FeLebrities: A User-Centric Assessment of Federated Learning Frameworks

被引:0
作者
Riviera, Walter [1 ]
Galazzo, Ilaria Boscolo [2 ]
Menegaz, Gloria [2 ]
机构
[1] Univ Verona, Dept Comp Sci, I-37134 Verona, Italy
[2] Univ Verona, Dept Engn Innovat Med, I-37134 Verona, Italy
关键词
Federated learning tools; distributed systems; AI at scale; PRIVACY;
D O I
10.1109/ACCESS.2023.3312579
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Federated Learning (FL) is a new paradigm aimed at solving data access problems. It provides a solution by moving the focus from sharing data to sharing models. The FL paradigm involves different entities (institutions) holding proprietary datasets that, contributing with each other to train a global Artificial Intelligence (AI) model using their own locally available data. Although several studies have proposed methods to distribute the computation or aggregate results, few efforts have been made to cover on how to implement FL pipelines. With the aim of accelerating the exploitation of FL frameworks, this paper proposes a survey of public tools that are currently available for building FL pipelines, an objective ranking based on the current state of user preferences, and an assessment of the growing trend of the tool's popularity over a one year time window, with measurements performed every six months. These measurements include objective metrics, like the number of "Watch," "Star" and "Follow" available from software repositories as well as thirteen custom metrics grouped into three main categories: Usability, Portability, and Flexibility. Finally, a ranking of the maturity of the tools is derived based on the key aspects to consider when building a FL pipeline.
引用
收藏
页码:96865 / 96878
页数:14
相关论文
共 50 条
[31]   Formal Specification and Verification of User-centric Privacy Policies for Ubiquitous Systems [J].
Joshaghani, Rezvan ;
Black, Stacy ;
Sherman, Elena ;
Mehrpouyan, Hoda .
IDEAS '19: PROCEEDINGS OF THE 23RD INTERNATIONAL DATABASE APPLICATIONS & ENGINEERING SYMPOSIUM (IDEAS 2019), 2019, :252-261
[32]   Comments on "PassBio: Privacy-Preserving User-Centric Biometric Authentication" [J].
Kwon, Hee-Yong ;
Lee, Mun-Kyu .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 :2816-2817
[33]   P2F: A User-Centric Privacy Protection Framework [J].
Jafari-Lafti, Maryam ;
Huang, Chin-Tser ;
Farkas, Csilla .
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, :386-391
[34]   Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy [J].
Ahmad I. ;
Farzan R. ;
Kapadia A. ;
Lee A.J. .
1600, Association for Computing Machinery (04)
[35]   A Privacy-Preserving User-Centric Data-Sharing Scheme [J].
Boiarkin, Veniamin ;
Bogaz Zarpelao, Bruno ;
Al-Zaili, Jafar ;
Rajarajan, Muttukrishnan .
IEEE ACCESS, 2024, 12 :149977-149987
[36]   Enhancing Trustability of Android Applications via User-Centric Flexible Permissions [J].
Scoccia, Gian Luca ;
Malavolta, Ivano ;
Autili, Marco ;
Di Salle, Amleto ;
Inverardi, Paola .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2021, 47 (10) :2032-2051
[37]   User-centric secure integration of personal RFID tags and sensor networks [J].
Najera, Pablo ;
Roman, Rodrigo ;
Lopez, Javier .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (10) :1177-1197
[38]   Designing User-Centric Information Security Management Systems in Financial Services Organisations [J].
Bongiovanni, Ivano .
2020 IEEE 6TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2020), 2020, :192-199
[39]   Towards Privacy-Preserving Web Metering via User-Centric Hardware [J].
Alarifi, Fahad ;
Fernandez, Maribel .
INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 :329-340
[40]   Towards a user-centric theory of value-driven information security compliance [J].
Doherty, Neil F. ;
Tajuddin, Sharul T. .
INFORMATION TECHNOLOGY & PEOPLE, 2018, 31 (02) :348-367