|
[1]
|
Wan, J., Li, J., Imran, M., Li, D. and Fazal-e-Amin (2019) A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory. IEEE Transactions on Industrial Informatics, 15, 3652-3660. [Google Scholar] [CrossRef]
|
|
[2]
|
Tange, K., De Donno, M., Fafoutis, X. and Dragoni, N. (2020) A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities. IEEE Communications Surveys & Tutorials, 22, 2489-2520. [Google Scholar] [CrossRef]
|
|
[3]
|
Mcmahan, B., Moore, E., Ramage, D., et al. (2017) Communication-Efficient Learning of Deep Networks from Decentralized Data. In: The 20th International Conference on Artificial Intelligence and Statistics, PMLR, 1273-1282.
|
|
[4]
|
Sweeney, L. (2002) k-Anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10, 557-570. [Google Scholar] [CrossRef]
|
|
[5]
|
Machanavajjhala, A., Gehrke, J., Kifer, D. and Venkitasubramaniam, M. (2006) L-Diversity: Privacy Beyond K-Anonymity. 22nd International Conference on Data Engineering (ICDE’06), Atlanta, 3-7 April 2006, 24-35. [Google Scholar] [CrossRef]
|
|
[6]
|
Li, N., Li, T. and Venkatasubramanian, S. (2007) T-Closeness: Privacy Beyond K-Anonymity and L-Diversity. 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, 15-20 April 2007, 106-115. [Google Scholar] [CrossRef]
|
|
[7]
|
Dwork, C. (2006) Differential Privacy. In: Bugliesi, M., et al., Eds., Automata, Languages and Programming, Springer, 1-12. [Google Scholar] [CrossRef]
|
|
[8]
|
宋成, 程道晨, 彭维平. 一种高效的联邦学习隐私保护方案[J]. 西安电子科技大学学报, 2023, 50(5): 178-187.
|
|
[9]
|
Basu, D., Ghosh, U. and Datta, R. (2022). 6G for Industry 5.0 and Smart CPS: A Journey from Challenging Hindrance to Opportunistic Future. 2022 IEEE Silchar Subsection Conference (SILCON), Sircar, 4-6 November 2022, 1-6.[CrossRef]
|
|
[10]
|
Boobalan, P., Ramu, S.P., Pham, Q., Dev, K., Pandya, S., Maddikunta, P.K.R., et al. (2022) Fusion of Federated Learning and Industrial Internet of Things: A Survey. Computer Networks, 212, Article ID: 109048. [Google Scholar] [CrossRef]
|
|
[11]
|
Hao, M., Li, H., Luo, X., Xu, G., Yang, H. and Liu, S. (2020) Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence. IEEE Transactions on Industrial Informatics, 16, 6532-6542. [Google Scholar] [CrossRef]
|
|
[12]
|
Xiao, X., Wu, T., Chen, Y. and Fan, X. (2019) Privacy-Preserved Approximate Classification Based on Homomorphic Encryption. Mathematical and Computational Applications, 24, Article No. 92. [Google Scholar] [CrossRef]
|
|
[13]
|
Castor, M. and Liskov, B. (1999) Practical Byzantine Fault Tolerance. Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OSDI), New Orleans, 22-25 February 1999, 173-186.
|