The evolution of distributed systems for graph neural networks and their origin in graph processing and deep learning: A survey

J Vatter, R Mayer, HA Jacobsen - ACM Computing Surveys, 2023 - dl.acm.org
Graph neural networks (GNNs) are an emerging research field. This specialized deep
neural network architecture is capable of processing graph structured data and bridges the …

A review on deep learning techniques for IoT data

K Lakshmanna, R Kaluri, N Gundluru, ZS Alzamil… - Electronics, 2022 - mdpi.com
Continuous growth in software, hardware and internet technology has enabled the growth of
internet-based sensor tools that provide physical world observations and data …

Boundary unlearning: Rapid forgetting of deep networks via shifting the decision boundary

M Chen, W Gao, G Liu, K Peng… - Proceedings of the …, 2023 - openaccess.thecvf.com
The practical needs of the" right to be forgotten" and poisoned data removal call for efficient
machine unlearning techniques, which enable machine learning models to unlearn, or to …

A comprehensive review on deep learning algorithms: Security and privacy issues

M Tayyab, M Marjani, NZ Jhanjhi, IAT Hashem… - Computers & …, 2023 - Elsevier
Abstract Machine Learning (ML) algorithms are used to train the machines to perform
various complicated tasks that begin to modify and improve with experiences. It has become …

Label-only model inversion attacks via knowledge transfer

BN Nguyen, K Chandrasegaran… - Advances in …, 2023 - proceedings.neurips.cc
In a model inversion (MI) attack, an adversary abuses access to a machine learning (ML)
model to infer and reconstruct private training data. Remarkable progress has been made in …

Egia: An external gradient inversion attack in federated learning

H Liang, Y Li, C Zhang, X Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Federated learning (FL) has achieved state-of-the-art performance in distributed learning
tasks with privacy requirements. However, it has been discovered that FL is vulnerable to …

A detailed survey on federated learning attacks and defenses

HS Sikandar, H Waheed, S Tahir, SUR Malik… - Electronics, 2023 - mdpi.com
A traditional centralized method of training AI models has been put to the test by the
emergence of data stores and public privacy concerns. To overcome these issues, the …

Deep learning for iris recognition: A survey

K Nguyen, H Proença, F Alonso-Fernandez - ACM Computing Surveys, 2024 - dl.acm.org
In this survey, we provide a comprehensive review of more than 200 articles, technical
reports, and GitHub repositories published over the last 10 years on the recent …

Privacy leakage on dnns: A survey of model inversion attacks and defenses

H Fang, Y Qiu, H Yu, W Yu, J Kong, B Chong… - arxiv preprint arxiv …, 2024 - arxiv.org
Deep Neural Networks (DNNs) have revolutionized various domains with their exceptional
performance across numerous applications. However, Model Inversion (MI) attacks, which …

Prevention of cyber security with the internet of things using particle swarm optimization

HA Alterazi, PR Kshirsagar, H Manoharan… - Sensors, 2022 - mdpi.com
High security for physical items such as intelligent machinery and residential appliances is
provided via the Internet of Things (IoT). The physical objects are given a distinct online …