Acknowledgement
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. NRF-2018R1D1A1B07048944) and partially was supported by Pukyong National University Research Fund in 2019.
References
- J. Konecny, H. B. McMahan, F. X. Yu, P. Richtarik, A. T. Suresh, and D. Bacon, "Federated learning: Strategies for improving communication efficiency," pp.1-10, 2016, [Online]. Available: http://arxiv.org/abs/1610.05492.
- S. Lugan, P. Desbordes, E. Brion, L. X. Ramos Tormo, A. Legay, and B. Macq, "Secure architectures implementing trusted coalitions for blockchained distributed learning (TCLearn)," IEEE Access, Vol.7, pp.181789-181799, 2019. https://doi.org/10.1109/ACCESS.2019.2959220
- Hard, Andrew, Kanishka Rao, Rajiv Mathews, Swaroop Ramaswamy, Francoise Beaufays, Sean Augenstein, Hubert Eichner, Chloe Kiddon, and Daniel Ramage, "Federated learning for mobile keyboard prediction," arXiv preprint arXiv:1811.03604, 2018.
- Bonawitz, Keith, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, and Karn Seth, "Practical secure aggregation for privacy-preserving machine learning," In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1175-1191, 2017.
- Yang, Qiang, Yang Liu, Tianjian Chen, and Yongxin Tong, "Federated machine learning: Concept and applications," ACM Transactions on Intelligent Systems and Technology (TIST), Vol.10, No.2, pp.1-19, 2019.
- J. Weng, J. Weng, J. Zhang, M. Li, Y. Zhang and W. Luo, "Deepchain: Auditable and privacy- preserving deep learning with blockchain-based incentive," IEEE Transactions on Dependable and Secure Computing, 2019.
- R. Jurca and B. Faltings, "An incentive compatible reputation mechanism," 2003.
- S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," 2003.
- B. Bin Chen and M. C. Chan, "MobiCent: A credit-based incentive system for disruption tolerant network," 2010.
- U. Shevade, H. H. Song, L. Qiu, and Y. Zhang, "Incentive-aware routing in DTNs," 2008.
- A. Singh, R. M. Parizi, Q. Zhang, K. K. R. Choo, and A. Dehghantanha, "Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities," Computers and Security, 2020.
- Rahmadika, Sandi, and Kyung-Hyune Rhee, "Toward privacy-preserving shared storage in untrusted blockchain p2p networks," 2019 Wireless Communications and Mobile Computing, pp.1-13, 2019.
- A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, "Hawk: The blockchain model of cryptography and privacy-preserving smart contracts," 2016.
- M. Vukolic, "Rethinking permissioned blockchains," 2017.
- Lim, Wei Yang Bryan, Nguyen Cong Luong, Dinh Thai Hoang, Yutao Jiao, Ying-Chang Liang, Qiang Yang, Dusit Niyato, and Chunyan Miao, "Federated learning in mobile edge networks: A comprehensive survey," IEEE Communications Surveys & Tutorials, 2020.
- Wang, Shiqiang, Tiffany Tuor, Theodoros Salonidis, Kin K. Leung, Christian Makaya, Ting He, and Kevin Chan, "Adaptive federated learning in resource constrained edge computing systems," IEEE Journal on Selected Areas in Communications, Vol.37, No.6, pp.1205-1221, 2019. https://doi.org/10.1109/JSAC.2019.2904348
- Dean, Jeffrey, Greg Corrado, Rajat Monga, Kai Chen, Matthieu Devin, Mark Mao, Marc'aurelio Ranzato et al., "Large scale distributed deep networks," Advances in Neural Information Processing Systems, Vol.25, pp.1223-1231, 2012.
- J. Zhao, Y. Chen, and W. Zhang, "Differential privacy preservation in deep learning: Challenges, opportunities and solutions," IEEE Access, 2019.
- Lane, Nicholas D., Sourav Bhattacharya, Petko Georgiev, Claudio Forlivesi, Lei Jiao, Lorena Qendro, and Fahim Kawsar, "Deepx: A software accelerator for low-power deep learning inference on mobile devices," In 2016 15th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pp.1-12. IEEE, 2016.
- J. Wang, X. Zhu, J. Zhang, B. Cao, W. Bao, and P. S. Yu, "Not just privacy: Improving performance of private deep learning in mobile cloud," 2018.
- Rahmadika, Sandi, and Kyung-Hyune Rhee, "Blockchain technology for providing an architecture model of decentralized personal health information," International Journal of Engineering Business Management, Vol.10, pp.11-12, 2018.
- Deng, Li, "The mnist database of handwritten digit images for machine learning research [best of the web]," IEEE Signal Processing Magazine, Vol.29, No.6, pp.141-142, 2012. https://doi.org/10.1109/MSP.2012.2211477
- S. F. Sun, M. H. Au, J. K. Liu, and T. H. Yuen, "RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero," 2017.
- Sasson, Eli Ben, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza, "Zerocash: Decentralized anonymous payments from bitcoin," In 2014 IEEE Symposium on Security and Privacy, pp.459-474. IEEE, 2014.
- Rivest, Ronald L., Adi Shamir, and Yael Tauman, "How to leak a secret," In International Conference on the Theory and Application of Cryptology and Information Security, pp.552-565. Springer, Berlin, Heidelberg, 2001.
- N. Van Saberhagen, "CryptoNote v 2.0," Self-published, pp. 1-20, 2013.