• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:杨震

Refining:

Source

Submit Unfold

Co-Author

Submit Unfold

Clean All

Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 18 >
EV-FL: Efficient Verifiable Federated Learning With Weighted Aggregation for Industrial IoT Networks SCIE
期刊论文 | 2023 | IEEE-ACM TRANSACTIONS ON NETWORKING
Abstract&Keyword Cite

Abstract :

The rapid development of Industrial IoT (IIoT) opens up promising possibilities for data analysis and machine learning in IIoT networks. As a distributed paradigm, federated learning (FL) allows numerous IIoT devices to collaboratively train a global model without collecting their local data together in central servers. Unfortunately, a centralized server used to aggregate local gradients can be compromised and forge the result, which incurs the need for aggregation verification. Several approaches focusing on verifying the correctness of aggregation have been proposed. However, it is still an open problem since devices have to devote more computation resources for verification, which are especially not friendly to resource-constrained IIoT devices. Furthermore, verifying weighted aggregation has not been supported in existing approaches. In this paper, we propose an efficient verifiable federated learning approach for IIoT networks, which verifies the aggregation of gradients and requires lowest burden on IIoT devices by introducing zero-knowledge proof techniques. Moreover, our design supports weighted aggregation verification to validate the aggregation of weighted gradients in the cloud server. By comparing the proposed approach with the state-of-the-art schemes including VerifyNet and VeriFL, we demonstrate the superior performance of our approach for resource-constrained devices, which minimizes the computational overheads of the IIoT devices.

Keyword :

weighted aggregation weighted aggregation Federated learning Federated learning zero-knowledge proof zero-knowledge proof industrial IoT networks industrial IoT networks verifiability verifiability

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Yu, Haiyang , Xu, Runtong , Zhang, Hui et al. EV-FL: Efficient Verifiable Federated Learning With Weighted Aggregation for Industrial IoT Networks [J]. | IEEE-ACM TRANSACTIONS ON NETWORKING , 2023 .
MLA Yu, Haiyang et al. "EV-FL: Efficient Verifiable Federated Learning With Weighted Aggregation for Industrial IoT Networks" . | IEEE-ACM TRANSACTIONS ON NETWORKING (2023) .
APA Yu, Haiyang , Xu, Runtong , Zhang, Hui , Yang, Zhen , Liu, Huan . EV-FL: Efficient Verifiable Federated Learning With Weighted Aggregation for Industrial IoT Networks . | IEEE-ACM TRANSACTIONS ON NETWORKING , 2023 .
Export to NoteExpress RIS BibTex
VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain SCIE
期刊论文 | 2023 , 223 | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Abstract&Keyword Cite

Abstract :

Decentralized federated learning tries to address the single point of failure and privacy issue of federated learning by leveraging committee-based blockchain, which has been extensively studied among academic and industrial fields. The introduction of committees improves the efficiency of decentralized federated learning. However, it also is prone to attacks from Byzantine committee members, which interfere with the correctness of the global model by modifying aggregation results. Therefore, the security of committees is the key challenge for decentralized federated learning via committee-based blockchain. To solve this problem, in this paper, we propose VDFChain, a secure and verifiable decentralized federated learning scheme via committee-based blockchain. Specifically, based on the polynomial commitment technique, we propose a trusted committee mechanism, which can defend against attacks from Byzantine committee members and ensure the correctness of the aggregation model. Moreover, we use lossless masking techniques and committee mechanisms to effectively provide secure aggregation. For Byzantine attacks in decentralized federated learning, different from traditional defense methods against it, the VDFChain improves the fault tolerance of decentralized federated learning and provides a feasible and practical solution to build a secure decentralized federated learning. Security analysis shows that our scheme is provably secure. We have conducted extensive comparison experiments to evaluate the performance of the proposed framework, and experimental results show that our scheme has superior computational and communication performance compared to the state-of-the-art schemes.

Keyword :

Decentralized federated learning Decentralized federated learning Polynomial commitment techniques Polynomial commitment techniques Committee-based blockchain Committee-based blockchain Byzantine attacks Byzantine attacks Masking techniques Masking techniques Secure aggregation Secure aggregation

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhou, Ming , Yang, Zhen , Yu, Haiyang et al. VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain [J]. | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS , 2023 , 223 .
MLA Zhou, Ming et al. "VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain" . | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS 223 (2023) .
APA Zhou, Ming , Yang, Zhen , Yu, Haiyang , Yu, Shui . VDFChain: Secure and verifiable decentralized federated learning via committee-based blockchain . | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS , 2023 , 223 .
Export to NoteExpress RIS BibTex
Model optimization techniques in personalized federated learning: A survey SCIE
期刊论文 | 2023 , 243 | EXPERT SYSTEMS WITH APPLICATIONS
Abstract&Keyword Cite

Abstract :

Personalized federated learning (PFL) is an exciting approach that allows machine learning (ML) models to be trained on diverse and decentralized sources of data, while maintaining client privacy and autonomy. However, PFL faces several challenges that can deteriorate the performance and effectiveness of the learning process. These challenges include data heterogeneity, communication overhead, model privacy, model drift, client heterogeneity, label noise and imbalance, federated optimization challenges, and client participation and engagement. To address these challenges, researchers are exploring innovative techniques and algorithms that can enable efficient and effective PFL. These techniques include several optimization algorithms. This research survey provides an overview of the challenges and motivations related to the model optimization strategies for PFL, as well as the state-of-the-art (SOTA) methods and algorithms which seek to provide solutions of these challenges. Overall, this survey can be a valuable resource for researchers who are interested in the emerging field of PFL as well as its potential for personalized machine learning in a federated environment.

Keyword :

Distributed machine learning Distributed machine learning Personalized federated learning Personalized federated learning Model optimization Model optimization Collaborative learning Collaborative learning Privacy-preserving Privacy-preserving

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Sabah, Fahad , Chen, Yuwen , Yang, Zhen et al. Model optimization techniques in personalized federated learning: A survey [J]. | EXPERT SYSTEMS WITH APPLICATIONS , 2023 , 243 .
MLA Sabah, Fahad et al. "Model optimization techniques in personalized federated learning: A survey" . | EXPERT SYSTEMS WITH APPLICATIONS 243 (2023) .
APA Sabah, Fahad , Chen, Yuwen , Yang, Zhen , Azam, Muhammad , Ahmad, Nadeem , Sarwar, Raheem . Model optimization techniques in personalized federated learning: A survey . | EXPERT SYSTEMS WITH APPLICATIONS , 2023 , 243 .
Export to NoteExpress RIS BibTex
Prior Knowledge Constrained Adaptive Graph Framework for Partial Label Learning SCIE
期刊论文 | 2023 , 14 (2) | ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY
Abstract&Keyword Cite

Abstract :

Partial label learning (PLL) aims to learn a robust multi-class classifier from the ambiguous data, where each instance is given with several candidate labels, among which only one label is real. Most existing methods usually cope with such problem by utilizing a feature similarity graph to conduct label disambiguation. However, these methods construct the feature graph by only employing original features, while the influences of latent outliers and the contributions of label space are regrettably ignored. To tackle these issues, in this article, we propose a Prior KnOwledge ConsTrained Adaptive Graph FramEwork (POTAGE) for partial label learning, which utilizes an adaptive graph fused with label information to accurately describe the instance relationship and guide the desired model training. Compared with the feature-induced fixed graph, the adaptive graph is deemed to be more robust and accurate to reveal the intrinsic manifold structure within the data, and the embedding label information is expected to effectively alleviate the label ambiguities and enlarge the gap of label confidences between two instances from different classes. Extensive experiments demonstrate that POTAGE achieves state-of-the-art performance.

Keyword :

adaptive graph adaptive graph Partial label learning Partial label learning label information embedding label information embedding label disambiguation label disambiguation

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lyu, Gengyu , Feng, Songhe , Wang, Shaokai et al. Prior Knowledge Constrained Adaptive Graph Framework for Partial Label Learning [J]. | ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY , 2023 , 14 (2) .
MLA Lyu, Gengyu et al. "Prior Knowledge Constrained Adaptive Graph Framework for Partial Label Learning" . | ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY 14 . 2 (2023) .
APA Lyu, Gengyu , Feng, Songhe , Wang, Shaokai , Yang, Zhen . Prior Knowledge Constrained Adaptive Graph Framework for Partial Label Learning . | ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY , 2023 , 14 (2) .
Export to NoteExpress RIS BibTex
网络安全与防护课程教学设计探索
期刊论文 | 2023 , (08) , 77-80 | 中国多媒体与网络教学学报(上旬刊)
Abstract&Keyword Cite

Abstract :

由于网络安全领域课程—网络安全与防护课程本身理论性较强,同时教学过程中缺乏对学生学习结果的有效评价方式,实现网络安全与防护课程教学目标存在一定的难度。针对网络安全与防护课程教学建设问题,本文结合线上线下多种形式,提出了新的教学设计思路,并在其中融入了教学思政元素,阐述了课程混合式教学建设过程中的课程目标、教学内容、评价方法等方面的设计。通过对课程实践结果和教学数据的分析,网络安全与防护课程混合式教学设计取得了较好的教学效果。

Keyword :

混合式教学 混合式教学 教学实践 教学实践 网络安全与防护 网络安全与防护 教学设计 教学设计

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 于海阳 , 杨震 , 赖英旭 et al. 网络安全与防护课程教学设计探索 [J]. | 中国多媒体与网络教学学报(上旬刊) , 2023 , (08) : 77-80 .
MLA 于海阳 et al. "网络安全与防护课程教学设计探索" . | 中国多媒体与网络教学学报(上旬刊) 08 (2023) : 77-80 .
APA 于海阳 , 杨震 , 赖英旭 , 刘静 , 王一鹏 . 网络安全与防护课程教学设计探索 . | 中国多媒体与网络教学学报(上旬刊) , 2023 , (08) , 77-80 .
Export to NoteExpress RIS BibTex
BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation CPCI-S
期刊论文 | 2023 , 141-152 | ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING-SOFTWARE ENGINEERING EDUCATION AND TRAINING, ICSE-SEET
Abstract&Keyword Cite

Abstract :

Teaching requirements elicitation to students who do not have practical experience is challenging, as they usually cannot understand the difficulty. Several recent studies have reported their experience of teaching requirements elicitation with a serious game. However, in these games, the fictitious characters have not been carefully designed to reflect real scenarios. For example, they always respond the same no matter how many times a learner interacts with them. Moreover, most existing serious games contain only one specific scenario and cannot be easily extended to cover various cases. In this paper, we design and implement a dynamic state-based serious game (BARA) for teaching requirements elicitation, which can realistically simulate real-world scenarios and automatically record learners' actions for assessment. Specifically, we model fictitious characters' behaviors using finite-state machines in order to precisely characterize the dynamic states of stakeholders. We also developed an easy-to-use editor for non-programmers to design fictitious characters and thus construct various simulated scenarios. Finally, BARA records learners' actions during the game, based on which we can gain an in-depth understanding of learners' performance and our teaching effectiveness. We evaluated BARA with 60 participants using a simulated scenario. The result shows that most participants are immersed in BARA and can reasonably complete the requirements elicitation task within the simulated scenario.

Keyword :

serious game serious game requirements elicitation requirements elicitation empirical study empirical study goal-based design goal-based design

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Liu, Yu , Li, Tong , Huang, Zheqing et al. BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation [J]. | ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING-SOFTWARE ENGINEERING EDUCATION AND TRAINING, ICSE-SEET , 2023 : 141-152 .
MLA Liu, Yu et al. "BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation" . | ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING-SOFTWARE ENGINEERING EDUCATION AND TRAINING, ICSE-SEET (2023) : 141-152 .
APA Liu, Yu , Li, Tong , Huang, Zheqing , Yang, Zhen . BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation . | ACM 45TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING-SOFTWARE ENGINEERING EDUCATION AND TRAINING, ICSE-SEET , 2023 , 141-152 .
Export to NoteExpress RIS BibTex
Silence or Outbreak - a Real-Time Emergent Topic Identification System (RealTIS) for Social Media CPCI-S
期刊论文 | 2022 , 13194-13196 | TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE
Abstract&Keyword Cite

Abstract :

This paper presents RealTIS, a Real-time emergent Topic Identification System for user-generated content on the web via social networking services such as Twitter, Weibo, and Facebook. Without user intervention, our proposed RealTIS system can efficiently collect necessary social media posts, construct a quality topic summarization from the vast sea of data, and then automatically identify whether the emerging topics will be out-breaking or just fading into silence. RealTIS uses a time-sliding window to compute the statistics about the basic structure (motifs) variation of the propagation network for a specific topic. These statistics are then used to predict unusual shifts in correlations, make early warning and detect outbreak. Besides, this work also illustrates the mechanism by which our proposed system makes early warning happen.

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Lu, Ning , Yang, Zhen , Huang, Jian et al. Silence or Outbreak - a Real-Time Emergent Topic Identification System (RealTIS) for Social Media [J]. | TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE , 2022 : 13194-13196 .
MLA Lu, Ning et al. "Silence or Outbreak - a Real-Time Emergent Topic Identification System (RealTIS) for Social Media" . | TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE (2022) : 13194-13196 .
APA Lu, Ning , Yang, Zhen , Huang, Jian , Wu, Yaxi , Wang, Hesong . Silence or Outbreak - a Real-Time Emergent Topic Identification System (RealTIS) for Social Media . | TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE , 2022 , 13194-13196 .
Export to NoteExpress RIS BibTex
FAC: A Music Recommendation Model Based on Fusing Audio and Chord features (115) SCIE
期刊论文 | 2022 | INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING
Abstract&Keyword Cite

Abstract :

Music content has recently been identified as useful information to promote the performance of music recommendations. Existing studies usually feed low-level audio features, such as the Mel-frequency cepstral coefficients, into deep learning models for music recommendations. However, such features cannot well characterize music audios, which often contain multiple sound sources. In this paper, we propose to model and fuse chord, melody, and rhythm features to meaningfully characterize the music so as to improve the music recommendation. Specially, we use two userbased attention mechanisms to differentiate the importance of different parts of audio features and chord features. In addition, a Long Short-Term Memory layer is used to capture the sequence characteristics. Those features are fused by a multilayer perceptron and then used to make recommendations. We conducted experiments with a subset of the last.fm-1b dataset. The experimental results show that our proposal outperforms the best baseline by 3.52% on HR@10.

Keyword :

chord chord attention attention Recommendation system Recommendation system music information retrieval music information retrieval

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Feng, Weite , Liu, Junrui , Li, Tong et al. FAC: A Music Recommendation Model Based on Fusing Audio and Chord features (115) [J]. | INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING , 2022 .
MLA Feng, Weite et al. "FAC: A Music Recommendation Model Based on Fusing Audio and Chord features (115)" . | INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING (2022) .
APA Feng, Weite , Liu, Junrui , Li, Tong , Yang, Zhen , Wu, Di . FAC: A Music Recommendation Model Based on Fusing Audio and Chord features (115) . | INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING , 2022 .
Export to NoteExpress RIS BibTex
Federated Learning Framework Based on Data Value Evaluation in Industrial IoT SCIE
期刊论文 | 2022 , 2022 | SECURITY AND COMMUNICATION NETWORKS
Abstract&Keyword Cite

Abstract :

With the continuous maturity and development of the big data technology system, deep learning has been widely used in the field of the Industrial Internet of Things. However, the traditional training model with centralized data is prone to the leakage of private information in the industry, such as facial information. In recent years, federated learning solves the problem of privacy leakage caused by data sharing by not sharing data and only contributing to local models. Federated learning does not share data, which also makes it impossible to evaluate the contribution of each client to the federated task. We propose a federated learning framework based on data value evaluation. In this method, under the premise of effectively completing the training task of federated learning and ensuring the privacy of client data, a data value evaluator is designed in the central server, and the model uploaded by the client is evaluated to obtain the corresponding selection probability as the model aggregation weight. Experimental results show that the proposed method improves the accuracy of the global model obtained by existing federated aggregation.

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Ma, Chao , Yu, Haiyang , Li, Zheng et al. Federated Learning Framework Based on Data Value Evaluation in Industrial IoT [J]. | SECURITY AND COMMUNICATION NETWORKS , 2022 , 2022 .
MLA Ma, Chao et al. "Federated Learning Framework Based on Data Value Evaluation in Industrial IoT" . | SECURITY AND COMMUNICATION NETWORKS 2022 (2022) .
APA Ma, Chao , Yu, Haiyang , Li, Zheng , Yang, Zhen . Federated Learning Framework Based on Data Value Evaluation in Industrial IoT . | SECURITY AND COMMUNICATION NETWORKS , 2022 , 2022 .
Export to NoteExpress RIS BibTex
Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks SCIE
期刊论文 | 2022 , 19 (3) , 2944-2956 | IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT
Abstract&Keyword Cite

Abstract :

The rapid growth of various vehicular apps such as automotive navigation and in-car entertainment has brought the explosion of vehicular data. Such a growth has given rise to a huge challenge of maintaining the quality of cloud storage services for the whole period of storage in vehicular networks. As a result, poor quality of services easily causes data corruption problems and thereby threats vehicular data integrity. Blockchain, a tamper-proofing technique, is considered a promising approach for mitigating data integrity risks in cloud storage. However, existing blockchain-based schemes for auditing long-term cloud data integrity suffer from poor communication performance in a vehicular network. In this study, a blockchain-based offline auditing scheme for cloud storage in the vehicular network is proposed to improve auditing performance. Inspired by the data structure of blockchain, we design an evidence chain to achieve offline auditing, which allows the cloud to spontaneously generate data integrity evidence without communicating with auditors during the evidence generation phase. Furthermore, we extend our scheme to support public and automatic validation based on the smart contract. We prove the security of the proposed scheme under the random oracle model and further provide the performance evaluation by comparing with the state-of-the-art approaches.

Keyword :

Metadata Metadata Vehicle dynamics Vehicle dynamics Blockchains Blockchains Security Security vehicular network vehicular network Data integrity Data integrity offline auditing offline auditing Cloud storage Cloud storage blockchain blockchain Cloud computing Cloud computing Vehicular ad hoc networks Vehicular ad hoc networks

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Yu, Haiyang , Yang, Zhen , Tu, Shanshan et al. Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks [J]. | IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT , 2022 , 19 (3) : 2944-2956 .
MLA Yu, Haiyang et al. "Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks" . | IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 19 . 3 (2022) : 2944-2956 .
APA Yu, Haiyang , Yang, Zhen , Tu, Shanshan , Waqas, Muhammad , Liu, Huan . Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks . | IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT , 2022 , 19 (3) , 2944-2956 .
Export to NoteExpress RIS BibTex
10| 20| 50 per page
< Page ,Total 18 >

Export

Results:

Selected

to

Format:
Online/Total:1274/2223820
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.