首页 > 最新文献

2021 International Conference on Networking and Network Applications (NaNA)最新文献

英文 中文
Design of Binocular Stereo Vision System Via CNN-based Stereo Matching Algorithm 基于cnn立体匹配算法的双目立体视觉系统设计
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00080
Yan Jiao, P. Ho
In this paper, we design a binocular stereo vision system based on an adjustable narrow-baseline stereo camera for extracting depth information from a rectified stereo pair. The camera calibration and rectification are performed to get a rectified stereo pair serving as the input to the stereo matching algorithm. This algorithm searches the corresponding points between the left and right images and produces a disparity map that is used to obtain the depths via the triangulation principle. We focus on the first stage of the algorithm and propose a CNN-based approach to calculating the matching cost. Fast and slow networks are presented and trained on standard stereo datasets. The output of either network is regarded as the initial matching cost, followed by a series of post-processing methods for generating qualified disparity maps. The contrast tests have demonstrated that the CNN-based methods outperform census transformation on the mentioned datasets. Finally, we advance two error criteria to acquire the range of system working distance under diverse baseline lengths.
本文设计了一种基于可调窄基线立体相机的双目立体视觉系统,用于从整流立体对中提取深度信息。对摄像机进行标定和校正,得到校正后的立体对作为立体匹配算法的输入。该算法搜索左右图像之间的对应点,生成视差图,通过三角剖分原理获得深度。我们重点研究了算法的第一阶段,提出了一种基于cnn的匹配代价计算方法。快速和慢速网络在标准立体数据集上呈现和训练。将任意一个网络的输出作为初始匹配代价,然后通过一系列的后处理方法生成合格的视差图。对比测试表明,基于cnn的方法在上述数据集上优于普查变换。最后,我们提出了两个误差准则,以获得不同基线长度下系统工作距离的范围。
{"title":"Design of Binocular Stereo Vision System Via CNN-based Stereo Matching Algorithm","authors":"Yan Jiao, P. Ho","doi":"10.1109/NaNA53684.2021.00080","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00080","url":null,"abstract":"In this paper, we design a binocular stereo vision system based on an adjustable narrow-baseline stereo camera for extracting depth information from a rectified stereo pair. The camera calibration and rectification are performed to get a rectified stereo pair serving as the input to the stereo matching algorithm. This algorithm searches the corresponding points between the left and right images and produces a disparity map that is used to obtain the depths via the triangulation principle. We focus on the first stage of the algorithm and propose a CNN-based approach to calculating the matching cost. Fast and slow networks are presented and trained on standard stereo datasets. The output of either network is regarded as the initial matching cost, followed by a series of post-processing methods for generating qualified disparity maps. The contrast tests have demonstrated that the CNN-based methods outperform census transformation on the mentioned datasets. Finally, we advance two error criteria to acquire the range of system working distance under diverse baseline lengths.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124833476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Covert MIMO Communication in Two-hop Relay Systems 两跳中继系统中的隐蔽MIMO通信
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00019
Hengbing Zhu, Huihui Wu, Xiaohong Jiang
Covert communication can be traced back to secret information transmission technology. It aims to ensure that the transmitters and receivers establish reliable communication with a low probability detection by the warden in wireless communications. The scenario of this paper assumes a covert multiple-input-multiple-output (MIMO) communication in a two-hop relay system, in which a transmitter with multi-antenna sends covert messages to a multi-antenna receiver via a single-antenna half-duplex relay against the detection of a single-antenna warden. We first propose an antenna selection scheme to ensure the covertness of communications, where the transmitter and receiver use an optimally selected subset of antennas to transmit or receive the covert messages and the remaining antennas to generate artificial noise (AN). To depict the performance of covert transmission of the system, we analyze the average detection error probability and derive a closed-form expression. We further conduct theoretical covert throughput with a covertness constraint, and analysis to maximize it in the worst case of the system. Finally, the simulation results illustrate the impact of AN, the number of antennas as well as the transmission rate on the performance of this two-hop covert MIMO communication system.
秘密通信可以追溯到秘密信息传输技术。它的目的是在无线通信中,保证发射机和接收机建立可靠的通信,并且被监狱长发现的概率很低。本文假设在两跳中继系统中存在隐蔽的多输入多输出(MIMO)通信,其中具有多天线的发射器通过单天线半双工中继向多天线接收器发送隐蔽消息,以抵抗单天线监控器的检测。我们首先提出了一种确保通信隐蔽性的天线选择方案,其中发射机和接收机使用最佳选择的天线子集来发送或接收隐蔽消息,其余天线产生人工噪声(an)。为了描述系统隐蔽传输的性能,我们分析了平均检测误差概率,并推导了一个封闭形式的表达式。我们进一步在隐蔽性约束下进行了理论隐蔽吞吐量,并分析了在系统最坏情况下如何最大化隐蔽吞吐量。最后,仿真结果说明了AN、天线数量以及传输速率对该二跳隐蔽MIMO通信系统性能的影响。
{"title":"Covert MIMO Communication in Two-hop Relay Systems","authors":"Hengbing Zhu, Huihui Wu, Xiaohong Jiang","doi":"10.1109/NaNA53684.2021.00019","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00019","url":null,"abstract":"Covert communication can be traced back to secret information transmission technology. It aims to ensure that the transmitters and receivers establish reliable communication with a low probability detection by the warden in wireless communications. The scenario of this paper assumes a covert multiple-input-multiple-output (MIMO) communication in a two-hop relay system, in which a transmitter with multi-antenna sends covert messages to a multi-antenna receiver via a single-antenna half-duplex relay against the detection of a single-antenna warden. We first propose an antenna selection scheme to ensure the covertness of communications, where the transmitter and receiver use an optimally selected subset of antennas to transmit or receive the covert messages and the remaining antennas to generate artificial noise (AN). To depict the performance of covert transmission of the system, we analyze the average detection error probability and derive a closed-form expression. We further conduct theoretical covert throughput with a covertness constraint, and analysis to maximize it in the worst case of the system. Finally, the simulation results illustrate the impact of AN, the number of antennas as well as the transmission rate on the performance of this two-hop covert MIMO communication system.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125081098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Buffer-Aided Relay Selection for Wireless Cooperative Relay Networks with Untrusted Relays 具有不可信中继的无线协作中继网络的缓冲辅助中继选择
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00020
Cheng Zhang, Xuening Liao, Zhenqiang Wu, Guoyong Qiu
Wireless cooperative relay networks are widely used in various fields. Wireless channels are vulnerable to eavesdroppers because of the broadcast characteristics of wireless channels, the security problem of wireless cooperative relay networks needs to be solved urgently, and the trust level of relays is rarely considered in existing work. Therefore, the paper considers a wireless cooperative relay network with a passive eavesdropping node and untrusted relays and designs a trusted buffer-aided relay selection (TBARS) scheme based on the fact that the channel state information (CSI) of eavesdropping channel is hard to obtain. The paper uses the secrecy outage probability (SOP) to measure the security performance, derives the expression of the SOP based on Markov Process, and verify the feasibility of the TBARS scheme by simulations and analyzes the impact of various factors on the SOP of the TBARS scheme. Finally, the paper compares the TBARS scheme with max-link scheme in terms of the SOP, and the simulations demonstrate that the proposed scheme outperforms the other schemes.
无线协同中继网络广泛应用于各个领域。由于无线信道的广播特性,无线信道容易受到窃听者的攻击,无线协同中继网络的安全问题亟待解决,而现有工作中很少考虑中继的信任级别。因此,本文考虑一个具有无源窃听节点和不可信中继的无线协同中继网络,并基于窃听信道的信道状态信息(CSI)难以获取的事实,设计了可信缓冲辅助中继选择(TBARS)方案。本文采用保密中断概率(SOP)来衡量安全性能,推导了基于马尔可夫过程的SOP表达式,并通过仿真验证了TBARS方案的可行性,分析了各种因素对TBARS方案SOP的影响。最后,将TBARS方案与max-link方案在SOP方面进行了比较,仿真结果表明TBARS方案优于其他方案。
{"title":"Buffer-Aided Relay Selection for Wireless Cooperative Relay Networks with Untrusted Relays","authors":"Cheng Zhang, Xuening Liao, Zhenqiang Wu, Guoyong Qiu","doi":"10.1109/NaNA53684.2021.00020","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00020","url":null,"abstract":"Wireless cooperative relay networks are widely used in various fields. Wireless channels are vulnerable to eavesdroppers because of the broadcast characteristics of wireless channels, the security problem of wireless cooperative relay networks needs to be solved urgently, and the trust level of relays is rarely considered in existing work. Therefore, the paper considers a wireless cooperative relay network with a passive eavesdropping node and untrusted relays and designs a trusted buffer-aided relay selection (TBARS) scheme based on the fact that the channel state information (CSI) of eavesdropping channel is hard to obtain. The paper uses the secrecy outage probability (SOP) to measure the security performance, derives the expression of the SOP based on Markov Process, and verify the feasibility of the TBARS scheme by simulations and analyzes the impact of various factors on the SOP of the TBARS scheme. Finally, the paper compares the TBARS scheme with max-link scheme in terms of the SOP, and the simulations demonstrate that the proposed scheme outperforms the other schemes.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116392921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Cooperative Authentication Mechanism and Performance Evaluation for Unmanned Systems 无人系统协同认证机制与性能评估
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00043
Yue Zhao, Yarang Yang, Yiru Niu, Dongyu Yang, Bo Tian, Yao Hao, Kaijun Wu
The paper proposed a wireless access authentication mechanism for unmanned systems, which can effectively solve the problem of secure access authentication under the dynamic change of network topology. The authentication process of cooperative authentication and the realization of secure access were designed to meet the application requirements of random access and anti-attack capabilities. The simulation results showed that the cooperative authentication mechanism not only ensures the security of the unmanned system, but also reduces the transmission overhead and the number of interactive authentications. The network access time is less than 30 milliseconds, and the success ratio of network access is close to 100%.
本文提出了一种无人系统无线接入认证机制,可以有效解决网络拓扑动态变化下的安全接入认证问题。为了满足随机访问和抗攻击能力的应用需求,设计了协作认证的认证过程和安全访问的实现。仿真结果表明,协作认证机制不仅保证了无人系统的安全性,而且减少了传输开销和交互认证次数。网络访问时间小于30毫秒,网络访问成功率接近100%。
{"title":"The Cooperative Authentication Mechanism and Performance Evaluation for Unmanned Systems","authors":"Yue Zhao, Yarang Yang, Yiru Niu, Dongyu Yang, Bo Tian, Yao Hao, Kaijun Wu","doi":"10.1109/NaNA53684.2021.00043","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00043","url":null,"abstract":"The paper proposed a wireless access authentication mechanism for unmanned systems, which can effectively solve the problem of secure access authentication under the dynamic change of network topology. The authentication process of cooperative authentication and the realization of secure access were designed to meet the application requirements of random access and anti-attack capabilities. The simulation results showed that the cooperative authentication mechanism not only ensures the security of the unmanned system, but also reduces the transmission overhead and the number of interactive authentications. The network access time is less than 30 milliseconds, and the success ratio of network access is close to 100%.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132145039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dyn-GCN: Graph Embedding via Dynamic Evolution and Graph Convolutional Network for Personal Recommendation 基于动态进化和图卷积网络的个人推荐图嵌入
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00077
Zhihui Wang, Jianrui Chen, Peijie Wang, Tingting Zhu
Graph convolutional network (GCN) and dynamic evolutionary model are the mainstream collaborative filtering technologies in recent years. Nevertheless, the initial feature vectors selection problem of the existing recommendation algorithms based on dynamic evolutionary models leads to unstable recommendation accuracy. In addition, the collaborative filtering method of GCN does not take into account the dynamic evolution law of graph networks. Based on this, this research adopts GCN to train the initial embedding of the dynamic evolution model to perform collaborative filtering recommendation. First of all, a heterogeneous graph network is constructed by applying explicit feedback information (rating scores) of users. Secondly, the embedding of users and items are propagated through the dynamic evolution model. Then, the final embedding is obtained by weighting the embedding of each layer, and the scores are predicted. Finally, according to the Adam optimizer, the initial embedding of the dynamic evolution model is trained in the form of mini-batch to minimize the loss function. Experimental results show that the proposed algorithm is superior to several compared excellent algorithms in recommendation performance.
图卷积网络(GCN)和动态进化模型是近年来主流的协同过滤技术。然而,现有的基于动态进化模型的推荐算法存在初始特征向量选择问题,导致推荐精度不稳定。此外,GCN的协同过滤方法没有考虑图网络的动态演化规律。基于此,本研究采用GCN对动态演化模型初始嵌入进行训练,进行协同过滤推荐。首先,利用用户的显式反馈信息(评分分数)构建异构图网络。其次,通过动态演化模型对用户和项目的嵌入进行传播;然后,对每一层的嵌入值进行加权得到最终的嵌入值,并对得分进行预测。最后,根据Adam优化器,以mini-batch的形式训练动态进化模型的初始嵌入,使损失函数最小化。实验结果表明,该算法在推荐性能上优于几种比较优秀的算法。
{"title":"Dyn-GCN: Graph Embedding via Dynamic Evolution and Graph Convolutional Network for Personal Recommendation","authors":"Zhihui Wang, Jianrui Chen, Peijie Wang, Tingting Zhu","doi":"10.1109/NaNA53684.2021.00077","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00077","url":null,"abstract":"Graph convolutional network (GCN) and dynamic evolutionary model are the mainstream collaborative filtering technologies in recent years. Nevertheless, the initial feature vectors selection problem of the existing recommendation algorithms based on dynamic evolutionary models leads to unstable recommendation accuracy. In addition, the collaborative filtering method of GCN does not take into account the dynamic evolution law of graph networks. Based on this, this research adopts GCN to train the initial embedding of the dynamic evolution model to perform collaborative filtering recommendation. First of all, a heterogeneous graph network is constructed by applying explicit feedback information (rating scores) of users. Secondly, the embedding of users and items are propagated through the dynamic evolution model. Then, the final embedding is obtained by weighting the embedding of each layer, and the scores are predicted. Finally, according to the Adam optimizer, the initial embedding of the dynamic evolution model is trained in the form of mini-batch to minimize the loss function. Experimental results show that the proposed algorithm is superior to several compared excellent algorithms in recommendation performance.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127568859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Firewall Application for Mitigating Flooding Attacks on an SDN Network 缓解SDN网络泛洪攻击的新型防火墙应用
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00084
Yubaraj Gautam, Kazuhiko Sato, B. P. Gautam, N. Shiratori
A software-defined network (SDN) is an emerging network technology that can augment the data plane with a control plane using programming techniques. However, there are certain security challenges that must be addressed to achieve secure communication. Flooding attacks have been one of the most common threats on the internet since the last decade. They have become a challenge for SDNs as well. To address this issue, we have proposed a novel firewall application, which has been developed based on multiple stages of the packet filtering technique, and provide layer-based security and a flood attack prevention system. The proposed application mainly comprises two security entities—one provides layer-based security, while the other has been designed specifically for preventing and mitigating flooding attacks. The layer-based packet filtering technique, which has been applied in the proposed system, filters all types of unwanted packets using the layer (layers 2, 3, and 4)-based packet header entity. Meanwhile, the flooding attack prevention system functions by counting the number of packets and their sizes. The proposed solution was tested for different attack scenarios; it was able to prevent 74.12% of flooding attacks, while conducting flooding attacks in SDN.
软件定义网络(SDN)是一种新兴的网络技术,它可以利用编程技术在数据平面上增加控制平面。然而,要实现安全通信,必须解决某些安全挑战。自过去十年以来,洪水攻击一直是互联网上最常见的威胁之一。它们也成为sdn的挑战。为了解决这一问题,我们提出了一种基于多阶段包过滤技术开发的新型防火墙应用程序,并提供了基于层的安全性和洪水攻击防御系统。该应用程序主要由两个安全实体组成,一个提供基于层的安全性,另一个专门用于预防和减轻洪水攻击。该系统采用了基于层的包过滤技术,利用基于层(第2、3、4层)的包头实体过滤所有类型的不需要的包。同时,flood攻击防范系统通过统计报文数量和报文大小来实现攻击防范功能。针对不同的攻击场景对提出的解决方案进行了测试;在SDN进行泛洪攻击时,能够阻止74.12%的泛洪攻击。
{"title":"Novel Firewall Application for Mitigating Flooding Attacks on an SDN Network","authors":"Yubaraj Gautam, Kazuhiko Sato, B. P. Gautam, N. Shiratori","doi":"10.1109/NaNA53684.2021.00084","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00084","url":null,"abstract":"A software-defined network (SDN) is an emerging network technology that can augment the data plane with a control plane using programming techniques. However, there are certain security challenges that must be addressed to achieve secure communication. Flooding attacks have been one of the most common threats on the internet since the last decade. They have become a challenge for SDNs as well. To address this issue, we have proposed a novel firewall application, which has been developed based on multiple stages of the packet filtering technique, and provide layer-based security and a flood attack prevention system. The proposed application mainly comprises two security entities—one provides layer-based security, while the other has been designed specifically for preventing and mitigating flooding attacks. The layer-based packet filtering technique, which has been applied in the proposed system, filters all types of unwanted packets using the layer (layers 2, 3, and 4)-based packet header entity. Meanwhile, the flooding attack prevention system functions by counting the number of packets and their sizes. The proposed solution was tested for different attack scenarios; it was able to prevent 74.12% of flooding attacks, while conducting flooding attacks in SDN.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126317039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy-Preserving Federated Generative Adversarial Network for IoT 保护隐私的物联网联邦生成对抗网络
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00021
Hui Wang, Yani Han, Shaojing Yang, Anxiao Song, Tao Zhang
Federated Learning (FL) shows its great vitality for terminal devices of Internet of Things (IoT) in privacy protection. However, the amount of data on each device in IoT are imbalanced which makes the global training model rarely effective. Although Generative Adversarial Network (GAN) can generate data to alleviate the above problem, it has the characteristic of training instability and still carries the risk of privacy breach. In this paper, we propose a novel privacy-preserving federated GAN framework, named P-FedGAN, to train a federated generative model with privacy protection function. Each device uses the trained model to generate enough synthetic data to replace sensitive data to train desired model that can complete typical data analysis tasks. We carry out several sets of experiments to test the validity of proposed framework. The results of the experiments indicate that proposed framework meets differential privacy constraints and produces high-quality model utility compared to federated average algorithm simultaneously.
联邦学习(FL)在物联网终端设备隐私保护方面显示出巨大的生命力。然而,物联网中每个设备上的数据量是不平衡的,这使得全局训练模型很少有效。虽然生成式对抗网络(GAN)可以生成数据来缓解上述问题,但它具有训练不稳定的特点,仍然存在隐私泄露的风险。为了训练具有隐私保护功能的联邦生成模型,本文提出了一种新的隐私保护联邦GAN框架P-FedGAN。每台设备使用训练好的模型生成足够的合成数据来替换敏感数据,从而训练出能够完成典型数据分析任务的所需模型。我们进行了几组实验来测试所提出框架的有效性。实验结果表明,与联邦平均算法相比,该框架在满足差分隐私约束的同时产生了高质量的模型效用。
{"title":"Privacy-Preserving Federated Generative Adversarial Network for IoT","authors":"Hui Wang, Yani Han, Shaojing Yang, Anxiao Song, Tao Zhang","doi":"10.1109/NaNA53684.2021.00021","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00021","url":null,"abstract":"Federated Learning (FL) shows its great vitality for terminal devices of Internet of Things (IoT) in privacy protection. However, the amount of data on each device in IoT are imbalanced which makes the global training model rarely effective. Although Generative Adversarial Network (GAN) can generate data to alleviate the above problem, it has the characteristic of training instability and still carries the risk of privacy breach. In this paper, we propose a novel privacy-preserving federated GAN framework, named P-FedGAN, to train a federated generative model with privacy protection function. Each device uses the trained model to generate enough synthetic data to replace sensitive data to train desired model that can complete typical data analysis tasks. We carry out several sets of experiments to test the validity of proposed framework. The results of the experiments indicate that proposed framework meets differential privacy constraints and produces high-quality model utility compared to federated average algorithm simultaneously.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125878715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2021 International Conference on Networking and Network Applications (NaNA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1