IEEE Transactions on Sustainable Computing最新文献

筛选
英文 中文
FedGCN: A Federated Graph Convolutional Network for Privacy-Preserving Traffic Prediction 基于联邦图卷积网络的保密性交通预测
IF 3 3区 计算机科学
IEEE Transactions on Sustainable Computing Pub Date : 2024-03-22 DOI: 10.1109/TSUSC.2024.3395350
Na Hu;Wei Liang;Dafang Zhang;Kun Xie;Kuanching Li;Albert Y. Zomaya
{"title":"FedGCN: A Federated Graph Convolutional Network for Privacy-Preserving Traffic Prediction","authors":"Na Hu;Wei Liang;Dafang Zhang;Kun Xie;Kuanching Li;Albert Y. Zomaya","doi":"10.1109/TSUSC.2024.3395350","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3395350","url":null,"abstract":"Traffic prediction is crucial for intelligent transportation systems, assisting in making travel decisions, minimizing traffic congestion, and improving traffic operation efficiency. Although effective, existing centralized traffic prediction methods have privacy leakage risks. Federated learning-based traffic prediction methods keep raw data local and train the global model in a distributed way, thus preserving data privacy. Nevertheless, the spatial correlations between local clients will be broken as data exchange between local clients is not allowed in federated learning, leading to missing spatial information and inferior prediction accuracy. To this end, we propose a federated graph neural network with spatial information completion (FedGCN) for privacy-preserving traffic prediction by adopting a federated learning scheme to protect confidentiality and presenting a mending graph convolutional neural network to mend the missing spatial information during capturing spatial dependency to improve prediction accuracy. To complete the missing spatial information efficiently and capture the client-specific spatial pattern, we design a personalized training scheme for the mending graph neural network, reducing communication overhead. The experiments on four public traffic datasets demonstrate that the proposed model outperforms the best baseline with a ratio of 3.82%, 1.82%, 2.13%, and 1.49% in terms of absolute mean error while preserving privacy.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 6","pages":"925-935"},"PeriodicalIF":3.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Third-Party Auditor to Help Federated Learning: An Efficient Byzantine-Robust Federated Learning 使用第三方审计师帮助联邦学习:一个高效的拜占庭-鲁棒联邦学习
IF 3 3区 计算机科学
IEEE Transactions on Sustainable Computing Pub Date : 2024-03-20 DOI: 10.1109/TSUSC.2024.3379440
Zhuangzhuang Zhang;Libing Wu;Debiao He;Jianxin Li;Na Lu;Xuejiang Wei
{"title":"Using Third-Party Auditor to Help Federated Learning: An Efficient Byzantine-Robust Federated Learning","authors":"Zhuangzhuang Zhang;Libing Wu;Debiao He;Jianxin Li;Na Lu;Xuejiang Wei","doi":"10.1109/TSUSC.2024.3379440","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3379440","url":null,"abstract":"Federated Learning (FL), as a distributed machine learning technique, has promise for training models with distributed data in Artificial Intelligence of Things (AIoT). However, FL is vulnerable to Byzantine attacks from diverse participants. While numerous Byzantine-robust FL solutions have been proposed, most of them involve deploying defenses at either the aggregation server or the participant level, significantly impacting the original FL process. Moreover, it will bring extra computational burden to the server or the participant, which is especially unsuitable for the resource-constrained AIoT domain. To resolve the aforementioned concerns, we propose FL-Auditor, a Byzantine-robust FL approach based on public auditing. Its core idea is to use a Third-Party Auditor (TPA) to audit samples from the FL training process, analyzing the trustworthiness of different participants, thereby helping FL obtain a more robust global model. In addition, we also design a lazy update mechanism to reduce the negative impact of sampling audit on the performance of the global model. Extensive experiments have demonstrated the effectiveness of our FL-Auditor in terms of accuracy, robustness against attacks, and flexibility. In particular, compared to the existing method, our FL-Auditor significantly reduces the computation time on the aggregation server by 8×-17×.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 6","pages":"848-861"},"PeriodicalIF":3.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and Accurate Personalized Federated Learning With Similarity-Based Model Aggregation 利用基于相似性的模型聚合实现安全、准确的个性化联合学习
IF 3 3区 计算机科学
IEEE Transactions on Sustainable Computing Pub Date : 2024-03-20 DOI: 10.1109/TSUSC.2024.3403427
Zhouyong Tan;Junqing Le;Fan Yang;Min Huang;Tao Xiang;Xiaofeng Liao
{"title":"Secure and Accurate Personalized Federated Learning With Similarity-Based Model Aggregation","authors":"Zhouyong Tan;Junqing Le;Fan Yang;Min Huang;Tao Xiang;Xiaofeng Liao","doi":"10.1109/TSUSC.2024.3403427","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3403427","url":null,"abstract":"Personalized federated learning (PFL) combines client needs and data characteristics to train personalized models for local clients. However, the most of previous PFL schemes encountered challenges such as low model prediction accuracy and privacy leakage when applied to practical datasets. Besides, the existing privacy protection methods fail to achieve satisfactory results in terms of model prediction accuracy and security simultaneously. In this paper, we propose a <u>P</u>rivacy-preserving <u>P</u>ersonalized <u>F</u>ederated <u>L</u>earning under <u>S</u>ecure <u>M</u>ulti-party <u>C</u>omputation (SMC-PPFL), which can preserve privacy while obtaining a local personalized model with high prediction accuracy. In SMC-PPFL, noise perturbation is utilized to protect similarity computation, and secure multi-party computation is employed for model sub-aggregations. This combination ensures that clients’ privacy is preserved, and the computed values remain unbiased without compromising security. Then, we propose a weighted sub-aggregation strategy based on the similarity of clients and introduce a regularization term in the local training to improve prediction accuracy. Finally, we evaluate the performance of SMC-PPFL on three common datasets. The experimental results show that SMC-PPFL achieves <inline-formula><tex-math>$2%!sim! 15%$</tex-math></inline-formula> higher prediction accuracy compared to the previous PFL schemes. Besides, the security analysis also verifies that SMC-PPFL can resist model inversion attacks and membership inference attacks.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 1","pages":"132-145"},"PeriodicalIF":3.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143184036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impacts of Increasing Temperature and Relative Humidity in Air-Cooled Tropical Data Centers 气冷式热带数据中心温度和相对湿度上升的影响
IF 3 3区 计算机科学
IEEE Transactions on Sustainable Computing Pub Date : 2024-03-20 DOI: 10.1109/TSUSC.2024.3379550
Duc Van Le;Jing Zhou;Rongrong Wang;Rui Tan;Fei Duan
{"title":"Impacts of Increasing Temperature and Relative Humidity in Air-Cooled Tropical Data Centers","authors":"Duc Van Le;Jing Zhou;Rongrong Wang;Rui Tan;Fei Duan","doi":"10.1109/TSUSC.2024.3379550","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3379550","url":null,"abstract":"Data centers (DCs) are power-intensive facilities which use a significant amount of energy for cooling the servers. Increasing the temperature and relative humidity (RH) setpoints is a rule-of-thumb approach to reducing the DC energy usage. However, the high temperature and RH may undermine the server's reliability. Before we can choose the proper temperature and RH settings, it is essential to understand how the temperature and RH setpoints affect the DC power usage and server's reliability. To this end, we constructed and experimented with an air-cooled DC testbed in Singapore, which consists of a direct expansion cooling system and 521 servers running real-world application workloads. This paper presents the key measurement results and observations from our 11-month experiments. Our results suggest that by operating at a supply air temperature setpoints of 29\u0000<inline-formula><tex-math>$^{circ }$</tex-math></inline-formula>\u0000C, our testbed achieves substantial cooling power saving with little impact on the server's reliability. Furthermore, we present a total cost of ownership (TCO) analysis framework which guides settings of the temperature and RH for a DC. Our observations and TCO analysis framework will be useful to future efforts in building and operating air-cooled DCs in tropics and beyond.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 5","pages":"790-802"},"PeriodicalIF":3.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constrained Multiobjective Optimization for UAV-Assisted Mobile Edge Computing in Smart Agriculture: Minimizing Delay and Energy Consumption 智能农业中无人机辅助移动边缘计算的约束多目标优化:最小化延迟和能耗
IF 3 3区 计算机科学
IEEE Transactions on Sustainable Computing Pub Date : 2024-03-17 DOI: 10.1109/TSUSC.2024.3401003
Kangshun Li;Shumin Xie;Tianjin Zhu;Hui Wang
{"title":"Constrained Multiobjective Optimization for UAV-Assisted Mobile Edge Computing in Smart Agriculture: Minimizing Delay and Energy Consumption","authors":"Kangshun Li;Shumin Xie;Tianjin Zhu;Hui Wang","doi":"10.1109/TSUSC.2024.3401003","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3401003","url":null,"abstract":"With the development of technology, unmanned aerial vehicles (UAVs) and Internet of Things devices are widely used in smart agriculture, resulting in significant energy consumption. In this paper, the optimization problem for UAV-assisted mobile computing in smart agriculture is modeled as a constrained multiobjective optimization problem. By jointly optimizing the deployment position of UAVs, the offloading location of the tasks, the transmit power of the devices, and the resource allocation of the UAVs, two optimization objectives (total delay and energy consumption) are minimized simultaneously. In view of the complex constraints, a constrained multiobjective algorithm named JO-DPTS is proposed. The algorithm adopts dual-population and two-stage approach to improve population convergence and diversity. The simulation results substantiate that JO-DPTS exhibits superior performance compared to the other three state-of-the-art constrained multiobjective evolutionary algorithms.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 6","pages":"948-957"},"PeriodicalIF":3.0,"publicationDate":"2024-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preserving Link Privacy in Uncertain Directed Social Graphs With Formal Guarantees
IF 3 3区 计算机科学
IEEE Transactions on Sustainable Computing Pub Date : 2024-03-13 DOI: 10.1109/TSUSC.2024.3399754
Jiajun Chen;Chunqiang Hu;Ruifeng Zhao;Shaojiang Deng;Xiaoshuang Xing;Jiguo Yu
{"title":"Preserving Link Privacy in Uncertain Directed Social Graphs With Formal Guarantees","authors":"Jiajun Chen;Chunqiang Hu;Ruifeng Zhao;Shaojiang Deng;Xiaoshuang Xing;Jiguo Yu","doi":"10.1109/TSUSC.2024.3399754","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3399754","url":null,"abstract":"Data privacy breaches have prompted growing concerns regarding privacy issues on social networks. Preserving the privacy of links in the directed social graph, where edges signify the information flow or data contributions, poses a formidable challenge. However, existing methods for uncertain graphs primarily target undirected graphs and lack rigorous privacy guarantees. In this paper, we present a personal evidence protection algorithm called PEPA, which provides formally dual privacy guarantees for directed social links. Specifically, we implement out-link privacy to protect the out-links of nodes. Despite this protection, the exposure of in-links can still compromise privacy, potentially affecting service quality. To address this, we further introduce an uncertain directed graph algorithm as a post-processing approach for out-link privacy. This algorithm injects uncertainty into nodes’ in-links, effectively transforming the original directed graph into a probability-driven uncertain structure. Additionally, we propose an effective noise optimization method. Finally, we evaluate the trade-off between privacy and utility achieved by PEPA through comparative experiments. The results demonstrate privacy enhancements of PEPA compared to the <inline-formula><tex-math>$(k, varepsilon )$</tex-math></inline-formula>-obfuscation algorithm and utility improvements over the RandWalk algorithm and UG-NDP. Particularly, PEPA demonstrates approximately a 2-fold improvement in utility compared to PEPA without noise optimization.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 1","pages":"108-119"},"PeriodicalIF":3.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143184033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Timed-Release E-Voting Scheme Based on Paillier Homomorphic Encryption 基于派利尔同态加密的定时释放电子投票方案
IF 3 3区 计算机科学
IEEE Transactions on Sustainable Computing Pub Date : 2024-03-08 DOI: 10.1109/TSUSC.2024.3371544
Ke Yuan;Peng Sang;Jian Ge;Bingcai Zhou;Chunfu Jia
{"title":"A Timed-Release E-Voting Scheme Based on Paillier Homomorphic Encryption","authors":"Ke Yuan;Peng Sang;Jian Ge;Bingcai Zhou;Chunfu Jia","doi":"10.1109/TSUSC.2024.3371544","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3371544","url":null,"abstract":"E-Voting is widely used in many social, economic, political and cultural fields for its convenience, efficiency and greenness, but how to guarantee the fairness of e-voting and the controllability of human intervention needs further in-depth research and exploration. Although the introduction of homomorphic encryption algorithm solves the problem of ballot privacy calculation, and most of these schemes solve the problem of private key confidentiality by using or overlaying multiple different methods of saving private keys, its security will be questioned as long as there is a possibility of human intervention in the saving process. To solve this problem, we propose a timed-release e-voting scheme based on Paillier homomorphic encryption. We analyze the semantic security of the ballot formally by defining the security game, and realize the legitimacy check of the ballot ciphertext through the idea of partial knowledge proof. Property analysis shows that this scheme satisfies the basic properties of the security requirements of the e-voting scheme. Performance analysis shows that this scheme is feasible to implement in practical voting.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 5","pages":"740-753"},"PeriodicalIF":3.0,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedPKR: Federated Learning With Non-IID Data via Periodic Knowledge Review in Edge Computing FedPKR:边缘计算中基于周期性知识评审的非iid数据联邦学习
IF 3 3区 计算机科学
IEEE Transactions on Sustainable Computing Pub Date : 2024-03-06 DOI: 10.1109/TSUSC.2024.3374049
Jinbo Wang;Ruijin Wang;Guangquan Xu;Donglin He;Xikai Pei;Fengli Zhang;Jie Gan
{"title":"FedPKR: Federated Learning With Non-IID Data via Periodic Knowledge Review in Edge Computing","authors":"Jinbo Wang;Ruijin Wang;Guangquan Xu;Donglin He;Xikai Pei;Fengli Zhang;Jie Gan","doi":"10.1109/TSUSC.2024.3374049","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3374049","url":null,"abstract":"Federated learning is a distributed learning paradigm, which is usually combined with edge computing to meet the joint training of IoT devices. A significant challenge in federated learning lies in the statistical heterogeneity, characterized by non-independent and identically distributed (non-IID) local data across diverse parties. This heterogeneity can result in inconsistent optimization within individual local models. Although previous research has endeavored to tackle issues stemming from heterogeneous data, our findings indicate that these attempts have not yielded high-performance neural network models. To overcome this fundamental challenge, we introduce the framework called FedPKR in this paper, which facilitates efficient federated learning through knowledge review. The core principle of FedPKR involves leveraging the knowledge representation generated by the global and local model layers to conduct periodic layer-by-layer comparative learning in a reciprocal manner. This strategy rectifies local model training, leading to enhanced outcomes. Our experimental results and subsequent analysis substantiate that FedPKR effectively augments model accuracy in image classification tasks, meanwhile demonstrating resilience to statistical heterogeneity across all participating entities.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 6","pages":"902-912"},"PeriodicalIF":3.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142810515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Sustainable Energy Management Framework for Smart Homes
IF 3 3区 计算机科学
IEEE Transactions on Sustainable Computing Pub Date : 2024-03-02 DOI: 10.1109/TSUSC.2024.3396381
Soteris Constantinou;Constantinos Costa;Andreas Konstantinidis;Panos K. Chrysanthis;Demetrios Zeinalipour-Yazti
{"title":"A Sustainable Energy Management Framework for Smart Homes","authors":"Soteris Constantinou;Constantinos Costa;Andreas Konstantinidis;Panos K. Chrysanthis;Demetrios Zeinalipour-Yazti","doi":"10.1109/TSUSC.2024.3396381","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3396381","url":null,"abstract":"The escalating global energy crisis and the increasing <inline-formula><tex-math>${text{CO}_{2}}$</tex-math></inline-formula> emissions have necessitated the optimization of energy efficiency. The proliferation of Internet of Things (IoTs) devices, expected to reach 100 billion by 2030, contributed to this energy crisis and subsequently to the global <inline-formula><tex-math>${text{CO}_{2}}$</tex-math></inline-formula> emissions increase. Concomitantly, climate and energy targets have paved the way for an escalating adoption of solar photovoltaic power generation in residences. The IoT integration into home energy management systems holds the potential to yield energy and peak demand savings. Optimizing device planning to mitigate <inline-formula><tex-math>${text{CO}_{2}}$</tex-math></inline-formula> emissions poses significant challenges due to the complexity of user-defined preferences and consumption patterns. In this article, we propose an innovative IoT data platform, coined <i>Sustainable Energy Management Framework (SEMF)</i>, which aims to balance the trade-off between the imported energy from the grid, users’ comfort, and <inline-formula><tex-math>${text{CO}_{2}}$</tex-math></inline-formula> emissions. <i>SEMF</i> incorporates a Green Planning evolutionary algorithm, coined <i>GreenCap<inline-formula><tex-math>$^+$</tex-math><alternatives><mml:math><mml:msup><mml:mrow/><mml:mo>+</mml:mo></mml:msup></mml:math><inline-graphic></alternatives></inline-formula></i>, to facilitate load shifting of IoT-enabled devices, taking into consideration the integration of renewable energy sources, multiple constraints, peak-demand times, and dynamic pricing. Based on our experimental evaluation utilizing real-world data, our prototype system has outperformed the state-of-the-art approach by up to <inline-formula><tex-math>$approx$</tex-math></inline-formula>29% reduction in imported energy, <inline-formula><tex-math>$approx$</tex-math></inline-formula>35% increase in self-consumption of renewable energy, and <inline-formula><tex-math>$approx$</tex-math></inline-formula>34% decrease in <inline-formula><tex-math>${text{CO}_{2}}$</tex-math></inline-formula> emissions, while maintaining a high level of user comfort <inline-formula><tex-math>$approx$</tex-math></inline-formula>94%-99%.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 1","pages":"70-81"},"PeriodicalIF":3.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143184031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust and Privacy-Aware Federated Learning Framework for Non-Intrusive Load Monitoring 用于非侵入式负载监控的稳健且注重隐私的联合学习框架
IF 3 3区 计算机科学
IEEE Transactions on Sustainable Computing Pub Date : 2024-02-28 DOI: 10.1109/TSUSC.2024.3370837
Vidushi Agarwal;Omid Ardakanian;Sujata Pal
{"title":"A Robust and Privacy-Aware Federated Learning Framework for Non-Intrusive Load Monitoring","authors":"Vidushi Agarwal;Omid Ardakanian;Sujata Pal","doi":"10.1109/TSUSC.2024.3370837","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3370837","url":null,"abstract":"With the rollout of smart meters, a vast amount of energy time-series became available from homes, enabling applications such as non-intrusive load monitoring (NILM). The inconspicuous collection of this data, however, poses a risk to the privacy of customers. Federated Learning (FL) eliminates the problem of sharing raw data with a cloud service provider by allowing machine learning models to be trained in a collaborative fashion on decentralized data. Although several NILM techniques that rely on FL to train a deep neural network for identifying the energy consumption of individual appliances have been proposed in recent years, the robustness of these techniques to malicious users and their ability to fully protect the user privacy remain unexplored. In this paper, we present a robust and privacy-preserving FL-based framework to train a bidirectional transformer architecture for NILM. This framework takes advantage of a meta-learning algorithm to handle the data heterogeneity prevalent in real-world settings. The efficacy of the proposed framework is corroborated through comparative experiments using two real-world NILM datasets. The results show that this framework can attain an accuracy that is on par with a centrally-trained energy disaggregation model, while preserving user privacy.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"9 5","pages":"766-777"},"PeriodicalIF":3.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142397223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信