A review on federated learning towards image processing

被引:43
作者
KhoKhar, Fahad Ahmed [1 ]
Shah, Jamal Hussain [1 ]
Khan, Muhammad Attique [2 ]
Sharif, Muhammad [1 ]
Tariq, Usman [3 ]
Kadry, Seifedine [4 ]
机构
[1] COMSATS Univ Islamabad, Dept Comp Sci, Wah Campus, Islamabad 47040, Pakistan
[2] HITEC Unnvers Taxila, Dept Comp Sci, Taxila 47080, Pakistan
[3] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharaj, Saudi Arabia
[4] Noroff Univ Coll, Fac Appl Comp & Technol, Kristiansand, Norway
关键词
Ederated learning; Data privacy; Edge computing; Secure communication; Tensorflow federated; COMMUNICATION; ASSOCIATION; FRAMEWORK; SYSTEM;
D O I
10.1016/j.compeleceng.2022.107818
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, data privacy is an important consideration in machine learning. This paper provides an overview of how Federated Learning can be used to improve data security and privacy. Federated Learning is made up of three distinct architectures that ensure that privacy is never jeopardised. Federated learning is a type of collective learning in which individual edge devices are trained and then aggregated on the server without sharing edge device data. On the other hand, federated learning provides secure models with no data sharing, resulting in a highly efficient privacy-preserving solution that also provides security and data access. We discuss the various frameworks used in federated learning, as well as how federated learning is used with machine learning, deep learning, and datamining. This paper focuses on image processing applications that ensure that data trained on the model is secure and protected. We provide a comprehensive overview of the key issues raised in recent literature, as well as an accurate description of the related research work.
引用
收藏
页数:19
相关论文
共 161 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
Ahsan Aziz, 2021, COMPUT MAT CONTUNUA, V70, P2
[3]  
Alameh R., 2013, Method and system for conducting communication between mobile devices, Patent No. [US8391719B2, 8391719]
[4]  
Ali Khan Junaid, 2020, MULTIMED TOOLS APPL, P1
[5]   Big data analysis for brain tumor detection: Deep convolutional neural networks [J].
Amin, Javeria ;
Sharif, Muhammad ;
Yasmin, Mussarat ;
Fernandes, Steven Lawrence .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 :290-297
[6]  
Ammad-ud-din M., 2019, ARXIV190109888CSSTAT
[7]  
[Anonymous], FL QSAR FEDERATED LE, DOI [10.1101/2020.02.27.950592v1, DOI 10.1101/2020.02.27.950592V1]
[8]  
[Anonymous], FACING SMALL BIASED, DOI [10.1101/2020.03.19.998898v1, DOI 10.1101/2020.03.19.998898V1]
[9]  
[Anonymous], 2006, P 2006 ACM S APPL CO
[10]  
[Anonymous], 2016, arXiv