Decentralized federated learning: Fundamentals, state of the art, frameworks, trends, and challenges

ETM Beltrán, MQ Pérez, PMS Sánchez… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
In recent years, Federated Learning (FL) has gained relevance in training collaborative
models without sharing sensitive data. Since its birth, Centralized FL (CFL) has been the …

When digital economy meets Web3. 0: Applications and challenges

C Chen, L Zhang, Y Li, T Liao, S Zhao… - IEEE Open Journal …, 2022 - ieeexplore.ieee.org
With the continuous development of web technology, Web3. 0 has attracted a considerable
amount of attention due to its unique decentralized characteristics. The digital economy is an …

Lead federated neuromorphic learning for wireless edge artificial intelligence

H Yang, KY Lam, L **ao, Z **ong, H Hu… - Nature …, 2022 - nature.com
In order to realize the full potential of wireless edge artificial intelligence (AI), very large and
diverse datasets will often be required for energy-demanding model training on resource …

Client selection in federated learning: Principles, challenges, and opportunities

L Fu, H Zhang, G Gao, M Zhang… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
As a privacy-preserving paradigm for training machine learning (ML) models, federated
learning (FL) has received tremendous attention from both industry and academia. In a …

Decentralized federated learning: A survey and perspective

L Yuan, Z Wang, L Sun, SY Philip… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Federated learning (FL) has been gaining attention for its ability to share knowledge while
maintaining user data, protecting privacy, increasing learning efficiency, and reducing …

BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence

T Jiang, G Shen, C Guo, Y Cui, B **e - Computer Networks, 2023 - Elsevier
Abstract Recently, Cyber Threat Intelligence (CTI) sharing has become an important weapon
for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and …

Byzantine-resilient decentralized stochastic optimization with robust aggregation rules

Z Wu, T Chen, Q Ling - IEEE transactions on signal processing, 2023 - ieeexplore.ieee.org
This article focuses on decentralized stochastic optimization in the presence of Byzantine
attacks. During the optimization process, an unknown number of malfunctioning or malicious …

Challenges and remedies to privacy and security in aigc: Exploring the potential of privacy computing, blockchain, and beyond

C Chen, Z Wu, Y Lai, W Ou, T Liao, Z Zheng - arxiv preprint arxiv …, 2023 - arxiv.org
Artificial Intelligence Generated Content (AIGC) is one of the latest achievements in AI
development. The content generated by related applications, such as text, images and …

Privacy computing meets metaverse: Necessity, taxonomy and challenges

C Chen, Y Li, Z Wu, C Mai, Y Liu, Y Hu, J Kang… - Ad Hoc Networks, 2024 - Elsevier
Metaverse, the core of the next-generation Internet, is a computer-generated holographic
digital environment that simultaneously combines spatio-temporal, immersive, real-time …

Advancements in federated learning: Models, methods, and privacy

H Chen, H Wang, Q Long, D **, Y Li - ACM Computing Surveys, 2024 - dl.acm.org
Federated learning (FL) is a promising technique for resolving the rising privacy and security
concerns. Its main ingredient is to cooperatively learn the model among the distributed …