Abstract
At present, there is a pressing need for data scientists and academic researchers to devise advanced machine learning and artificial intelligence-driven systems that can effectively tackle forthcoming security challenges. This is due to the rapid advancement in processing capabilities of distributed client devices, as well as mounting apprehensions about the exposure of sensitive user data. This particular methodology renders the constituents of a decentralized machine learning paradigm private and allocates them to a diverse array of remote client apparatuses. Following this, a primary controller clusters the extracted machine learning data. This process effectively transforms a centrally controlled machine learning procedure into a distributed one, leading to significant potential benefits. Regrettably, the implementation of a progressive strategy for networked machine learning poses additional obstacles to the preservation of user data confidentiality and cyber-security apprehensions. The present endeavor aims to scrutinize the plausible hazards that decentralized machine learning may engender for the security and confidentiality of user data, as well as their well-being, through the lens of data transmission thresholds. These risks are contingent upon the salient stages of a machine learning model. The aforementioned procedures include: (i) establishing thresholds for raw data prior to processing; (ii) establishing thresholds for the learning framework; (iii) establishing thresholds for the obtained information; and (iv) establishing thresholds for the provisional outcome. We conducted a comprehensive analysis of state-of-the-art hacking methodologies, evaluating their potential vulnerabilities at every stage of the transaction, and subsequently deliberated on practical solutions to address these issues. Ultimately, the survey culminates in an exposition of the obstacles and prospects that confront researchers in this intricate realm.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
No data was used for the research described in the article.
References
Pyzer-Knapp EO, Pitera JW, Staar PW, Takeda S, Laino T, Sanders DP, Sexton J, Smith JR, Curioni A (2022) Accelerating materials discovery using artificial intelligence, high performance computing and robotics. NPJ Comput Mater 8(1):1–9
Sen S, Agarwal S, Chakraborty P, Singh KP (2022) Astronomical big data processing using machine learning: a comprehensive review. Exp Astron 53:1–43
Alam A, Aziz AE, Basit A, Ahmed I, Nasir AA, Khalid M (2024) Cooperative non-orthogonal multiple access-based visible light communication strategy for power-constrained inter-satellite links. IEEE Access
Shao C, Yang Y, Juneja S, GSeetharam T (2022) Iot data visualization for business intelligence in corporate finance. Inf Process Manag 59(1):102736
Ma C, Li J, Shi L, Ding M, Wang T, Han Z, Poor HV (2022) When federated learning meets blockchain: a new distributed learning paradigm. IEEE Comput Intell Mag 17(3):26–33
Zou T, Liu Y, Kang Y, Liu W, He Y, Yi Z, Yang Q, Zhang Y-Q (2022) Defending batch-level label inference and replacement attacks in vertical federated learning. IEEE Trans Big Data
Iqbal F, Rehan M, Hussain M, Ahmed I, Khalid M (2024) Multi-objective optimal antiwindup compensation of discrete-time nonlinear systems under input saturation. Arab J Sci Eng 49:1–15
Yarradoddi S, Gadekallu TR (2022) Federated learning role in big data, jot services and applications security, privacy and trust in jot a survey. In: Trust, security and privacy for big data. CRC Press, pp 28–49
Treleaven P, Smietanka M, Pithadia H (2022) Federated learning: the pioneering distributed machine learning and privacy-preserving data technology. Computer 55(4):20–29
Nti IK, Quarcoo JA, Aning J, Fosu GK (2022) A mini-review of machine learning in big data analytics: applications, challenges, and prospects. Big Data Min Anal 5(2):81–97
Tajabadi M, Martin R, Heider D (2024) Privacy-preserving decentralized learning methods for biomedical applications. Comput Struct Biotechnol J
Lin H, Han J, Wu P, Wang J, Tu J, Tang H, Zhu L (2024) Machine learning and human-machine trust in healthcare: a systematic survey. CAAI Trans Intell Technol 9(2):286–302
Aboukadri S, Ouaddah A, Mezrioui A (2024) Machine learning in identity and access management systems: survey and deep dive. Comput Secur 103729
Aminizadeh S, Heidari A, Dehghan M, Toumaj S, Rezaei M, Navimipour NJ, Stroppa F, Unal M (2024) Opportunities and challenges of artificial intelligence and distributed systems to improve the quality of healthcare service. Artif Intell Med 149:102779
Schmitt M (2023) Securing the digital world: protecting smart infrastructures and digital industries with artificial intelligence (ai)-enabled malware and intrusion detection. J Ind Inf Integr 36:100520
Schmitt M (2023) Automated machine learning: Ai-driven decision making in business analytics. Intell Syst Appl 18:200188
Ahmad H, Gulzar MM, Aziz S, Habib S, Ahmed I (2024) Ai-based anomaly identification techniques for vehicles communication protocol systems: comprehensive investigation, research opportunities and challenges. Internet of Things 101245
Ahmed I, Asif M, Alhelou HH, Khalid M et al (2024) A review on enhancing energy efficiency and adaptability through system integration for smart buildings. J Build Eng 109354
Sreedevi A, Harshitha TN, Sugumaran V, Shankar P (2022) Application of cognitive computing in healthcare, cybersecurity, big data and iot: A literature review. Inf Process Manag 59(2):102888
Ali PR, Rehan M, Ahmed W, Basit A, Ahmed I (2024) A novel output feedback consensus control approach for generic linear multi-agent systems under input saturation over a directed graph topology. ISA Trans 148:128–139
Perera C, Ranjan R, Wang L, Khan SU, Zomaya AY (2015) Big data privacy in the internet of things era. IT Professional 17(3):32–39
Hajjaji Y, Boulila W, Farah IR, Romdhani I, Hussain A (2021) Big data and iot-based applications in smart environments: a systematic review. Comput Sci Rev 39:100318
Alferidah DK, Jhanjhi N (2020) A review on security and privacy issues and challenges in internet of things. Int J Comput Sci Netw Secur IJCSNS 20(4):263–286
Lian X, Zhang C, Zhang H, Hsieh C-J, Zhang W, Liu J (2017) Can decentralized algorithms outperform centralized algorithms? a case study for decentralized parallel stochastic gradient descent. Adv Neural Inf Process Syst 30
Wahab OA, Mourad A, Otrok H, Taleb T (2021) Federated machine learning: survey, multi-level classification, desirable criteria and future directions in communication and networking systems. IEEE Commun Surv Tutor 23(2):1342–1397
Ahmed I, Rehan M, Iqbal N, Basit A, Khalid M (2024) Free-weighting matrix approach for event-triggered cooperative control of generic linear multi-agent systems: an application for uavs. Arab J Sci Eng 49(5):6761–6772
Zhang K, Yang Z, Başar T (2021) Decentralized multi-agent reinforcement learning with networked agents: recent advances. Front Inf Technol Electro Eng 22(6):802–814
Mustafa FE, Ahmed I, Basit A, Alqahtani M, Khalid M (2024) An adaptive metaheuristic optimization approach for tennessee eastman process for an industrial fault tolerant control system. PLoS ONE 19(2):0296471
Li G, Ota K, Dong M, Wu J, Li J (2019) Desvig: decentralized swift vigilance against adversarial attacks in industrial artificial intelligence systems. IEEE Trans Industr Inf 16(5):3267–3277
Sun M, Tay WP (2019) On the relationship between inference and data privacy in decentralized iot networks. IEEE Trans Inf For Secur 15:852–866
Ahmed I, Rehan M, Basit A, Al-Ismail FS, Khalid M (2024) Consensus and clustering approach for dynamic event-triggered distributed optimization of power system networks with saturation constraint approche de consensus et de regroupement pour l’optimisation dynamique distribuée déclenchée par les événements des réseaux électriques avec contrainte de saturation. IEEE Can J Electr Comput Eng
Qu Y, Gao L, Luan TH, Xiang Y, Yu S, Li B, Zheng G (2020) Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Internet Things J 7(6):5171–5183
Li J, Shao Y, Wei K, Ding M, Ma C, Shi L, Han Z, Poor HV (2021) Blockchain assisted decentralized federated learning (blade-fl): performance analysis and resource allocation. IEEE Trans Parallel Distrib Syst 33(10):2401–2415
Khalid M, Ahmed I, AlMuhaini M, Savkin AV (2024) A novel computational paradigm for scheduling of hybrid energy networks considering renewable uncertainty limitations. Energy Rep 11:1959–1978
Briggs C, Fan Z, Andras P (2021) A review of privacy-preserving federated learning for the internet-of-things. Federated Learn Syst 21–50
Amiri-Zarandi M, Dara RA, Fraser E (2020) A survey of machine learning-based solutions to protect privacy in the internet of things. Comput Secur 96:101921
Amanullah MA, Habeeb RAA, Nasaruddin FH, Gani A, Ahmed E, Nainar ASM, Akim NM, Imran M (2020) Deep learning and big data technologies for iot security. Comput Commun 151:495–517
Gong M, Xie Y, Pan K, Feng K, Qin AK (2020) A survey on differentially private machine learning. IEEE Comput Intell Mag 15(2):49–64
Verbraeken J, Wolting M, Katzy J, Kloppenburg J, Verbelen T, Rellermeyer JS (2020) A survey on distributed machine learning. Acm Comput Surv (csur) 53(2):1–33
Enthoven D, Al-Ars Z (2021) An overview of federated deep learning privacy attacks and defensive strategies. Federated Learn Syst 173–196
De Cristofaro E (2021) A critical overview of privacy in machine learning. IEEE Secur Privacy 19(4):19–27
Wang Y, Tang T, Xu Y, Bai Y, Yin L, Li G, Zhang H, Liu H, Huang Y (2021) All-weather, natural silent speech recognition via machine-learning-assisted tattoo-like electronics. npj Flexible Electron 5(1):1–9
Radaideh MI, Pappas C, Cousineau S (2022) Real electronic signal data from particle accelerator power systems for machine learning anomaly detection. Data Brief 43:108473
Lu Z (2021) Computational discovery of energy materials in the era of big data and machine learning: a critical review. Mater Rep Energy 1(3):100047
Hashem IA, Siddiqa A, Alaba FA, Bilal M, Alhashmi SM (2024) Distributed intelligence for iot-based smart cities: a survey. Neural Comput Appl 1–36
Teo ZL, Jin L, Li S, Miao D, Zhang X, Ng WY, Tan TF, Lee DM, Chua KJ, Heng J, et al (2024) Federated machine learning in healthcare: a systematic review on clinical applications and technical architecture. Cell Repo Med
Fazel E, Nezhad MZ, Rezazadeh J, Moradi M, Ayoade J (2024) Iot convergence with machine learning & blockchain: a review. Internet Things 101187
Zhao X, Papagelis M, An A, Chen BX, Liu J, Hu Y (2021) Zipline: an optimized algorithm for the elastic bulk synchronous parallel model. Mach Learn 110(10):2867–2903
Ahmed I, Alvi U-E-H, Basit A, Khursheed T, Alvi A, Hong K-S, Rehan M (2022) A novel hybrid soft computing optimization framework for dynamic economic dispatch problem of complex non-convex contiguous constrained machines. PLoS ONE 17(1):0261709
Alvi U-E, Ahmed W, Rehan M, Ahmed S, Ahmad R, Ahmed I, et al (2022) A novel incremental cost consensus approach for distributed economic dispatch over directed communication topologies in a smart grid. Soft Comput 1–16
Ahmed I, Rao AR, Shah A, Alamzeb E, Khan JA (2014) Performance of various metaheuristic techniques for economic dispatch problem with valve point loading effects and multiple fueling options. Adv Electr Eng 2014
Ahmed I, Rehan M, Hong K-S, Basit A (2022) A consensus-based approach for economic dispatch considering multiple fueling strategy of electricity production sector over a smart grid. In: 2022 13th Asian control conference (ASCC). IEEE, pp 1196–1201
Ahmed I, Khan R, Ali F. Metaheuristic techniqes for power economic dispatch of units with valve-point effects and multiple fuels
Ahmed I, Rehan M, Basit A, Malik SH, Hong K-S et al (2022) Multi-area economic emission dispatch for large-scale multi-fueled power plants contemplating inter-connected grid tie-lines power flow limitations. Energy 261:125178
Ahmed I, Basit A, Rehan M, Hong K-S et al (2022) Multi-objective whale optimization approach for cost and emissions scheduling of thermal plants in energy hubs. Energy Rep 8:9158–9174
Ahmed I, Rehan M, Basit A, Hong K-S (2022) Greenhouse gases emission reduction for electric power generation sector by efficient dispatching of thermal plants integrated with renewable systems. Sci Rep 12(1):1–21
Sun H, Gui Z, Guo S, Qi Q, Wang J, Liao J (2021) Gssp: eliminating stragglers through grouping synchronous for distributed deep learning in heterogeneous cluster. IEEE Trans Cloud Comput
Xiao D, Li X, Zhou J, Du Y, Wu W (2022) Iteration number-based hierarchical gradient aggregation for distributed deep learning. J Supercomput 78(4):5565–5587
Khan T, Tian W, Zhou G, Ilager S, Gong M, Buyya R (2022) Machine learning (ml)–centric resource management in cloud computing: a review and future directions. J Netw Comput Appl 103405
Banabilah S, Aloqaily M, Alsayed E, Malik N, Jararweh Y (2022) Federated learning review: fundamentals, enabling technologies, and future applications. Inf Process Manag 59(6):103061
Pham Q-V, Zeng M, Huynh-The T, Han Z, Hwang W-J (2022) Aerial access networks for federated learning: applications and challenges. IEEE Netw 36(3):159–166
Ghimire B, Rawat DB (2022) Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things. IEEE Internet Things J
Zawad S, Yan F, Anwar A (2022) Introduction to federated learning systems. In: Federated learning. Springer, pp 195–212
Feng S (2022) Vertical federated learning-based feature selection with non-overlapping sample utilization. Expert Syst Appl 208:118097
Lee H, Kim J, Ahn S, Hussain R, Cho S, Son J (2021) Digestive neural networks: a novel defense strategy against inference attacks in federated learning. Comput Secur 109:102378
Gao J, Hou B, Guo X, Liu Z, Zhang Y, Chen K, Li J (2021) Secure aggregation is insecure: category inference attack on federated learning. IEEE Trans Depend Secure Comput
Sun J, Li A, DiValentin L, Hassanzadeh A, Chen Y, Li H (2021) Fl-wbc: enhancing robustness against model poisoning attacks in federated learning from a client perspective. Adv Neural Inf Process Syst 34:12613–12624
Samikwa E, Di Maio A, Braun T (2022) Ares: aaptive resource-aware split learning for internet of things. Comput Netw 109380
Kwak Y, Yun WJ, Kim JP, Cho H, Park J, Choi M, Jung S, Kim J (2022) Quantum distributed deep learning architectures: models, discussions, and applications. ICT Express
Chen M-S, Lin J-Q, Li X-L, Liu B-Y, Wang C-D, Huang D, Lai J-H (2022) Representation learning in multi-view clustering: a literature review. Data Sci Eng 1–17
Yuan C, Wu Y, Qin X, Qiao S, Pan Y, Huang P, Liu D, Han N (2019) An effective image classification method for shallow densely connected convolution networks through squeezing and splitting techniques. Appl Intell 49(10):3570–3586
Kim J, Park Y, Kim G, Hwang SJ (2017) Splitnet: Learning to semantically split deep networks for parameter reduction and model parallelization. In: International conference on machine learning. PMLR, pp 1866–1874
Weng J, Su S, Fan X (2022) Two-stage clustering for federated learning with pseudo mini-batch sgd training on non-iid data. In: CCF conference on computer supported cooperative work and social computing. Springer, pp 29–43
Zhu W, Tang Y (2021) Dalu: adaptive learning rate update in distributed deep learning. In: 2021 IEEE smartworld, ubiquitous intelligence & computing, advanced & trusted computing, scalable computing & communications, internet of people and smart city innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI). IEEE, pp 203–209
Li J, Li P, Liu Z, Chen X, Li T (2022) Secure distributed learning. In: Privacy-preserving machine learning. Springer, pp 47–56
Dogru O, Velswamy K, Huang B (2021) Actor-critic reinforcement learning and application in developing computer-vision-based interface tracking. Engineering 7(9):1248–1261
Hafiz A (2023) A survey of deep q-networks used for reinforcement learning: state of the art. Intell Commun Technol Virtual Mob Netw 393–402
Basit A, Tufail M, Rehan M, Ahmed W, Radwan A, Ahmed I (2024) Event-based secure filtering under two-channel stochastic attacks and switching topologies over wireless sensor networks. IEEE Trans Netw Sci Eng
Ahmed I, Basit A, Rehan M, Ali A, Maaruf M, Khalid M (2024) A resilient consensus-based energy 5.0 framework for micro-grids under ramp-rate constraints and stochastic fdi attacks. In: 2024 IEEE international conference on industrial technology (ICIT). IEEE, pp 1–6
Li Y, Pan Q, Cambria E (2022) Deep-attack over the deep reinforcement learning. Knowl-Based Syst 108965
Wei X, Yan H, Li B (2022) Sparse black-box video attack with reinforcement learning. Int J Comput Vis 130(6):1459–1473
Xu X, Hu H, Liu Y, Tan J, Zhang H, Song H (2022) Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack. Digital Commun Netw
Hu H, Salcic Z, Sun L, Dobbie G, Yu PS, Zhang X (2022) Membership inference attacks on machine learning: a survey. ACM Comput Surv (CSUR) 54(11s):1–37
Ma T, Xu C, Yang S, Huang Y, Kuang X, Tang H, Grieco LA (2022) An intelligent proactive defense against the client-side dns cache poisoning attack via self-checking deep reinforcement learning. Int J Intell Syst 37(10):8170–8197
Chen J, Gao Y, Shan J, Peng K, Wang C, Jiang H (2022) Manipulating supply chain demand forecasting with targeted poisoning attacks. IEEE Trans Ind Inform
Tian Z, Cui L, Liang J, Yu S (2022) A comprehensive survey on poisoning attacks and countermeasures in machine learning. ACM Comput Surv (CSUR)
Gomathi B, Uma J (2022) Adversarial attacks and defenses against deep learning in cybersecurity. In: Society 5.0 and the future of emerging computational technologies. CRC Press, pp 281–296
Chen H, Zhang W, Liu K, Chen K, Fang H, Yu N (2022) Speech pattern based black-box model watermarking for automatic speech recognition. In: ICASSP 2022-2022 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 3059–3063
Zhang L, Jiang C, Pang A (2022) Black-box attacks and defense for dnn-based power quality classification in smart grid. Energy Rep 8:12203–12214
Khosravy M, Nakamura K, Hirose Y, Nitta N, Babaguchi N (2022) Model inversion attack by integration of deep generative models: privacy-sensitive face generation from a face recognition system. IEEE Trans Inf For Secur 17:357–372
Xu Q, Arafin MT, Qu G (2022) An approximate memory based defense against model inversion attacks to neural networks. IEEE Trans Emerg Top Comput
Shokri R, Stronati M, Song C, Shmatikov V (2017) Membership inference attacks against machine learning models. In: 2017 IEEE symposium on security and privacy (SP). IEEE, pp 3–18
Park C, Hong D, Seo C (2019) An attack-based evaluation method for differentially private learning against model inversion attack. IEEE Access 7:124988–124999
Shi Y, Sagduyu Y (2022) Membership inference attack and defense for wireless signal classifiers with deep learning. IEEE Trans Mobile Comput
Nasr M, Shokri R, Houmansadr A (2019) Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. In: 2019 IEEE symposium on security and privacy (SP). IEEE, pp 739–753
Kasyap H, Tripathy S (2021) Privacy-preserving decentralized learning framework for healthcare system. ACM Trans Multimedia Comput Commun Appl (TOMM) 17(2s):1–24
Chen T, Ling J, Sun Y (2022) White-box content camouflage attacks against deep learning. Comput Secur 117:102676
Qi P, Jiang T, Wang L, Yuan X, Li Z (2022) Detection tolerant black-box adversarial attack against automatic modulation classification with deep learning. IEEE Trans Reliab
Oliynyk D, Mayer R, Rauber A (2022) I know what you trained last summer: a survey on stealing machine learning models and defences. arXiv preprint arXiv:2206.08451
Lindell Y (2020) Secure multiparty computation. Commun ACM 64(1):86–96
Wood A, Najarian K, Kahrobaei D (2020) Homomorphic encryption for machine learning in medicine and bioinformatics. ACM Comput Surv (CSUR) 53(4):1–35
Ma X, Zhang F, Chen X, Shen J (2018) Privacy preserving multi-party computation delegation for deep learning in cloud computing. Inf Sci 459:103–116
Liu J, Tian Y, Zhou Y, Xiao Y, Ansari N (2020) Privacy preserving distributed data mining based on secure multi-party computation. Comput Commun 153:208–216
Hastings M, Hemenway B, Noble D, Zdancewic S (2019) Sok: general purpose compilers for secure multi-party computation. In: 2019 IEEE symposium on security and privacy (SP). IEEE, pp 1220–1237
Vu D-H, Luong T-D, Ho T-B (2020) An efficient approach for secure multi-party computation without authenticated channel. Inf Sci 527:356–368
Knott B, Venkataraman S, Hannun A, Sengupta S, Ibrahim M, Maaten L (2021) Crypten: secure multi-party computation meets machine learning. Adv Neural Inf Process Syst 34:4961–4973
Wang Y, Li T, Qin H, Li J, Gao W, Liu Z, Xu Q (2015) A brief survey on secure multi-party computing in the presence of rational parties. J Ambient Intell Humaniz Comput 6(6):807–824
Lindell Y (2003) Composition of secure multi-party protocols: a comprehensive study. vol 2815. Springer
Canetti R (2013) Security and composition of cryptographic protocols: a tutorial. Secure Multi-Party Comput 61–119
Joseph A (2018) A framework for efficient secure three-party computation. PhD thesis, Indian Institute of Science Bangalore
Dong C, Weng J, Liu J-N, Yang A, Zhiquan L, Yang Y, Ma J (2022) Maliciously secure and efficient large-scale genome-wide association study with multi-party computation. IEEE Trans Depend Secure Comput
Blanton M, Kang A, Yuan C (2020) Improved building blocks for secure multi-party computation based on secret sharing with honest majority. In: International conference on applied cryptography and network security. Springer, pp 377–397
Ziller A, Trask A, Lopardo A, Szymkow B, Wagner B, Bluemke E, Nounahon J-M, Passerat-Palmbach J, Prakash K, Rose N et al (2021) Pysyft: a library for easy federated learning. In: Federated learning systems. Springer, pp 111–139
Acar A, Aksu H, Uluagac AS, Conti M (2018) A survey on homomorphic encryption schemes: theory and implementation. ACM Comput Surv (Csur) 51(4):1–35
Hosseini E, Khisti A (2021) Secure aggregation in federated learning via multiparty homomorphic encryption. In: 2021 IEEE globecom workshops (GC Wkshps). IEEE, pp 1–6
Yousuf H, Lahzi M, Salloum SA, Shaalan K (2021) Systematic review on fully homomorphic encryption scheme and its application. Recent Adv Intell Syst Smart Appl 537–551
Peralta G, Cid-Fuentes RG, Bilbao J, Crespo PM (2019) Homomorphic encryption and network coding in iot architectures: advantages and future challenges. Electronics 8(8):827
Ogburn M, Turner C, Dahal P (2013) Homomorphic encryption. Procedia Comput Sci 20:502–509
Li S, Ngai E, Voigt T (2021) Byzantine-robust aggregation in federated learning empowered industrial iot. IEEE Trans Ind Inform
Xu C, Jia Y, Zhu L, Zhang C, Jin G, Sharif K (2022) Tdfl: Truth discovery based byzantine robust federated learning. IEEE Trans Parallel Distrib Syst
Jin R, Hu J, Min G, Lin H (2022) Byzantine-robust and efficient federated learning for the internet of things. IEEE Internet Things Magn 5(1):114–118
Rawat A, Zizzo G, Hameed MZ, Muñoz-González L (2022) Security and robustness in federated learning. In: Federated learning. Springer, pp 363–390
Ma X, Sun X, Wu Y, Liu Z, Chen X, Dong C (2022) Differentially private byzantine-robust federated learning. IEEE Trans Parallel Distrib Syst
He Y, Chen Y, Yang X, Yu H, Huang Y-H, Gu Y (2022) Learning critically: Selective self-distillation in federated learning on non-iid data. IEEE Trans Big Data
Taya A, Nishio T, Morikura M, Yamamoto K (2022) Decentralized and model-free federated learning: Consensus-based distillation in function space. IEEE Trans Signal Inf Process Netw
Gorsline M, Smith J, Merkel C (2021) On the adversarial robustness of quantized neural networks. In: Proceedings of the 2021 on great lakes symposium on VLSI, pp 189–194
Sachdeva S, Ali A (2022) Machine learning with digital forensics for attack classification in cloud network environment. Int J Syst Assur Eng Manag 13(1):156–165
Regazzoni F, Palmieri P, Smailbegovic F, Cammarota R, Polian I (2021) Protecting artificial intelligence ips: a survey of watermarking and fingerprinting for machine learning. CAAI Trans Intell Technol 6(2):180–191
Basit A, Tufail M, Hong K-S, Rehan M, Ahmed I (2022) Event-triggered distributed exponential h observers design for discrete-time nonlinear systems over wireless sensor networks. In: 2022 13th Asian control conference (ASCC), pp 1730–1735. https://doi.org/10.23919/ASCC56756.2022.9828291
Ahmed I, Rehan M, Hong K-S, Basit A (2022) Event-triggered leaderless robust consensus control of nonlinear multi-agents under disturbances. In: 2022 13th Asian control conference (ASCC), pp 1736–1741. https://doi.org/10.23919/ASCC56756.2022.9828087
Ahmed I, Rehan M, Hong K-S, Basit A (2022) A consensus-based approach for economic dispatch considering multiple fueling strategy of electricity production sector over a smart grid. In: 2022 13th Asian control conference (ASCC), pp 1196–1201. https://doi.org/10.23919/ASCC56756.2022.9828267
Ahmed I, Rehan M, Iqbal N (2022) A novel exponential approach for dynamic event-triggered leaderless consensus of nonlinear multi-agent systems over directed graphs. IEEE Trans Circuits Syst II Express Briefs 69(3):1782–1786. https://doi.org/10.1109/TCSII.2021.3120791
Ardizzon F, Diamant R, Casari P, Tomasin S (2022) Machine learning-based distributed authentication of uwan nodes with limited shared information. In: 2022 Sixth underwater communications and networking conference (UComms). IEEE, pp 1–5
Deng L, Li G, Han S, Shi L, Xie Y (2020) Model compression and hardware acceleration for neural networks: a comprehensive survey. Proc IEEE 108(4):485–532
Filho CP, Marques E Jr, Chang V, Dos Santos L, Bernardini F, Pires PF, Ochi L, Delicato FC (2022) A systematic literature review on distributed machine learning in edge computing. Sensors 22(7):2665
Wang J, Cao B, Yu P, Sun L, Bao W, Zhu X (2018) Deep learning towards mobile applications. In: 2018 IEEE 38th international conference on distributed computing systems (ICDCS). IEEE, pp 1385–1393
Huang L, Zhang Z, Du Z, Li S, Zheng H, Xie Y, Tan N (2022) Epquant: a graph neural network compression approach based on product quantization. Neurocomputing 503:49–61
Harris D, Rinberg A, Rottenstreich O (2022) Compressing distributed network sketches with traffic-aware summaries. IEEE Trans Netw Serv Manag. https://doi.org/10.1109/TNSM.2022.3172299
Zhou Q, Qu Z, Guo S, Luo B, Guo J, Xu Z, Akerkar R (2021) On-device learning systems for edge intelligence: a software and hardware synergy perspective. IEEE Internet Things J 8(15):11916–11934. https://doi.org/10.1109/JIOT.2021.3063147
Tekalp AM, Covell M, Timofte R, Dong C (2021) Editorial: Introduction to the issue on deep learning for image/video restoration and compression. IEEE J Sel Top Signal Process 15(2):157–161. https://doi.org/10.1109/JSTSP.2021.3053364
Chen Y, Hu SX, Shen X, Ai C, Suykens JAK (2022) Compressing features for learning with noisy labels. IEEE Trans Neural Netw Learn Syst 1–15. https://doi.org/10.1109/TNNLS.2022.3186930
Wei K, Li J, Ma C, Ding M, Chen C, Jin S, Han Z, Poor HV (2022) Low-latency federated learning over wireless channels with differential privacy. IEEE J Sel Areas Commun 40(1):290–307. https://doi.org/10.1109/JSAC.2021.3126052
Ma C, Yuan L, Han L, Ding M, Bhaskar R, Li J (2021) Data level privacy preserving: a stochastic perturbation approach based on differential privacy. IEEE Trans Knowl Data Eng. https://doi.org/10.1109/TKDE.2021.3137047
Yan H, Li X, Li H, Li J, Sun W, Li F (2022) Monitoring-based differential privacy mechanism against query flooding-based model extraction attack. IEEE Trans Dependable Secure Comput 19(4):2680–2694. https://doi.org/10.1109/TDSC.2021.3069258
Liu B, Ding M, Shaham S, Rahayu W, Farokhi F, Lin Z (2021) When machine learning meets privacy: a survey and outlook. ACM Comput Surv (CSUR) 54(2):1–36
Liu Y, Wen R, He X, Salem A, Zhang Z, Backes M, De Cristofaro E, Fritz M, Zhang Y (2022) \(\{\)ML-Doctor\(\}\): Holistic risk assessment of inference attacks against machine learning models. In: 31st USENIX security symposium (USENIX Security 22), pp 4525–4542
Kumová V, Pilát M (2021) Beating white-box defenses with black-box attacks. In: 2021 International joint conference on neural networks (IJCNN). IEEE, pp 1–8
Wang K, Yuan F, Zhao L, Hou R, Ji Z, Meng D (2022) Secure hybrid replacement policy: mitigating conflict-based cache side channel attacks. Microprocess Microsyst 89:104420
Wang Q, Yang H, Wu G, Choo K-KR, Zhang Z, Miao G, Ren Y (2022) Black-box adversarial attacks on xss attack detection model. Comput Secur 113:102554
Chen J, Wang X, Zhang Y, Zheng H, Yu S, Bao L (2022) Agent manipulator: stealthy strategy attacks on deep reinforcement learning. Appl Intell 1–28
Wu B, Zhong L, Li H, Ye Y (2022) Efficient complementary graph convolutional network without negative sampling for item recommendation. Knowl-Based Syst 256:109758
Naseer M, Khan S, Hayat M, Khan FS, Porikli F (2022) Stylized adversarial defense. IEEE Trans Pattern Anal Mach Intell
Ni C, Cang LS, Gope P, Min G (2022) Data anonymization evaluation for big data and iot environment. Inf Sci 605:381–392
Hossayni H, Khan I, Crespi N (2021) Data anonymization for maintenance knowledge sharing. IT Prof 23(5):23–30
Cai Z, Xiong Z, Xu H, Wang P, Li W, Pan Y (2021) Generative adversarial networks: a survey toward private and secure applications. ACM Comput Surv (CSUR) 54(6):1–38
Maximov M, Elezi I, Leal-Taixé L (2020) Ciagan: Conditional identity anonymization generative adversarial networks. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 5447–5456
Khan P, Khan Y, Kumar S (2021) Single identity clustering-based data anonymization in healthcare. In: Computationally intelligent systems and their applications. Springer, pp 1–9
Ito S, Kikuchi H (2022) Estimation of cost of k–anonymity in the number of dummy records. J Ambient Intell Hum Comput 1–10
Kotal A, Piplai A, Chukkapalli SSL, Joshi A (2022) Privetab: Secure and privacy-preserving sharing of tabular data. In: Proceedings of the 2022 ACM on international workshop on security and privacy analytics, pp 35–45
Nasr M, Songi S, Thakurta A, Papernot N, Carlin N (2021) Adversary instantiation: Lower bounds for differentially private machine learning. In: 2021 IEEE symposium on security and privacy (SP). IEEE, pp 866–882
Shang F, Xu T, Liu Y, Liu H, Shen L, Gong M (2021) Differentially private admm algorithms for machine learning. IEEE Trans Inf For Secur 16:4733–4745
Wei K, Li J, Ma C, Ding M, Poor HV (2021) Differentially private federated learning: algorithm, analysis and optimization. In: Federated learning systems. Springer, pp 51–78
Wang T, Zhao J, Hu Z, Yang X, Ren X, Lam K-Y (2021) Local differential privacy for data collection and analysis. Neurocomputing 426:114–133
Froelicher D, Troncoso-Pastoriza JR, Pyrgelis A, Sav S, Sousa JS, Bossuat J-P, Hubaux J-P (2021) Scalable privacy-preserving distributed learning. Proc Privacy Enhanc Technol 2021(2):323–347
Luo S, Fan P, Li K, Xing H, Luo L, Yu H (2022) Fast parameter synchronization for distributed learning with selective multicast. In: ICC 2022-IEEE international conference on communications. IEEE, pp 4775–4780
Zhang R, Zhu Q (2018) A game-theoretic approach to design secure and resilient distributed support vector machines. IEEE Trans Neural Netw Learn Syst 29(11):5512–5527
Savazzi S, Nicoli M, Bennis M, Kianoush S, Barbieri L (2021) Opportunities of federated learning in connected, cooperative, and automated industrial systems. IEEE Commun Mag 59(2):16–21
Yang M, Qian H, Wang X, Zhou Y, Zhu H (2021) Client selection for federated learning with label noise. IEEE Trans Veh Technol 71(2):2193–2197
Zheng J, Chan PP, Chi H, He Z (2022) A concealed poisoning attack to reduce deep neural networks’ robustness against adversarial samples. Inf Sci
Castillo J (2022) Blockchain: A decentralized solution for secure applications. PhD thesis, UNIVERSITY OF TEXAS AT SAN ANTONIO
Dahmane S, Yagoubi MB, Kerrache CA, Lorenz P, Lagraa N, Lakas A (2022) Toward a secure edge-enabled and artificially intelligent internet of flying things using blockchain. IEEE Internet Things Magn 5(2):90–95
Rodríguez-Barroso N, Martínez-Cámara E, Luzón MV, Herrera F (2022) Backdoor attacks-resilient aggregation based on robust filtering of outliers in federated learning for image classification. Knowl-Based Syst 245:108588
Mukherjee S, Xu Y, Trivedi A, Patowary N, Ferres JL (2021) privgan: protecting gans from membership inference attacks at low cost to utility. Proc Priv Enhanc Technol 2021(3):142–163
De Cristofaro E (2021) A critical overview of privacy in machine learning. IEEE Secur Privacy 19(4):19–27
Liu L, Wang Y, Liu G, Peng K, Wang C (2022) Membership inference attacks against machine learning models via prediction sensitivity. IEEE Trans Depend Secure Comput
Subramanian J, Sinha A, Seraj R, Mahajan A (2022) Approximate information state for approximate planning and reinforcement learning in partially observed systems. J Mach Learn Res 23:12–1
Oroojlooyjadid A, Nazari M, Snyder LV, Takáč M (2022) A deep q-network for the beer game: deep reinforcement learning for inventory optimization. Manuf Serv Oper Manag 24(1):285–304
Huang L, Wei S, Gao C, Liu N (2022) Cyclical adversarial attack pierces black-box deep neural networks. Pattern Recogn 108831
Pavlidis A, Faehn E, Louërat M-M, Stratigopoulos H-G (2022) Run-time hardware trojan detection in analog and mixed-signal ics. In: 40th IEEE VLSI test symposium 2022
Sethi K, Madhav YV, Kumar R, Bera P (2021) Attention based multi-agent intrusion detection systems using reinforcement learning. J Inf Secur Appl 61:102923
Jafari M, Rahman MA, Paudyal S (2022) Optimal false data injection attacks against power system frequency stability. IEEE Trans Smart Grid
Barua A, Al Alamin MA, Hossain MS, Hossain E (2022) Security and privacy threats for bluetooth low energy in iot and wearable devices: a comprehensive survey. IEEE Open J Commun Soc
Lee XY, Esfandiari Y, Tan KL, Sarkar S (2021) Query-based targeted action-space adversarial policies on deep reinforcement learning agents. In: Proceedings of the ACM/IEEE 12th international conference on cyber-physical systems, pp 87–97
García J, Sagredo I (2022) Instance-based defense against adversarial attacks in deep reinforcement learning. Eng Appl Artif Intell 107:104514
Suya F, Chi J, Evans D, Tian Y (2020) Hybrid batch attacks: Finding black-box adversarial examples with limited queries. In: 29th USENIX security symposium (USENIX Security 20), pp 1327–1344
Wang X, Cai M, Sohel F, Sang N, Chang Z (2021) Adversarial point cloud perturbations against 3d object detection in autonomous driving systems. Neurocomputing 466:27–36
Bharath Kumar D, Kumar N, Dunston SD, Rajam V (2022) Analysis of the impact of white box adversarial attacks in resnet while classifying retinal fundus images. In: International conference on computational intelligence in data science. Springer, pp 162–175
Wang Z, Ma J, Wang X, Hu J, Qin Z, Ren K (2022) Threats to training: a survey of poisoning attacks and defenses on machine learning systems. ACM J ACM (JACM)
Sheatsley R, Papernot N, Weisman MJ, Verma G, McDaniel P (2022) Adversarial examples for network intrusion detection systems. J Comput Secur (Preprint), 1–26
Alpdemir MN (2022) Tactical uav path optimization under radar threat using deep reinforcement learning. Neural Comput Appl 34(7):5649–5664
Alavizadeh H, Jang-Jaccard J, Enoch SY, Al-Sahaf H, Welch I, Camtepe SA, Kim DD (2022) A survey on cyber situation awareness systems: framework, techniques, and insights. ACM Comput Surv (CSUR)
Sewak M, Sahay SK, Rathore H (2022) Deep reinforcement learning in the advanced cybersecurity threat detection and protection. Inf Syst Front 1–23
Pessach D, Shmueli E (2022) A review on fairness in machine learning. ACM Comput Surv (CSUR) 55(3):1–44
Guo Y, Zhou Y, Zhang Z (2021) Fault diagnosis of multi-channel data by the cnn with the multilinear principal component analysis. Measurement 171:108513
Liu J, Huang J, Zhou Y, Li X, Ji S, Xiong H, Dou D (2022) From distributed machine learning to federated learning: a survey. Knowl Inf Syst 1–33
Hu Y, Chen M, Saad W, Poor HV, Cui S (2021) Distributed multi-agent meta learning for trajectory design in wireless drone networks. IEEE J Sel Areas Commun 39(10):3177–3192
Wang J, Li Q, Hu Y, Li X et al (2022) A privacy preservation framework for feedforward-designed convolutional neural networks. Neural Netw 155:14–27
Chen W-N, Choo CAC, Kairouz P, Suresh AT (2022) The fundamental price of secure aggregation in differentially private federated learning. In: International conference on machine learning. PMLR, pp 3056–3089
Duan Q, Hu S, Deng R, Lu Z (2022) Combined federated and split learning in edge computing for ubiquitous intelligence in internet of things: State-of-the-art and future directions. Sensors 22(16):5983
Gandikota V, Kane D, Maity RK, Mazumdar A (2021) vqsgd: vector quantized stochastic gradient descent. In: International conference on artificial intelligence and statistics. PMLR, pp 2197–2205
Dobraunig C, Grassi L, Helminger L, Rechberger C, Schofnegger M, Walch R (2021) Pasta: a case for hybrid homomorphic encryption. Cryptology ePrint Archive
Takahashi A, Zaverucha G (2021) Verifiable encryption from mpc-in-the-head. Cryptology ePrint Archive
Lakshmi TN, Jyothi S, Kumar MR (2021) Image encryption algorithms using machine learning and deep learning techniques-a survey. In: Modern approaches in machine learning and cognitive science: a walkthrough. Springer, pp 507–515
Xu G, Li H, Liu S, Yang K, Lin X (2019) Verifynet: secure and verifiable federated learning. IEEE Trans Inf For Secur 15:911–926
Bowler AL, Pound MP, Watson NJ (2021) Domain adaptation and federated learning for ultrasonic monitoring of beer fermentation. Fermentation 7(4):253
Sun W, Lei S, Wang L, Liu Z, Zhang Y (2020) Adaptive federated learning and digital twin for industrial internet of things. IEEE Trans Ind Inf 17(8):5605–5614
Khoa TV, Saputra YM, Hoang DT, Trung NL, Nguyen D, Ha NV, Dutkiewicz E (2020) Collaborative learning model for cyberattack detection systems in iot industry 4.0. In: 2020 IEEE wireless communications and networking conference (WCNC). IEEE, pp 1–6
Neudecker D, Grosskopf M, Herman M, Haeck W, Grechanuk P, Vander Wiel S, Rising ME, Kahler A, Sly N, Talou P (2020) Enhancing nuclear data validation analysis by using machine learning. Nucl Data Sheets 167:36–60
Li X, Qu Z, Zhao S, Tang B, Lu Z, Liu Y (2021) Lomar: A local defense against poisoning attack on federated learning. IEEE Trans Dependable Secure Comput
Mahela OP, Khosravy M, Gupta N, Khan B, Alhelou HH, Mahla R, Patel N, Siano P (2020) Comprehensive overview of multi-agent systems for controlling smart grids. CSEE J Power Energy Syst
Ahmad S, Bokhari M (2012) A new approach to multi agent based architecture for secure and effective e-learning. Int J Comput Appl 46(22):26–29
Morris A, Guan J, Azhar A (2021) An xri mixed-reality internet-of-things architectural framework toward immersive and adaptive smart environments. In: 2021 IEEE international symposium on mixed and augmented reality adjunct (ISMAR-Adjunct). IEEE, pp 68–74
Zhu Q, Ishii H (2022) Introduction to the special section on learning and security for multi-agent systems. Annual Reviews in Control
Drawel N, Bentahar J, Laarej A, Rjoub G (2022) Formal verification of group and propagated trust in multi-agent systems. Auton Agent Multi-Agent Syst 36(1):1–31
Alsamhi SH, Shvetsov AV, Shvetsova SV, Hawbani A, Guizan M, Alhartomi MA, Ma O (2022) Blockchain-empowered security and energy efficiency of drone swarm consensus for environment exploration. IEEE Trans Green Commun Netw
Zulfiqar M, Kamran M, Rasheed M (2022) A blockchain-enabled trust aware energy trading framework using games theory and multi-agent system in smat grid. Energy 255:124450
Singh P, Singh MK, Singh R, Singh N (2022) Federated learning: Challenges, methods, and future directions. In: Federated learning for IoT applications. Springer, pp 199–214
Wu C, Wu F, Lyu L, Huang Y, Xie X (2022) Communication-efficient federated learning via knowledge distillation. Nat Commun 13(1):1–8
Gong X, Sharma A, Karanam S, Wu Z, Chen T, Doermann D, Innanje A (2021) Ensemble attention distillation for privacy-preserving federated learning. In: Proceedings of the IEEE/CVF international conference on computer vision, pp 15076–15086
Luo X, Wu Y, Xiao X, Ooi BC (2021) Feature inference attack on model predictions in vertical federated learning. In: 2021 IEEE 37th international conference on data engineering (ICDE). IEEE, pp 181–192
Feng C-M, Yang Z, Fu H, Xu Y, Yang J, Shao L (2021) Donet: dual-octave network for fast mr image reconstruction. IEEE Trans Neural Netw Learn Syst
Batina L, Bhasin S, Jap D, Picek S (2021) Sca strikes back: Reverse engineering neural network architectures using side channels. IEEE Design & Test
Al Aziz MM, Anjum MM, Mohammed N, Jiang X (2022) Generalized genomic data sharing for differentially private federated learning. J Biomed Inform 104113
Zhao P, Cao Z, Jiang J, Gao F (2022) Practical private aggregation in federated learning against inference attack. IEEE Internet Things J
Zhang A, Wan W, Harada K (2022) Fast pivoting gait generation by model predictive control designed with basis functions. Adv Robot 36(15):735–749
Wibawa F, Catak FO, Kuzlu M, Sarp S, Cali U (2022) Homomorphic encryption and federated learning based privacy-preserving cnn training: Covid-19 detection use-case. In: Proceedings of the 2022 European interdisciplinary cybersecurity conference, pp 85–90
Cheng K, Fan T, Jin Y, Liu Y, Chen T, Papadopoulos D, Yang Q (2021) Secureboost: a lossless federated learning framework. IEEE Intell Syst 36(6):87–98
Maddock S, Cormode G, Wang T, Maple C, Jha S (2022) Federated boosted decision trees with differential privacy. arXiv preprint arXiv:2210.02910
Li A, Duan Y, Yang H, Chen Y, Yang J (2020) Tiprdc: task-independent privacy-respecting data crowdsourcing framework for deep learning with anonymized intermediate representations. In: Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining, pp 824–832
Prieto VM, Alvarez M, López-García R, Cacheda F (2012) A scale for crawler effectiveness on the client-side hidden web. Comput Sci Inf Syst 9(2):561–583
Zhu B, Liu JZ, Cauley SF, Rosen BR, Rosen MS (2018) Image reconstruction by domain-transform manifold learning. Nature 555(7697):487–492
Li C, Li H, Chen X (2021) A framework for fast estimation of structural seismic responses using ensemble machine learning model. Smart Struct Syst 28(3):425–441
Handa A, Sharma A, Shukla SK (2019) Machine learning in cybersecurity: a review. Wiley Interdiscip Rev Data Min Knowl Discov 9(4):1306
Hao W, Huang Y, Zhao G (2022) Acoustic sources localization for composite pate using arrival time and bp neural network. Polym Testing 115:107754
Su L, Zhou R, Wang N, Chen J, Li Z (2022) Multi-agent multi-armed bandit learning for content caching in edge networks. In: 2022 IEEE international conference on web services (ICWS). IEEE, pp 11–16
El Sayed H, Zeadally S, Puthal D (2020) Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks. Veh Commun 24:100227
Dan Y, Zhao Y, Li X, Li S, Hu M, Hu J (2020) Generative adversarial networks (gan) based efficient sampling of chemical composition space for inverse design of inorganic materials. npj Comput Mater 6(1):1–7
Ball JE, Anderson DT, Chan CS Sr (2017) Comprehensive survey of deep learning in remote sensing: theories, tools, and challenges for the community. J Appl Remote Sens 11(4):042609
Chen D, Yu N, Zhang Y, Fritz M (2020) Gan-leaks: A taxonomy of membership inference attacks against generative models. In: Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, pp 343–362
Ordway-West E, Parveen P, Henslee A (2018) Autoencoder evaluation and hyper-parameter tuning in an unsupervised setting. In: 2018 IEEE international congress on big data (BigData Congress). IEEE, pp 205–209
Ye D, Zhu T, Zhou W, Philip SY (2019) Differentially private malicious agent avoidance in multiagent advising learning. IEEE Trans Cybern 50(10):4214–4227
Vietri G, Balle B, Krishnamurthy A, Wu S (2020) Private reinforcement learning with pac and regret guarantees. In: International conference on machine learning. PMLR, pp 9754–9764
Zhou J, Zeng S, Zhang B (2020) Two-stage knowledge transfer framework for image classification. Pattern Recogn 107:107529
Mühl C. Personalizing private aggregation of teacher ensembles
Wei X, Shen C (2022) Federated learning over noisy channels: Convergence analysis and design examples. IEEE Trans Cogn Commun Netw
Loukil F, Abed M, Boukadi K (2021) Blockchain adoption in education: a systematic literature review. Educ Inf Technol 26(5):5779–5797
Nguyen DC, Ding M, Pham Q-V, Pathirana PN, Le LB, Seneviratne A, Li J, Niyato D, Poor HV (2021) Federated learning meets blockchain in edge computing: opportunities and challenges. IEEE Internet Things J 8(16):12806–12825
Bistritz I, Baharav T, Leshem A, Bambos N (2020) My fair bandit: distributed learning of max-min fairness with multi-player bandits. In: International conference on machine learning. PMLR, pp 930–940
Berguig Y, Laassiri J, Hanaoui S (2021) Anonymous and lightweight secure authentication protocol for mobile agent system. J Inf Secur Appl 63:103007
Uddin MA, Stranieri A, Gondal I, Balasubramanian V (2021) A survey on the adoption of blockchain in iot: challenges and solutions. Blockchain Res Appl 2(2):100006
Kaliyar RK, Goswami A, Narang P (2021) Deepfake: improving fake news detection using tensor decomposition-based deep neural network. J Supercomput 77(2):1015–1037
Abrahamyan L, Chen Y, Bekoulis G, Deligiannis N (2021) Learned gradient compression for distributed deep learning. IEEE Trans Neural Netw Learn Syst
Emaminejad N, Akhavian R (2022) Trustworthy ai and robotics: Implications for the aec industry. Autom Constr 139:104298
Vásquez-Carbonell M (2022) A systematic literature review of augmented reality in engineering education: hardware, software, student motivation & development recommendations. Digital Educ Rev 41:249–267
Acknowledgements
The author Muhammad Khalid would like to express their profound gratitude to King Abdullah City for Atomic and Renewable Energy (K.A.CARE), Saudi Arabia for their financial support in accomplishing this work. Also, the authors would like to acknowledge the support from the Interdisciplinary Research Center for Sustainable Energy Systems at King Fahd University of Petroleum Minerals, Saudi Arabia under project No. INSE2415.
Funding
All authors confirms that they do not possess any identifiable conflicting financial interests or personal affiliations that might have influenced the research presented in this manuscript.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Muhammad Khalid, Miswar Akhtar and Muhammad Maaruf. The first draft of the manuscript was written by Ijaz Ahmed and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript
Corresponding authors
Ethics declarations
Conflict of interest
The authors declare no Conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Ahmed, I., Syed, M.A., Maaruf, M. et al. Distributed computing in multi-agent systems: a survey of decentralized machine learning approaches. Computing 107, 2 (2025). https://doi.org/10.1007/s00607-024-01356-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00607-024-01356-0