首页 > 最新文献

IEEE Transactions on Emerging Topics in Computing最新文献

英文 中文
Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing 客座编辑 IEEE《计算领域新兴课题论文集》"新兴隐私保护计算的进展 "专栏
IF 5.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-18 DOI: 10.1109/TETC.2024.3374568
Jinguang Han;Patrick Schaumont;Willy Susilo
Machine learning and cloud computing have dramatically increased the utility of data. These technologies facilitate our life and provide smart and intelligent services. Notably, machine learning algorithms need to learn from massive training data to improve accuracy. Hence, data is the core component of machine learning and plays an important role. Cloud computing is a new computing model that provides on-demand services, such as data storage, computing power, and infrastructure. Data owners are allowed to outsource their data to cloud servers, but will lose direct control of their data. The rising trend in data breach shows that privacy and security have been major issues in machine learning and cloud computing.
机器学习和云计算大大提高了数据的实用性。这些技术为我们的生活提供了便利,并提供了智能化的服务。值得注意的是,机器学习算法需要从大量训练数据中学习,以提高准确性。因此,数据是机器学习的核心组成部分,发挥着重要作用。云计算是一种新型计算模式,可按需提供数据存储、计算能力和基础设施等服务。数据所有者可以将数据外包给云服务器,但会失去对数据的直接控制。数据泄露的上升趋势表明,隐私和安全已成为机器学习和云计算的主要问题。
{"title":"Guest Editorial IEEE Transactions on Emerging Topics in Computing Special Section on Advances in Emerging Privacy-Preserving Computing","authors":"Jinguang Han;Patrick Schaumont;Willy Susilo","doi":"10.1109/TETC.2024.3374568","DOIUrl":"https://doi.org/10.1109/TETC.2024.3374568","url":null,"abstract":"Machine learning and cloud computing have dramatically increased the utility of data. These technologies facilitate our life and provide smart and intelligent services. Notably, machine learning algorithms need to learn from massive training data to improve accuracy. Hence, data is the core component of machine learning and plays an important role. Cloud computing is a new computing model that provides on-demand services, such as data storage, computing power, and infrastructure. Data owners are allowed to outsource their data to cloud servers, but will lose direct control of their data. The rising trend in data breach shows that privacy and security have been major issues in machine learning and cloud computing.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 1","pages":"266-268"},"PeriodicalIF":5.9,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10474207","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140164101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IEEE Transactions on Emerging Topics in Computing Information for Authors 电气和电子工程师学会(IEEE)《计算领域新兴专题论文》(IEEE Transactions on Emerging Topics in Computing)供作者参考的信息
IF 5.9 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-18 DOI: 10.1109/TETC.2024.3377773
{"title":"IEEE Transactions on Emerging Topics in Computing Information for Authors","authors":"","doi":"10.1109/TETC.2024.3377773","DOIUrl":"https://doi.org/10.1109/TETC.2024.3377773","url":null,"abstract":"","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 1","pages":"C2-C2"},"PeriodicalIF":5.9,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10474198","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140161123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Design Framework for Hardware-Efficient Logarithmic Floating-Point Multipliers 硬件高效对数浮点运算器设计框架
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-19 DOI: 10.1109/TETC.2024.3365650
Tingting Zhang;Zijing Niu;Jie Han
The symbiotic use of logarithmic approximation in floating-point (FP) multiplication can significantly reduce the hardware complexity of a multiplier. However, it is difficult for a limited number of logarithmic FP multipliers (LFPMs) to fit in a specific error-tolerant application, such as neural networks (NNs) and digital signal processing, due to their unique error characteristics. This article proposes a design framework for generating LFPMs. We consider two FP representation formats with different ranges of mantissas, the IEEE 754 Standard FP Format and the Nearest Power of Two FP Format. For both logarithm and anti-logarithm computation, the applicable regions of inputs are first evenly divided into several intervals, and then approximation methods with negative or positive errors are developed for each sub-region. By using piece-wise functions, different configurations of approximation methods throughout applicable regions are created, leading to LFPMs with various trade-offs between accuracy and hardware cost. The variety of error characteristics of LFPMs is discussed and the generic hardware implementation is illustrated. As case studies, two LFPM designs are presented and evaluated in applications of JPEG compression and NNs. They do not only increase the classification accuracy, but also achieve smaller PDPs compared to the exact FP multiplier, while being more accurate than a recent logarithmic FP design.
在浮点(FP)乘法中共生使用对数近似可以显著降低乘法器的硬件复杂性。然而,由于其独特的误差特性,有限数量的对数FP乘法器(LFPMs)很难适应特定的容错应用,例如神经网络(nn)和数字信号处理。本文提出了一个用于生成lfpm的设计框架。我们考虑了两种具有不同尾数范围的FP表示格式,IEEE 754标准FP格式和两FP格式的最近邻幂。对于对数和反对数计算,首先将输入的适用区域均匀划分为几个区间,然后为每个子区域开发具有负或正误差的近似方法。通过使用分段函数,在整个适用区域创建了不同的近似方法配置,从而导致在精度和硬件成本之间进行各种权衡的lfpm。讨论了LFPMs误差特性的变化,并给出了通用硬件实现。作为案例研究,介绍了两种LFPM设计,并在JPEG压缩和神经网络的应用中进行了评估。它们不仅提高了分类精度,而且与精确的FP乘法器相比,还实现了更小的pdp,同时比最近的对数FP设计更准确。
{"title":"A Design Framework for Hardware-Efficient Logarithmic Floating-Point Multipliers","authors":"Tingting Zhang;Zijing Niu;Jie Han","doi":"10.1109/TETC.2024.3365650","DOIUrl":"10.1109/TETC.2024.3365650","url":null,"abstract":"The symbiotic use of logarithmic approximation in floating-point (FP) multiplication can significantly reduce the hardware complexity of a multiplier. However, it is difficult for a limited number of logarithmic FP multipliers (LFPMs) to fit in a specific error-tolerant application, such as neural networks (NNs) and digital signal processing, due to their unique error characteristics. This article proposes a design framework for generating LFPMs. We consider two FP representation formats with different ranges of mantissas, the IEEE 754 Standard FP Format and the Nearest Power of Two FP Format. For both logarithm and anti-logarithm computation, the applicable regions of inputs are first evenly divided into several intervals, and then approximation methods with negative or positive errors are developed for each sub-region. By using piece-wise functions, different configurations of approximation methods throughout applicable regions are created, leading to LFPMs with various trade-offs between accuracy and hardware cost. The variety of error characteristics of LFPMs is discussed and the generic hardware implementation is illustrated. As case studies, two LFPM designs are presented and evaluated in applications of JPEG compression and NNs. They do not only increase the classification accuracy, but also achieve smaller PDPs compared to the exact FP multiplier, while being more accurate than a recent logarithmic FP design.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 4","pages":"991-1001"},"PeriodicalIF":5.1,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139947917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MiniFloats on RISC-V Cores: ISA Extensions With Mixed-Precision Short Dot Products RISC-V 内核上的 MiniFloats:使用混合精度短点积的 ISA 扩展
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-19 DOI: 10.1109/TETC.2024.3365354
Luca Bertaccini;Gianna Paulin;Matheus Cavalcante;Tim Fischer;Stefan Mach;Luca Benini
Low-precision floating-point (FP) formats have recently been intensely investigated in the context of machine learning inference and training applications. While 16-bit formats are already widely used, 8-bit FP data types have lately emerged as a viable option for neural network training when employed in a mixed-precision scenario and combined with rounding methods increasing the precision in compound additions, such as stochastic rounding. So far, hardware implementations supporting FP8 are mostly implemented within domain-specific accelerators. We propose two RISC-V instruction set architecture (ISA) extensions, enhancing respectively scalar and vector general-purpose cores with low and mixed-precision capabilities. The extensions support two 8-bit and two 16-bit FP formats and are based on dot-product instructions accumulating at higher precision. We develop a hardware unit supporting mixed-precision dot products and stochastic rounding and integrate it into an open-source floating-point unit (FPU). Finally, we integrate the enhanced FPU into a cluster of scalar cores, as well as a cluster of vector cores, and implement them in a 12 nm FinFET technology. The former achieves 575 GFLOPS/W on FP8-to-FP16 matrix multiplications at 0.8 V, 1.26 GHz; the latter reaches 860 GFLOPS/W at 0.8 V, 1.08 GHz, 1.93x higher efficiency than computing on FP16-to-FP32.
低精度浮点(FP)格式最近在机器学习推理和训练应用中得到了广泛的研究。虽然16位格式已经被广泛使用,但8位FP数据类型最近成为神经网络训练的可行选择,当在混合精度场景中使用并与四舍五入方法结合使用时,可以提高复合加法的精度,例如随机四舍五入。到目前为止,支持FP8的硬件实现大多是在特定领域的加速器中实现的。我们提出了两种RISC-V指令集架构(ISA)扩展,分别增强了具有低精度和混合精度能力的标量和矢量通用内核。扩展支持两个8位和两个16位FP格式,并基于点积指令以更高的精度累积。我们开发了一个支持混合精度点积和随机舍入的硬件单元,并将其集成到一个开源的浮点单元(FPU)中。最后,我们将增强的FPU集成到标量核集群以及矢量核集群中,并在12 nm FinFET技术中实现它们。前者在0.8 V, 1.26 GHz下在fp8到fp16矩阵乘法上实现575 GFLOPS/W;后者在0.8 V, 1.08 GHz下达到860 GFLOPS/W,比在fp16到fp32上计算效率高1.93倍。
{"title":"MiniFloats on RISC-V Cores: ISA Extensions With Mixed-Precision Short Dot Products","authors":"Luca Bertaccini;Gianna Paulin;Matheus Cavalcante;Tim Fischer;Stefan Mach;Luca Benini","doi":"10.1109/TETC.2024.3365354","DOIUrl":"10.1109/TETC.2024.3365354","url":null,"abstract":"Low-precision floating-point (FP) formats have recently been intensely investigated in the context of machine learning inference and training applications. While 16-bit formats are already widely used, 8-bit FP data types have lately emerged as a viable option for neural network training when employed in a mixed-precision scenario and combined with rounding methods increasing the precision in compound additions, such as stochastic rounding. So far, hardware implementations supporting FP8 are mostly implemented within domain-specific accelerators. We propose two RISC-V instruction set architecture (ISA) extensions, enhancing respectively scalar and vector general-purpose cores with low and mixed-precision capabilities. The extensions support two 8-bit and two 16-bit FP formats and are based on dot-product instructions accumulating at higher precision. We develop a hardware unit supporting mixed-precision dot products and stochastic rounding and integrate it into an open-source floating-point unit (FPU). Finally, we integrate the enhanced FPU into a cluster of scalar cores, as well as a cluster of vector cores, and implement them in a 12 nm FinFET technology. The former achieves 575 GFLOPS/W on FP8-to-FP16 matrix multiplications at 0.8 V, 1.26 GHz; the latter reaches 860 GFLOPS/W at 0.8 V, 1.08 GHz, 1.93x higher efficiency than computing on FP16-to-FP32.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 4","pages":"1040-1055"},"PeriodicalIF":5.1,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139948120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Task Migration in Multiplex Networked Industrial Chains 多路复用网络产业链中的自适应任务迁移
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-16 DOI: 10.1109/TETC.2024.3364703
Kai Di;Fulin Chen;Yuanshuang Jiang;Pan Li;Tianyi Liu;Yichuan Jiang
In recent years, the cooperation structures of industrial chains have evolved into multiplex networks, in which product agents are connected through various types of links. Due to the constraints of the multi-coupled interaction structure of the multiplex networked industrial chains, the load imbalances generated by the industrial production processes will cascade in and between different network layers, thus affecting the load balance of the whole system. The challenges that arise when attempting such load balancing among multiplex networked industrial chains are twofold: 1) The multiplex networked interaction structure adds new constraints to traditional multiagent task migration problems, which increases the solution space dimension, and 2) The cascaded load imbalances require tasks to be migrated adaptively, which complicates the solution space structure, and it is proven $mathcal {NP}$-hard to achieve such load balancing. Then, a hierarchical cascade-triggered task migration algorithm is designed, where key agents are selected to cooperate with each other in a hierarchical control form to achieve load balancing between network layers, and appropriate agents are cascade-triggered to migrate tasks adaptively to achieve load balancing in network layers. Finally, the algorithm is extensively evaluated in experiments, concluding that it can significantly increase the resulting utility and task completion proportion, while efficiently reducing the task completion cost. In particular, the algorithm does not appear to be statistically different in the resulting optimization objectives from the optimal result computed by the CPLEX solver, but it may consume less runtime.
近年来,产业链的合作结构已经演变为多元化的网络,产品代理商通过各种类型的环节连接在一起。由于多路网络化产业链的多耦合交互结构的约束,工业生产过程产生的负载不平衡会在不同的网络层内和网络层之间层叠产生,从而影响整个系统的负载平衡。在多路联网产业链之间尝试这种负载平衡时面临的挑战有两个:1)多路联网交互结构给传统的多智能体任务迁移问题增加了新的约束,增加了求解空间维度;2)级联负载不平衡要求任务自适应迁移,使求解空间结构复杂化,并且证明了这种负载平衡很难实现。然后,设计了一种分层级联触发任务迁移算法,选择关键代理以分层控制的形式相互协作,实现网络层间的负载均衡,并通过级联触发适当的代理自适应迁移任务,实现网络层间的负载均衡。最后,在实验中对该算法进行了广泛的评估,结果表明该算法可以显著提高结果的效用和任务完成率,同时有效地降低任务完成成本。特别是,该算法在最终优化目标上与CPLEX求解器计算的最优结果在统计上似乎没有差异,但它可能消耗更少的运行时间。
{"title":"Adaptive Task Migration in Multiplex Networked Industrial Chains","authors":"Kai Di;Fulin Chen;Yuanshuang Jiang;Pan Li;Tianyi Liu;Yichuan Jiang","doi":"10.1109/TETC.2024.3364703","DOIUrl":"10.1109/TETC.2024.3364703","url":null,"abstract":"In recent years, the cooperation structures of industrial chains have evolved into multiplex networks, in which product agents are connected through various types of links. Due to the constraints of the multi-coupled interaction structure of the multiplex networked industrial chains, the load imbalances generated by the industrial production processes will cascade in and between different network layers, thus affecting the load balance of the whole system. The challenges that arise when attempting such load balancing among multiplex networked industrial chains are twofold: 1) The multiplex networked interaction structure adds new constraints to traditional multiagent task migration problems, which increases the solution space dimension, and 2) The cascaded load imbalances require tasks to be migrated adaptively, which complicates the solution space structure, and it is proven \u0000<inline-formula><tex-math>$mathcal {NP}$</tex-math></inline-formula>\u0000-hard to achieve such load balancing. Then, a hierarchical cascade-triggered task migration algorithm is designed, where key agents are selected to cooperate with each other in a hierarchical control form to achieve load balancing between network layers, and appropriate agents are cascade-triggered to migrate tasks adaptively to achieve load balancing in network layers. Finally, the algorithm is extensively evaluated in experiments, concluding that it can significantly increase the resulting utility and task completion proportion, while efficiently reducing the task completion cost. In particular, the algorithm does not appear to be statistically different in the resulting optimization objectives from the optimal result computed by the CPLEX solver, but it may consume less runtime.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 4","pages":"1025-1039"},"PeriodicalIF":5.1,"publicationDate":"2024-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139947910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Engravings, Secrets, and Interpretability of Neural Networks 神经网络的雕刻、秘密和可解释性
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-31 DOI: 10.1109/TETC.2024.3358759
Nathaniel Hobbs;Periklis A. Papakonstantinou;Jaideep Vaidya
This work proposes a definition and examines the problem of undetectably engraving special input/output information into a Neural Network (NN). Investigation of this problem is significant given the ubiquity of neural networks and society's reliance on their proper training and use. We systematically study this question and provide (1) definitions of security for secret engravings, (2) machine learning methods for the construction of an engraved network, (3) a threat model that is instantiated with state-of-the-art interpretability methods to devise distinguishers/attackers. In this work, there are two kinds of algorithms. First, the constructions of engravings through machine learning training methods. Second, the distinguishers associated with the threat model. The weakest of our engraved NN constructions are insecure and can be broken by our distinguishers, whereas other, more systematic engravings are resilient to each of our distinguishing attacks on three prototypical image classification datasets. Our threat model is of independent interest, as it provides a concrete quantification/benchmark for the “goodness” of interpretability methods.
这项工作提出了一个定义,并研究了不可检测地将特殊输入/输出信息雕刻到神经网络(NN)中的问题。考虑到神经网络的普遍存在以及社会对其适当训练和使用的依赖,对这个问题的研究是非常重要的。我们系统地研究了这个问题,并提供了(1)秘密雕刻的安全定义,(2)构建雕刻网络的机器学习方法,(3)用最先进的可解释性方法实例化的威胁模型,以设计区分者/攻击者。在这项工作中,有两种算法。第一,通过机器学习训练方法构造版画。其次,与威胁模型相关的区分符。我们最弱的雕刻NN结构是不安全的,可以被我们的区分器打破,而其他更系统的雕刻对我们对三个原型图像分类数据集的每种区分攻击都有弹性。我们的威胁模型具有独立的意义,因为它为可解释性方法的“优点”提供了具体的量化/基准。
{"title":"Engravings, Secrets, and Interpretability of Neural Networks","authors":"Nathaniel Hobbs;Periklis A. Papakonstantinou;Jaideep Vaidya","doi":"10.1109/TETC.2024.3358759","DOIUrl":"10.1109/TETC.2024.3358759","url":null,"abstract":"This work proposes a definition and examines the problem of undetectably engraving special input/output information into a Neural Network (NN). Investigation of this problem is significant given the ubiquity of neural networks and society's reliance on their proper training and use. We systematically study this question and provide (1) definitions of security for secret engravings, (2) machine learning methods for the construction of an engraved network, (3) a threat model that is instantiated with state-of-the-art interpretability methods to devise distinguishers/attackers. In this work, there are two kinds of algorithms. First, the constructions of engravings through machine learning training methods. Second, the distinguishers associated with the threat model. The weakest of our engraved NN constructions are insecure and can be broken by our distinguishers, whereas other, more systematic engravings are resilient to each of our distinguishing attacks on three prototypical image classification datasets. Our threat model is of independent interest, as it provides a concrete quantification/benchmark for the “goodness” of interpretability methods.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 4","pages":"1093-1104"},"PeriodicalIF":5.1,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139947921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized Privacy-Preserving Framework for Cross-Silo Federated Learning 跨ilo 联合学习的个性化隐私保护框架
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-31 DOI: 10.1109/TETC.2024.3356068
Van-Tuan Tran;Huy-Hieu Pham;Kok-Seng Wong
Federated learning (FL) is recently surging as a promising decentralized deep learning (DL) framework that enables DL-based approaches trained collaboratively across clients without sharing private data. However, in the context of the central party being active and dishonest, the data of individual clients might be perfectly reconstructed, leading to the high possibility of sensitive information being leaked. Moreover, FL also suffers from the nonindependent and identically distributed (non-IID) data among clients, resulting in the degradation in the inference performance on local clients’ data. In this paper, we propose a novel framework, namely Personalized Privacy-Preserving Federated Learning (PPPFL), with a concentration on cross-silo FL to overcome these challenges. Specifically, we introduce a stabilized variant of the Model-Agnostic Meta-Learning (MAML) algorithm to collaboratively train a global initialization from clients’ synthetic data generated by Differential Private Generative Adversarial Networks (DP-GANs). After reaching convergence, the global initialization will be locally adapted by the clients to their private data. Through extensive experiments, we empirically show that our proposed framework outperforms multiple FL baselines on different datasets, including MNIST, Fashion-MNIST, CIFAR-10, and CIFAR-100.
联邦学习(FL)最近作为一种有前途的去中心化深度学习(DL)框架而蓬勃发展,它使基于DL的方法能够在不共享私有数据的情况下跨客户端进行协作训练。然而,在中心方活跃和不诚实的情况下,个人客户的数据可能会被完美地重构,导致敏感信息泄露的可能性很大。此外,FL还受到客户端之间非独立和同分布(non-IID)数据的影响,导致对本地客户端数据的推理性能下降。在本文中,我们提出了一个新的框架,即个性化隐私保护联邦学习(PPPFL),专注于跨筒仓FL来克服这些挑战。具体来说,我们引入了模型不可知论元学习(MAML)算法的稳定变体,以协同训练由微分私有生成对抗网络(DP-GANs)生成的客户端合成数据的全局初始化。在达到收敛后,全局初始化将由客户端根据其私有数据在本地进行调整。通过广泛的实验,我们实证地表明,我们提出的框架在不同的数据集上优于多个FL基线,包括MNIST、Fashion-MNIST、CIFAR-10和CIFAR-100。
{"title":"Personalized Privacy-Preserving Framework for Cross-Silo Federated Learning","authors":"Van-Tuan Tran;Huy-Hieu Pham;Kok-Seng Wong","doi":"10.1109/TETC.2024.3356068","DOIUrl":"10.1109/TETC.2024.3356068","url":null,"abstract":"Federated learning (FL) is recently surging as a promising decentralized deep learning (DL) framework that enables DL-based approaches trained collaboratively across clients without sharing private data. However, in the context of the central party being active and dishonest, the data of individual clients might be perfectly reconstructed, leading to the high possibility of sensitive information being leaked. Moreover, FL also suffers from the nonindependent and identically distributed (non-IID) data among clients, resulting in the degradation in the inference performance on local clients’ data. In this paper, we propose a novel framework, namely Personalized Privacy-Preserving Federated Learning (PPPFL), with a concentration on cross-silo FL to overcome these challenges. Specifically, we introduce a stabilized variant of the Model-Agnostic Meta-Learning (MAML) algorithm to collaboratively train a global initialization from clients’ synthetic data generated by Differential Private Generative Adversarial Networks (DP-GANs). After reaching convergence, the global initialization will be locally adapted by the clients to their private data. Through extensive experiments, we empirically show that our proposed framework outperforms multiple FL baselines on different datasets, including MNIST, Fashion-MNIST, CIFAR-10, and CIFAR-100.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 4","pages":"1014-1024"},"PeriodicalIF":5.1,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139956627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Domain Adaptation via Contrastive Adversarial Domain Mixup: A Case Study on COVID-19 通过对比性对抗性领域混合实现无监督领域适应:COVID-19 案例研究
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-26 DOI: 10.1109/TETC.2024.3354419
Huimin Zeng;Zhenrui Yue;Lanyu Shang;Yang Zhang;Dong Wang
Training large deep learning (DL) models with high performance for natural language downstream tasks usually requires rich-labeled data. However, in a real-world application of COVID-19 information service (e.g., misinformation detection, question answering), a fundamental challenge is the lack of the labeled COVID data to enable supervised end-to-end training of the models for different downstream tasks, especially at the early stage of the pandemic. To address this challenge, we propose an unsupervised domain adaptation framework using contrastive learning and adversarial domain mixup to transfer the knowledge from an existing source data domain to the target COVID-19 data domain. In particular, to bridge the gap between the source domain and the target domain, our method reduces a radial basis function (RBF) based discrepancy between these two domains. Moreover, we leverage the power of domain adversarial examples to establish an intermediate domain mixup, where the latent representations of the input text from both domains could be mixed during the training process. In this paper, we focus on two prevailing downstream tasks in mining COVID-19 text data: COVID-19 misinformation detection and COVID-19 news question answering. Extensive domain adaptation experiments on multiple real-world datasets suggest that our method can effectively adapt misinformation detection and question answering systems to the unseen COVID-19 target domain with significant improvements compared to the state-of-the-art baselines.
训练高性能的大型深度学习(DL)模型用于自然语言下游任务通常需要丰富的标记数据。然而,在COVID-19信息服务的实际应用中(例如,错误信息检测、问题回答),一个根本的挑战是缺乏标记的COVID数据,无法为不同的下游任务(特别是在大流行的早期阶段)对模型进行监督式的端到端训练。为了应对这一挑战,我们提出了一种使用对比学习和对抗性域混合的无监督域自适应框架,将知识从现有源数据域转移到目标COVID-19数据域。特别是,为了弥合源域和目标域之间的差距,我们的方法减少了两个域之间基于径向基函数(RBF)的差异。此外,我们利用领域对抗示例的力量来建立一个中间领域混合,其中来自两个领域的输入文本的潜在表示可以在训练过程中混合。在本文中,我们重点研究了挖掘COVID-19文本数据的两个主流下游任务:COVID-19错误信息检测和COVID-19新闻问答。在多个真实数据集上进行的广泛领域自适应实验表明,与最先进的基线相比,我们的方法可以有效地使错误信息检测和问答系统适应未知的COVID-19目标领域,并有显著改进。
{"title":"Unsupervised Domain Adaptation via Contrastive Adversarial Domain Mixup: A Case Study on COVID-19","authors":"Huimin Zeng;Zhenrui Yue;Lanyu Shang;Yang Zhang;Dong Wang","doi":"10.1109/TETC.2024.3354419","DOIUrl":"10.1109/TETC.2024.3354419","url":null,"abstract":"Training large deep learning (DL) models with high performance for natural language downstream tasks usually requires rich-labeled data. However, in a real-world application of COVID-19 information service (e.g., misinformation detection, question answering), a fundamental challenge is the lack of the labeled COVID data to enable supervised end-to-end training of the models for different downstream tasks, especially at the early stage of the pandemic. To address this challenge, we propose an unsupervised domain adaptation framework using contrastive learning and adversarial domain mixup to transfer the knowledge from an existing source data domain to the target COVID-19 data domain. In particular, to bridge the gap between the source domain and the target domain, our method reduces a radial basis function (RBF) based discrepancy between these two domains. Moreover, we leverage the power of domain adversarial examples to establish an intermediate domain mixup, where the latent representations of the input text from both domains could be mixed during the training process. In this paper, we focus on two prevailing downstream tasks in mining COVID-19 text data: COVID-19 misinformation detection and COVID-19 news question answering. Extensive domain adaptation experiments on multiple real-world datasets suggest that our method can effectively adapt misinformation detection and question answering systems to the unseen COVID-19 target domain with significant improvements compared to the state-of-the-art baselines.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 4","pages":"1105-1116"},"PeriodicalIF":5.1,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10415352","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139947901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware-Aware DNN Compression via Diverse Pruning and Mixed-Precision Quantization 通过多样化剪枝和混合精度量化实现硬件感知的 DNN 压缩
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-03 DOI: 10.1109/TETC.2023.3346944
Konstantinos Balaskas;Andreas Karatzas;Christos Sad;Kostas Siozios;Iraklis Anagnostopoulos;Georgios Zervakis;Jörg Henkel
Deep Neural Networks (DNNs) have shown significant advantages in a wide variety of domains. However, DNNs are becoming computationally intensive and energy hungry at an exponential pace, while at the same time, there is a vast demand for running sophisticated DNN-based services on resource constrained embedded devices. In this paper, we target energy-efficient inference on embedded DNN accelerators. To that end, we propose an automated framework to compress DNNs in a hardware-aware manner by jointly employing pruning and quantization. We explore, for the first time, per-layer fine- and coarse-grained pruning, in the same DNN architecture, in addition to low bit-width mixed-precision quantization for weights and activations. Reinforcement Learning (RL) is used to explore the associated design space and identify the pruning-quantization configuration so that the energy consumption is minimized whilst the prediction accuracy loss is retained at acceptable levels. Using our novel composite RL agent we are able to extract energy-efficient solutions without requiring retraining and/or fine tuning. Our extensive experimental evaluation over widely used DNNs and the CIFAR-10/100 and ImageNet datasets demonstrates that our framework achieves 39% average energy reduction for 1.7% average accuracy loss and outperforms significantly the state-of-the-art approaches.
深度神经网络(DNN)已在众多领域显示出显著优势。然而,DNN 正以指数级的速度变得计算密集、能耗高,与此同时,在资源受限的嵌入式设备上运行基于 DNN 的复杂服务的需求也非常大。在本文中,我们的目标是在嵌入式 DNN 加速器上实现高能效推理。为此,我们提出了一个自动化框架,通过联合使用剪枝和量化技术,以硬件感知的方式压缩 DNN。除了对权重和激活进行低位宽混合精度量化外,我们还首次在同一 DNN 架构中探索了每层细粒度和粗粒度剪枝。强化学习(RL)用于探索相关的设计空间,并确定剪枝量化配置,从而使能耗最小,同时将预测精度损失保持在可接受的水平。利用我们新颖的复合 RL 代理,我们能够提取节能解决方案,而无需重新训练和/或微调。我们对广泛使用的 DNN 以及 CIFAR-10/100 和 ImageNet 数据集进行了广泛的实验评估,结果表明我们的框架在平均精度损失 1.7%$ 的情况下实现了 39%$ 的平均能耗降低,明显优于最先进的方法。
{"title":"Hardware-Aware DNN Compression via Diverse Pruning and Mixed-Precision Quantization","authors":"Konstantinos Balaskas;Andreas Karatzas;Christos Sad;Kostas Siozios;Iraklis Anagnostopoulos;Georgios Zervakis;Jörg Henkel","doi":"10.1109/TETC.2023.3346944","DOIUrl":"10.1109/TETC.2023.3346944","url":null,"abstract":"Deep Neural Networks (DNNs) have shown significant advantages in a wide variety of domains. However, DNNs are becoming computationally intensive and energy hungry at an exponential pace, while at the same time, there is a vast demand for running sophisticated DNN-based services on resource constrained embedded devices. In this paper, we target energy-efficient inference on embedded DNN accelerators. To that end, we propose an automated framework to compress DNNs in a hardware-aware manner by jointly employing pruning and quantization. We explore, for the first time, per-layer fine- and coarse-grained pruning, in the same DNN architecture, in addition to low bit-width mixed-precision quantization for weights and activations. Reinforcement Learning (RL) is used to explore the associated design space and identify the pruning-quantization configuration so that the energy consumption is minimized whilst the prediction accuracy loss is retained at acceptable levels. Using our novel composite RL agent we are able to extract energy-efficient solutions without requiring retraining and/or fine tuning. Our extensive experimental evaluation over widely used DNNs and the CIFAR-10/100 and ImageNet datasets demonstrates that our framework achieves 39% average energy reduction for 1.7% average accuracy loss and outperforms significantly the state-of-the-art approaches.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 4","pages":"1079-1092"},"PeriodicalIF":5.1,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139163154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining Trust Graphs and Keystroke Dynamics to Counter Fake Identities in Social Networks 结合信任图谱和按键动态,打击社交网络中的虚假身份
IF 5.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-01 DOI: 10.1109/TETC.2023.3346691
Francesco Buccafurri;Gianluca Lax;Denis Migdal;Lorenzo Musarella;Christophe Rosenberger
Fake identity in social networks is a phenomenon that is strongly increasing, and it is used for discovering personal information, identity theft, influencing people, spreading fake news, fraud, and so on. In this article, we face this problem by introducing the concept of certified social profiles and by propagating this property through a collaborative approach that exploits keystroke-dynamic-recognition techniques to identify illegal access to certified profiles. We propose a decentralized approach to compute the trust level of a social profile, and we show the robustness of the proposal by analyzing the security of the trust mechanism through experimental validation.
社交网络中的假身份是一种正在强劲增长的现象,它被用于发现个人信息、窃取身份、影响他人、传播假新闻、欺诈等。在本文中,我们将通过引入经过认证的社会配置文件的概念,并通过一种利用击键动态识别技术来识别对经过认证的配置文件的非法访问的协作方法来传播该属性,从而面对这个问题。我们提出了一种去中心化的方法来计算社交档案的信任水平,并通过实验验证分析了信任机制的安全性,证明了该提议的鲁棒性。
{"title":"Combining Trust Graphs and Keystroke Dynamics to Counter Fake Identities in Social Networks","authors":"Francesco Buccafurri;Gianluca Lax;Denis Migdal;Lorenzo Musarella;Christophe Rosenberger","doi":"10.1109/TETC.2023.3346691","DOIUrl":"10.1109/TETC.2023.3346691","url":null,"abstract":"Fake identity in social networks is a phenomenon that is strongly increasing, and it is used for discovering personal information, identity theft, influencing people, spreading fake news, fraud, and so on. In this article, we face this problem by introducing the concept of certified social profiles and by propagating this property through a collaborative approach that exploits keystroke-dynamic-recognition techniques to identify illegal access to certified profiles. We propose a decentralized approach to compute the trust level of a social profile, and we show the robustness of the proposal by analyzing the security of the trust mechanism through experimental validation.","PeriodicalId":13156,"journal":{"name":"IEEE Transactions on Emerging Topics in Computing","volume":"12 4","pages":"1066-1078"},"PeriodicalIF":5.1,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139956623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Emerging Topics in Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1