Katevas et al., 2020 - Google Patents
Policy-based federated learningKatevas et al., 2020
View PDF- Document ID
- 6704643075104282912
- Author
- Katevas K
- Bagdasaryan E
- Waterman J
- Safadieh M
- Birrell E
- Haddadi H
- Estrin D
- Publication year
- Publication venue
- arXiv preprint arXiv:2003.06612
External Links
Snippet
In this paper we present PoliFL, a decentralized, edge-based framework that supports heterogeneous privacy policies for federated learning. We evaluate our system on three use cases that train models with sensitive user data collected by mobile phones-predictive text …
- 238000000034 method 0 description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/30707—Clustering or classification into predefined classes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/101—Collaborative creation of products or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nguyen et al. | {FLAME}: Taming backdoors in federated learning | |
Sookhak et al. | Security and privacy of smart cities: a survey, research issues and challenges | |
US20240022607A1 (en) | Automated and adaptive model-driven security system and method for operating the same | |
US11303432B2 (en) | Label-based double key encryption | |
US10581924B2 (en) | Data sensitivity based authentication and authorization | |
Ghorbel et al. | Privacy in cloud computing environments: a survey and research challenges | |
Xu et al. | An efficient privacy‐enhanced attribute‐based access control mechanism | |
Pai et al. | Formal verification of OAuth 2.0 using Alloy framework | |
WO2019086553A1 (en) | Privacy management | |
Fernandez et al. | A critical analysis of Zero Trust Architecture (ZTA) | |
Bagdasaryan et al. | Ancile: Enhancing privacy for ubiquitous computing with use-based privacy | |
KR20090055555A (en) | Security language translations with logic resolution | |
Gupta et al. | Multi-layer authorization framework for a representative Hadoop ecosystem deployment | |
Schlögl et al. | eNNclave: Offline inference with model confidentiality | |
Park et al. | An empirical study on the influential factors affecting continuous usage of mobile cloud service | |
Aftab et al. | Traditional and hybrid access control models: a detailed survey | |
Xu et al. | A Feasible Fuzzy‐Extended Attribute‐Based Access Control Technique | |
Katevas et al. | Policy-based federated learning | |
Salini et al. | Elicitation of security requirements for e-health system by applying Model Oriented Security Requirements Engineering (MOSRE) framework | |
Peng et al. | Big data security access control algorithm based on memory index acceleration in WSNs | |
Ghosh et al. | Securing loosely-coupled collaboration in cloud environment through dynamic detection and removal of access conflicts | |
Jalali et al. | Comprehensive framework for implementing blockchain-enabled federated learning and full homomorphic encryption for chatbot security system | |
Kiran et al. | Ontology‐based data access control model supported with grid computing for improving security in healthcare data | |
Palanisamy et al. | Users’ attitude on perceived security of mobile cloud computing: empirical evidence from SME users in China | |
Thiele et al. | ztLang: A Modelling Language for Zero Trust Networks |