no code implementations • 1 Dec 2023 • Chengkun He, Xiangmin Zhou, Chen Wang, Iqbal Gondal, Jie Shao, Xun Yi
After that, we propose a novel model update scheme that incrementally maintains CLSTM and decoder.
no code implementations • 16 May 2023 • Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi
The advancement of Internet and Communication Technologies (ICTs) has led to the era of Industry 4. 0.
no code implementations • 25 Apr 2023 • Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor
In FL, local models can be tampered with by attackers.
1 code implementation • 3 Feb 2023 • Quang Cao, Hong Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng, Yu-Chih Huang, Jingge Zhu, Stanislav Kruglik, Han Mao Kiah
A PIR scheme is $v$-verifiable if the client can verify the correctness of the retrieved $x_i$ even when $v \leq k$ servers collude and try to fool the client by sending manipulated data.
no code implementations • 4 Feb 2022 • Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang
In this paper, we present a system design which offers efficient protection of individual model updates throughout the learning procedure, allowing clients to only provide obscured model updates while a cloud server can still perform the aggregation.
no code implementations • 21 Oct 2021 • Ahmed Alharbi, Hai Dong, Xun Yi, Prabath Abeysekara
We propose a novel method to detect identity cloning of social-sensor cloud service providers to prevent the detrimental outcomes caused by identity deception.