no code implementations • 24 Jun 2024 • Tao Huang, Ziyang Chen, Jiayang Meng, Qingyu Huang, Xu Yang, Xun Yi, Ibrahim Khalil
This lightweight, scalable method significantly enhances model accuracy and strengthens resistance to membership inference attacks.
no code implementations • 1 Dec 2023 • Chengkun He, Xiangmin Zhou, Chen Wang, Iqbal Gondal, Jie Shao, Xun Yi
After that, we propose a novel model update scheme that incrementally maintains CLSTM and decoder.
no code implementations • 16 May 2023 • Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi
The advancement of Internet and Communication Technologies (ICTs) has led to the era of Industry 4. 0.
no code implementations • 25 Apr 2023 • Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor
In FL, local models can be tampered with by attackers.
1 code implementation • 3 Feb 2023 • Quang Cao, Hong Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng, Yu-Chih Huang, Jingge Zhu, Stanislav Kruglik, Han Mao Kiah
A PIR scheme is $v$-verifiable if the client can verify the correctness of the retrieved $x_i$ even when $v \leq k$ servers collude and try to fool the client by sending manipulated data.
no code implementations • 4 Feb 2022 • Yifeng Zheng, Shangqi Lai, Yi Liu, Xingliang Yuan, Xun Yi, Cong Wang
In this paper, we present a system design which offers efficient protection of individual model updates throughout the learning procedure, allowing clients to only provide obscured model updates while a cloud server can still perform the aggregation.
no code implementations • 21 Oct 2021 • Ahmed Alharbi, Hai Dong, Xun Yi, Prabath Abeysekara
We propose a novel method to detect identity cloning of social-sensor cloud service providers to prevent the detrimental outcomes caused by identity deception.