtual learning environment naturally leads to the ability to operate with many different types of information channels in and out of the system. This leads to a multiplicity of possible types of context‐dependent user interface. Third, immersive 3D, possibly the most interesting interface, will provide a context amenable to even the smallest development teams for the introduction of artificial intelligence into teaching. Finally, web service workflow is shown to provide a viable option for the implementation of learning designs with advantages and disadvantages compared to existing approaches.

Research limitations/implications

Different types of information channels are associated with different security problems. It will be important to determine what the best ways are of establishing secure channels to student personal learning environments. The present web service workflow design tools are of the highest quality and usability, but the design process is still a job for a specialist. It might be possible, however, to modify these open source tools to bring the design process within the grasp of non‐specialists.

Originality/value

The software system presented herein represents one possible path leading away from VLE monolithy using a service‐oriented approach. A new solution to the tools' interoperability problem is presented along with a multi‐faceted approach to the user interface. The enterprise service bus creates a flexible platform for the delivery of web service teaching and learning workflows. It is posited that the use of an immersive 3D user interface will create a context that facilitates the introduction of an artificial intelligence layer into the virtual learning environment that can serve robot teaching avatars.

Details

On the Horizon, vol. 17 no. 3
Type: Research Article
ISSN: 1074-8121

Keywords

1 – 10 of over 1000