scholarly journals Achieving security and privacy in federated learning systems: Survey, research challenges and future directions

2021 ◽  
Vol 106 ◽  
pp. 104468
Author(s):  
Alberto Blanco-Justicia ◽  
Josep Domingo-Ferrer ◽  
Sergio Martínez ◽  
David Sánchez ◽  
Adrian Flanagan ◽  
...  
2019 ◽  
Vol 14 ◽  
Author(s):  
Khaleel Ahmad ◽  
Afsar Kamal

Background: Privacy enhancing techniques are developed in order to provide strong protection to cyberspace. These techniques aim to allow users to keep their identities hidden during the communication when they are sending email, making payments online, browsing the Web or posting to newsgroups. MixNet is the most practical solution for concealing identities of message and sender’s identities. Objective: It provides sender and receiver anonymity as well as message security. The main goal of MixNet is to overcome vulnerability and enhance the performance of communication. It can efficiently handle the messages of various length and produce desirable results with privacy. The main objective of this paper is to acquire information and concepts regarding MixNet. We also provide guidelines for future research and references. Methods : The designing of MixNet depends on what cryptosystem method is used. Symmetric and Asymmetric both are used. Other methods could be also used such as PIR, CSP and FDR model, RPC, Token-based approach or others. Result: In this paper we provide an overview of MixNet approaches and presented a survey on MixNet based techniques and different models. We also constructed the comparison tables as per our requirements for better understanding. For this purpose, we found a total of 120 articles related to the MixNet published between 1990 and 2018 from the most relevant scientific resources. However, only 86 papers were analyzed due to comprehensiveness and relevancy to this article. Conclusion: Focused on the security and privacy of communication and how it can be achieved. This survey also reveals research progress and research gap on MixNet.


2021 ◽  
Vol 54 (2) ◽  
pp. 1-42
Author(s):  
Abdullah Qasem ◽  
Paria Shirani ◽  
Mourad Debbabi ◽  
Lingyu Wang ◽  
Bernard Lebel ◽  
...  

In the era of the internet of things (IoT), software-enabled inter-connected devices are of paramount importance. The embedded systems are very frequently used in both security and privacy-sensitive applications. However, the underlying software (a.k.a. firmware) very often suffers from a wide range of security vulnerabilities, mainly due to their outdated systems or reusing existing vulnerable libraries; which is evident by the surprising rise in the number of attacks against embedded systems. Therefore, to protect those embedded systems, detecting the presence of vulnerabilities in the large pool of embedded devices and their firmware plays a vital role. To this end, there exist several approaches to identify and trigger potential vulnerabilities within deployed embedded systems firmware. In this survey, we provide a comprehensive review of the state-of-the-art proposals, which detect vulnerabilities in embedded systems and firmware images by employing various analysis techniques, including static analysis, dynamic analysis, symbolic execution, and hybrid approaches. Furthermore, we perform both quantitative and qualitative comparisons among the surveyed approaches. Moreover, we devise taxonomies based on the applications of those approaches, the features used in the literature, and the type of the analysis. Finally, we identify the unresolved challenges and discuss possible future directions in this field of research.


Author(s):  
Safar Maghdid Asaad ◽  
Moayad Yousif Potrus ◽  
Kayhan Zrar Ghafoor ◽  
Halgurd S. Maghdid ◽  
Aos Mulahuwaish

2014 ◽  
Vol 62 ◽  
pp. 271-299 ◽  
Author(s):  
H.R. Maier ◽  
Z. Kapelan ◽  
J. Kasprzyk ◽  
J. Kollat ◽  
L.S. Matott ◽  
...  

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 72033-72036 ◽  
Author(s):  
Debiao He ◽  
Kim-Kwang Raymond Choo ◽  
Neeraj Kumar ◽  
Aniello Castiglione

2018 ◽  
Vol 29 (3) ◽  
pp. 353-359 ◽  
Author(s):  
Pazit Levinger ◽  
Myrla Sales ◽  
Remco Polman ◽  
Terry Haines ◽  
Briony Dow ◽  
...  

2019 ◽  
Vol 6 ◽  
pp. 205566831983960 ◽  
Author(s):  
Mary M Rodgers ◽  
Gad Alon ◽  
Vinay M Pai ◽  
Richard S Conroy

This paper presents some recent developments in the field of wearable sensors and systems that are relevant to rehabilitation and provides examples of systems with evidence supporting their effectiveness for rehabilitation. A discussion of current challenges and future developments for selected systems is followed by suggestions for future directions needed to advance towards wider deployment of wearable sensors and systems for rehabilitation.


Electronics ◽  
2019 ◽  
Vol 8 (8) ◽  
pp. 832 ◽  
Author(s):  
Diogo V. Carvalho ◽  
Eduardo M. Pereira ◽  
Jaime S. Cardoso

Machine learning systems are becoming increasingly ubiquitous. These systems’s adoption has been expanding, accelerating the shift towards a more algorithmic society, meaning that algorithmically informed decisions have greater potential for significant social impact. However, most of these accurate decision support systems remain complex black boxes, meaning their internal logic and inner workings are hidden to the user and even experts cannot fully understand the rationale behind their predictions. Moreover, new regulations and highly regulated domains have made the audit and verifiability of decisions mandatory, increasing the demand for the ability to question, understand, and trust machine learning systems, for which interpretability is indispensable. The research community has recognized this interpretability problem and focused on developing both interpretable models and explanation methods over the past few years. However, the emergence of these methods shows there is no consensus on how to assess the explanation quality. Which are the most suitable metrics to assess the quality of an explanation? The aim of this article is to provide a review of the current state of the research field on machine learning interpretability while focusing on the societal impact and on the developed methods and metrics. Furthermore, a complete literature review is presented in order to identify future directions of work on this field.


Sign in / Sign up

Export Citation Format

Share Document