[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

Distributed computing in multi-agent systems: a survey of decentralized machine learning approaches

  • Regular Paper
  • Published:
Computing Aims and scope Submit manuscript

Abstract

At present, there is a pressing need for data scientists and academic researchers to devise advanced machine learning and artificial intelligence-driven systems that can effectively tackle forthcoming security challenges. This is due to the rapid advancement in processing capabilities of distributed client devices, as well as mounting apprehensions about the exposure of sensitive user data. This particular methodology renders the constituents of a decentralized machine learning paradigm private and allocates them to a diverse array of remote client apparatuses. Following this, a primary controller clusters the extracted machine learning data. This process effectively transforms a centrally controlled machine learning procedure into a distributed one, leading to significant potential benefits. Regrettably, the implementation of a progressive strategy for networked machine learning poses additional obstacles to the preservation of user data confidentiality and cyber-security apprehensions. The present endeavor aims to scrutinize the plausible hazards that decentralized machine learning may engender for the security and confidentiality of user data, as well as their well-being, through the lens of data transmission thresholds. These risks are contingent upon the salient stages of a machine learning model. The aforementioned procedures include: (i) establishing thresholds for raw data prior to processing; (ii) establishing thresholds for the learning framework; (iii) establishing thresholds for the obtained information; and (iv) establishing thresholds for the provisional outcome. We conducted a comprehensive analysis of state-of-the-art hacking methodologies, evaluating their potential vulnerabilities at every stage of the transaction, and subsequently deliberated on practical solutions to address these issues. Ultimately, the survey culminates in an exposition of the obstacles and prospects that confront researchers in this intricate realm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

No data was used for the research described in the article.

References

  1. Pyzer-Knapp EO, Pitera JW, Staar PW, Takeda S, Laino T, Sanders DP, Sexton J, Smith JR, Curioni A (2022) Accelerating materials discovery using artificial intelligence, high performance computing and robotics. NPJ Comput Mater 8(1):1–9

    Article  Google Scholar 

  2. Sen S, Agarwal S, Chakraborty P, Singh KP (2022) Astronomical big data processing using machine learning: a comprehensive review. Exp Astron 53:1–43

    Article  Google Scholar 

  3. Alam A, Aziz AE, Basit A, Ahmed I, Nasir AA, Khalid M (2024) Cooperative non-orthogonal multiple access-based visible light communication strategy for power-constrained inter-satellite links. IEEE Access

  4. Shao C, Yang Y, Juneja S, GSeetharam T (2022) Iot data visualization for business intelligence in corporate finance. Inf Process Manag 59(1):102736

    Article  Google Scholar 

  5. Ma C, Li J, Shi L, Ding M, Wang T, Han Z, Poor HV (2022) When federated learning meets blockchain: a new distributed learning paradigm. IEEE Comput Intell Mag 17(3):26–33

    Article  Google Scholar 

  6. Zou T, Liu Y, Kang Y, Liu W, He Y, Yi Z, Yang Q, Zhang Y-Q (2022) Defending batch-level label inference and replacement attacks in vertical federated learning. IEEE Trans Big Data

  7. Iqbal F, Rehan M, Hussain M, Ahmed I, Khalid M (2024) Multi-objective optimal antiwindup compensation of discrete-time nonlinear systems under input saturation. Arab J Sci Eng 49:1–15

    Article  Google Scholar 

  8. Yarradoddi S, Gadekallu TR (2022) Federated learning role in big data, jot services and applications security, privacy and trust in jot a survey. In: Trust, security and privacy for big data. CRC Press, pp 28–49

  9. Treleaven P, Smietanka M, Pithadia H (2022) Federated learning: the pioneering distributed machine learning and privacy-preserving data technology. Computer 55(4):20–29

    Article  Google Scholar 

  10. Nti IK, Quarcoo JA, Aning J, Fosu GK (2022) A mini-review of machine learning in big data analytics: applications, challenges, and prospects. Big Data Min Anal 5(2):81–97

    Article  Google Scholar 

  11. Tajabadi M, Martin R, Heider D (2024) Privacy-preserving decentralized learning methods for biomedical applications. Comput Struct Biotechnol J

  12. Lin H, Han J, Wu P, Wang J, Tu J, Tang H, Zhu L (2024) Machine learning and human-machine trust in healthcare: a systematic survey. CAAI Trans Intell Technol 9(2):286–302

    Article  Google Scholar 

  13. Aboukadri S, Ouaddah A, Mezrioui A (2024) Machine learning in identity and access management systems: survey and deep dive. Comput Secur 103729

  14. Aminizadeh S, Heidari A, Dehghan M, Toumaj S, Rezaei M, Navimipour NJ, Stroppa F, Unal M (2024) Opportunities and challenges of artificial intelligence and distributed systems to improve the quality of healthcare service. Artif Intell Med 149:102779

    Article  Google Scholar 

  15. Schmitt M (2023) Securing the digital world: protecting smart infrastructures and digital industries with artificial intelligence (ai)-enabled malware and intrusion detection. J Ind Inf Integr 36:100520

    Google Scholar 

  16. Schmitt M (2023) Automated machine learning: Ai-driven decision making in business analytics. Intell Syst Appl 18:200188

    Google Scholar 

  17. Ahmad H, Gulzar MM, Aziz S, Habib S, Ahmed I (2024) Ai-based anomaly identification techniques for vehicles communication protocol systems: comprehensive investigation, research opportunities and challenges. Internet of Things 101245

  18. Ahmed I, Asif M, Alhelou HH, Khalid M et al (2024) A review on enhancing energy efficiency and adaptability through system integration for smart buildings. J Build Eng 109354

  19. Sreedevi A, Harshitha TN, Sugumaran V, Shankar P (2022) Application of cognitive computing in healthcare, cybersecurity, big data and iot: A literature review. Inf Process Manag 59(2):102888

    Article  Google Scholar 

  20. Ali PR, Rehan M, Ahmed W, Basit A, Ahmed I (2024) A novel output feedback consensus control approach for generic linear multi-agent systems under input saturation over a directed graph topology. ISA Trans 148:128–139

    Article  Google Scholar 

  21. Perera C, Ranjan R, Wang L, Khan SU, Zomaya AY (2015) Big data privacy in the internet of things era. IT Professional 17(3):32–39

    Article  Google Scholar 

  22. Hajjaji Y, Boulila W, Farah IR, Romdhani I, Hussain A (2021) Big data and iot-based applications in smart environments: a systematic review. Comput Sci Rev 39:100318

    Article  Google Scholar 

  23. Alferidah DK, Jhanjhi N (2020) A review on security and privacy issues and challenges in internet of things. Int J Comput Sci Netw Secur IJCSNS 20(4):263–286

    Google Scholar 

  24. Lian X, Zhang C, Zhang H, Hsieh C-J, Zhang W, Liu J (2017) Can decentralized algorithms outperform centralized algorithms? a case study for decentralized parallel stochastic gradient descent. Adv Neural Inf Process Syst 30

  25. Wahab OA, Mourad A, Otrok H, Taleb T (2021) Federated machine learning: survey, multi-level classification, desirable criteria and future directions in communication and networking systems. IEEE Commun Surv Tutor 23(2):1342–1397

    Article  Google Scholar 

  26. Ahmed I, Rehan M, Iqbal N, Basit A, Khalid M (2024) Free-weighting matrix approach for event-triggered cooperative control of generic linear multi-agent systems: an application for uavs. Arab J Sci Eng 49(5):6761–6772

    Article  Google Scholar 

  27. Zhang K, Yang Z, Başar T (2021) Decentralized multi-agent reinforcement learning with networked agents: recent advances. Front Inf Technol Electro Eng 22(6):802–814

    Article  Google Scholar 

  28. Mustafa FE, Ahmed I, Basit A, Alqahtani M, Khalid M (2024) An adaptive metaheuristic optimization approach for tennessee eastman process for an industrial fault tolerant control system. PLoS ONE 19(2):0296471

    Article  Google Scholar 

  29. Li G, Ota K, Dong M, Wu J, Li J (2019) Desvig: decentralized swift vigilance against adversarial attacks in industrial artificial intelligence systems. IEEE Trans Industr Inf 16(5):3267–3277

    Article  Google Scholar 

  30. Sun M, Tay WP (2019) On the relationship between inference and data privacy in decentralized iot networks. IEEE Trans Inf For Secur 15:852–866

    Article  Google Scholar 

  31. Ahmed I, Rehan M, Basit A, Al-Ismail FS, Khalid M (2024) Consensus and clustering approach for dynamic event-triggered distributed optimization of power system networks with saturation constraint approche de consensus et de regroupement pour l’optimisation dynamique distribuée déclenchée par les événements des réseaux électriques avec contrainte de saturation. IEEE Can J Electr Comput Eng

  32. Qu Y, Gao L, Luan TH, Xiang Y, Yu S, Li B, Zheng G (2020) Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Internet Things J 7(6):5171–5183

    Article  Google Scholar 

  33. Li J, Shao Y, Wei K, Ding M, Ma C, Shi L, Han Z, Poor HV (2021) Blockchain assisted decentralized federated learning (blade-fl): performance analysis and resource allocation. IEEE Trans Parallel Distrib Syst 33(10):2401–2415

    Article  Google Scholar 

  34. Khalid M, Ahmed I, AlMuhaini M, Savkin AV (2024) A novel computational paradigm for scheduling of hybrid energy networks considering renewable uncertainty limitations. Energy Rep 11:1959–1978

    Article  Google Scholar 

  35. Briggs C, Fan Z, Andras P (2021) A review of privacy-preserving federated learning for the internet-of-things. Federated Learn Syst 21–50

  36. Amiri-Zarandi M, Dara RA, Fraser E (2020) A survey of machine learning-based solutions to protect privacy in the internet of things. Comput Secur 96:101921

    Article  Google Scholar 

  37. Amanullah MA, Habeeb RAA, Nasaruddin FH, Gani A, Ahmed E, Nainar ASM, Akim NM, Imran M (2020) Deep learning and big data technologies for iot security. Comput Commun 151:495–517

    Article  Google Scholar 

  38. Gong M, Xie Y, Pan K, Feng K, Qin AK (2020) A survey on differentially private machine learning. IEEE Comput Intell Mag 15(2):49–64

    Article  Google Scholar 

  39. Verbraeken J, Wolting M, Katzy J, Kloppenburg J, Verbelen T, Rellermeyer JS (2020) A survey on distributed machine learning. Acm Comput Surv (csur) 53(2):1–33

    Article  Google Scholar 

  40. Enthoven D, Al-Ars Z (2021) An overview of federated deep learning privacy attacks and defensive strategies. Federated Learn Syst 173–196

  41. De Cristofaro E (2021) A critical overview of privacy in machine learning. IEEE Secur Privacy 19(4):19–27

    Article  Google Scholar 

  42. Wang Y, Tang T, Xu Y, Bai Y, Yin L, Li G, Zhang H, Liu H, Huang Y (2021) All-weather, natural silent speech recognition via machine-learning-assisted tattoo-like electronics. npj Flexible Electron 5(1):1–9

    Article  Google Scholar 

  43. Radaideh MI, Pappas C, Cousineau S (2022) Real electronic signal data from particle accelerator power systems for machine learning anomaly detection. Data Brief 43:108473

    Article  Google Scholar 

  44. Lu Z (2021) Computational discovery of energy materials in the era of big data and machine learning: a critical review. Mater Rep Energy 1(3):100047

    Google Scholar 

  45. Hashem IA, Siddiqa A, Alaba FA, Bilal M, Alhashmi SM (2024) Distributed intelligence for iot-based smart cities: a survey. Neural Comput Appl 1–36

  46. Teo ZL, Jin L, Li S, Miao D, Zhang X, Ng WY, Tan TF, Lee DM, Chua KJ, Heng J, et al (2024) Federated machine learning in healthcare: a systematic review on clinical applications and technical architecture. Cell Repo Med

  47. Fazel E, Nezhad MZ, Rezazadeh J, Moradi M, Ayoade J (2024) Iot convergence with machine learning & blockchain: a review. Internet Things 101187

  48. Zhao X, Papagelis M, An A, Chen BX, Liu J, Hu Y (2021) Zipline: an optimized algorithm for the elastic bulk synchronous parallel model. Mach Learn 110(10):2867–2903

    Article  MathSciNet  Google Scholar 

  49. Ahmed I, Alvi U-E-H, Basit A, Khursheed T, Alvi A, Hong K-S, Rehan M (2022) A novel hybrid soft computing optimization framework for dynamic economic dispatch problem of complex non-convex contiguous constrained machines. PLoS ONE 17(1):0261709

    Article  Google Scholar 

  50. Alvi U-E, Ahmed W, Rehan M, Ahmed S, Ahmad R, Ahmed I, et al (2022) A novel incremental cost consensus approach for distributed economic dispatch over directed communication topologies in a smart grid. Soft Comput 1–16

  51. Ahmed I, Rao AR, Shah A, Alamzeb E, Khan JA (2014) Performance of various metaheuristic techniques for economic dispatch problem with valve point loading effects and multiple fueling options. Adv Electr Eng 2014

  52. Ahmed I, Rehan M, Hong K-S, Basit A (2022) A consensus-based approach for economic dispatch considering multiple fueling strategy of electricity production sector over a smart grid. In: 2022 13th Asian control conference (ASCC). IEEE, pp 1196–1201

  53. Ahmed I, Khan R, Ali F. Metaheuristic techniqes for power economic dispatch of units with valve-point effects and multiple fuels

  54. Ahmed I, Rehan M, Basit A, Malik SH, Hong K-S et al (2022) Multi-area economic emission dispatch for large-scale multi-fueled power plants contemplating inter-connected grid tie-lines power flow limitations. Energy 261:125178

    Article  Google Scholar 

  55. Ahmed I, Basit A, Rehan M, Hong K-S et al (2022) Multi-objective whale optimization approach for cost and emissions scheduling of thermal plants in energy hubs. Energy Rep 8:9158–9174

    Article  Google Scholar 

  56. Ahmed I, Rehan M, Basit A, Hong K-S (2022) Greenhouse gases emission reduction for electric power generation sector by efficient dispatching of thermal plants integrated with renewable systems. Sci Rep 12(1):1–21

    Article  Google Scholar 

  57. Sun H, Gui Z, Guo S, Qi Q, Wang J, Liao J (2021) Gssp: eliminating stragglers through grouping synchronous for distributed deep learning in heterogeneous cluster. IEEE Trans Cloud Comput

  58. Xiao D, Li X, Zhou J, Du Y, Wu W (2022) Iteration number-based hierarchical gradient aggregation for distributed deep learning. J Supercomput 78(4):5565–5587

    Article  Google Scholar 

  59. Khan T, Tian W, Zhou G, Ilager S, Gong M, Buyya R (2022) Machine learning (ml)–centric resource management in cloud computing: a review and future directions. J Netw Comput Appl 103405

  60. Banabilah S, Aloqaily M, Alsayed E, Malik N, Jararweh Y (2022) Federated learning review: fundamentals, enabling technologies, and future applications. Inf Process Manag 59(6):103061

    Article  Google Scholar 

  61. Pham Q-V, Zeng M, Huynh-The T, Han Z, Hwang W-J (2022) Aerial access networks for federated learning: applications and challenges. IEEE Netw 36(3):159–166

    Article  Google Scholar 

  62. Ghimire B, Rawat DB (2022) Recent advances on federated learning for cybersecurity and cybersecurity for federated learning for internet of things. IEEE Internet Things J

  63. Zawad S, Yan F, Anwar A (2022) Introduction to federated learning systems. In: Federated learning. Springer, pp 195–212

  64. Feng S (2022) Vertical federated learning-based feature selection with non-overlapping sample utilization. Expert Syst Appl 208:118097

    Article  Google Scholar 

  65. Lee H, Kim J, Ahn S, Hussain R, Cho S, Son J (2021) Digestive neural networks: a novel defense strategy against inference attacks in federated learning. Comput Secur 109:102378

    Article  Google Scholar 

  66. Gao J, Hou B, Guo X, Liu Z, Zhang Y, Chen K, Li J (2021) Secure aggregation is insecure: category inference attack on federated learning. IEEE Trans Depend Secure Comput

  67. Sun J, Li A, DiValentin L, Hassanzadeh A, Chen Y, Li H (2021) Fl-wbc: enhancing robustness against model poisoning attacks in federated learning from a client perspective. Adv Neural Inf Process Syst 34:12613–12624

    Google Scholar 

  68. Samikwa E, Di Maio A, Braun T (2022) Ares: aaptive resource-aware split learning for internet of things. Comput Netw 109380

  69. Kwak Y, Yun WJ, Kim JP, Cho H, Park J, Choi M, Jung S, Kim J (2022) Quantum distributed deep learning architectures: models, discussions, and applications. ICT Express

  70. Chen M-S, Lin J-Q, Li X-L, Liu B-Y, Wang C-D, Huang D, Lai J-H (2022) Representation learning in multi-view clustering: a literature review. Data Sci Eng 1–17

  71. Yuan C, Wu Y, Qin X, Qiao S, Pan Y, Huang P, Liu D, Han N (2019) An effective image classification method for shallow densely connected convolution networks through squeezing and splitting techniques. Appl Intell 49(10):3570–3586

    Article  Google Scholar 

  72. Kim J, Park Y, Kim G, Hwang SJ (2017) Splitnet: Learning to semantically split deep networks for parameter reduction and model parallelization. In: International conference on machine learning. PMLR, pp 1866–1874

  73. Weng J, Su S, Fan X (2022) Two-stage clustering for federated learning with pseudo mini-batch sgd training on non-iid data. In: CCF conference on computer supported cooperative work and social computing. Springer, pp 29–43

  74. Zhu W, Tang Y (2021) Dalu: adaptive learning rate update in distributed deep learning. In: 2021 IEEE smartworld, ubiquitous intelligence & computing, advanced & trusted computing, scalable computing & communications, internet of people and smart city innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI). IEEE, pp 203–209

  75. Li J, Li P, Liu Z, Chen X, Li T (2022) Secure distributed learning. In: Privacy-preserving machine learning. Springer, pp 47–56

  76. Dogru O, Velswamy K, Huang B (2021) Actor-critic reinforcement learning and application in developing computer-vision-based interface tracking. Engineering 7(9):1248–1261

    Article  Google Scholar 

  77. Hafiz A (2023) A survey of deep q-networks used for reinforcement learning: state of the art. Intell Commun Technol Virtual Mob Netw 393–402

  78. Basit A, Tufail M, Rehan M, Ahmed W, Radwan A, Ahmed I (2024) Event-based secure filtering under two-channel stochastic attacks and switching topologies over wireless sensor networks. IEEE Trans Netw Sci Eng

  79. Ahmed I, Basit A, Rehan M, Ali A, Maaruf M, Khalid M (2024) A resilient consensus-based energy 5.0 framework for micro-grids under ramp-rate constraints and stochastic fdi attacks. In: 2024 IEEE international conference on industrial technology (ICIT). IEEE, pp 1–6

  80. Li Y, Pan Q, Cambria E (2022) Deep-attack over the deep reinforcement learning. Knowl-Based Syst 108965

  81. Wei X, Yan H, Li B (2022) Sparse black-box video attack with reinforcement learning. Int J Comput Vis 130(6):1459–1473

    Article  Google Scholar 

  82. Xu X, Hu H, Liu Y, Tan J, Zhang H, Song H (2022) Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack. Digital Commun Netw

  83. Hu H, Salcic Z, Sun L, Dobbie G, Yu PS, Zhang X (2022) Membership inference attacks on machine learning: a survey. ACM Comput Surv (CSUR) 54(11s):1–37

    Article  Google Scholar 

  84. Ma T, Xu C, Yang S, Huang Y, Kuang X, Tang H, Grieco LA (2022) An intelligent proactive defense against the client-side dns cache poisoning attack via self-checking deep reinforcement learning. Int J Intell Syst 37(10):8170–8197

    Article  Google Scholar 

  85. Chen J, Gao Y, Shan J, Peng K, Wang C, Jiang H (2022) Manipulating supply chain demand forecasting with targeted poisoning attacks. IEEE Trans Ind Inform

  86. Tian Z, Cui L, Liang J, Yu S (2022) A comprehensive survey on poisoning attacks and countermeasures in machine learning. ACM Comput Surv (CSUR)

  87. Gomathi B, Uma J (2022) Adversarial attacks and defenses against deep learning in cybersecurity. In: Society 5.0 and the future of emerging computational technologies. CRC Press, pp 281–296

  88. Chen H, Zhang W, Liu K, Chen K, Fang H, Yu N (2022) Speech pattern based black-box model watermarking for automatic speech recognition. In: ICASSP 2022-2022 IEEE international conference on acoustics, speech and signal processing (ICASSP). IEEE, pp 3059–3063

  89. Zhang L, Jiang C, Pang A (2022) Black-box attacks and defense for dnn-based power quality classification in smart grid. Energy Rep 8:12203–12214

    Article  Google Scholar 

  90. Khosravy M, Nakamura K, Hirose Y, Nitta N, Babaguchi N (2022) Model inversion attack by integration of deep generative models: privacy-sensitive face generation from a face recognition system. IEEE Trans Inf For Secur 17:357–372

    Article  Google Scholar 

  91. Xu Q, Arafin MT, Qu G (2022) An approximate memory based defense against model inversion attacks to neural networks. IEEE Trans Emerg Top Comput

  92. Shokri R, Stronati M, Song C, Shmatikov V (2017) Membership inference attacks against machine learning models. In: 2017 IEEE symposium on security and privacy (SP). IEEE, pp 3–18

  93. Park C, Hong D, Seo C (2019) An attack-based evaluation method for differentially private learning against model inversion attack. IEEE Access 7:124988–124999

    Article  Google Scholar 

  94. Shi Y, Sagduyu Y (2022) Membership inference attack and defense for wireless signal classifiers with deep learning. IEEE Trans Mobile Comput

  95. Nasr M, Shokri R, Houmansadr A (2019) Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. In: 2019 IEEE symposium on security and privacy (SP). IEEE, pp 739–753

  96. Kasyap H, Tripathy S (2021) Privacy-preserving decentralized learning framework for healthcare system. ACM Trans Multimedia Comput Commun Appl (TOMM) 17(2s):1–24

    Article  Google Scholar 

  97. Chen T, Ling J, Sun Y (2022) White-box content camouflage attacks against deep learning. Comput Secur 117:102676

    Article  Google Scholar 

  98. Qi P, Jiang T, Wang L, Yuan X, Li Z (2022) Detection tolerant black-box adversarial attack against automatic modulation classification with deep learning. IEEE Trans Reliab

  99. Oliynyk D, Mayer R, Rauber A (2022) I know what you trained last summer: a survey on stealing machine learning models and defences. arXiv preprint arXiv:2206.08451

  100. Lindell Y (2020) Secure multiparty computation. Commun ACM 64(1):86–96

    Article  Google Scholar 

  101. Wood A, Najarian K, Kahrobaei D (2020) Homomorphic encryption for machine learning in medicine and bioinformatics. ACM Comput Surv (CSUR) 53(4):1–35

    Article  Google Scholar 

  102. Ma X, Zhang F, Chen X, Shen J (2018) Privacy preserving multi-party computation delegation for deep learning in cloud computing. Inf Sci 459:103–116

    Article  Google Scholar 

  103. Liu J, Tian Y, Zhou Y, Xiao Y, Ansari N (2020) Privacy preserving distributed data mining based on secure multi-party computation. Comput Commun 153:208–216

    Article  Google Scholar 

  104. Hastings M, Hemenway B, Noble D, Zdancewic S (2019) Sok: general purpose compilers for secure multi-party computation. In: 2019 IEEE symposium on security and privacy (SP). IEEE, pp 1220–1237

  105. Vu D-H, Luong T-D, Ho T-B (2020) An efficient approach for secure multi-party computation without authenticated channel. Inf Sci 527:356–368

    Article  MathSciNet  Google Scholar 

  106. Knott B, Venkataraman S, Hannun A, Sengupta S, Ibrahim M, Maaten L (2021) Crypten: secure multi-party computation meets machine learning. Adv Neural Inf Process Syst 34:4961–4973

    Google Scholar 

  107. Wang Y, Li T, Qin H, Li J, Gao W, Liu Z, Xu Q (2015) A brief survey on secure multi-party computing in the presence of rational parties. J Ambient Intell Humaniz Comput 6(6):807–824

    Article  Google Scholar 

  108. Lindell Y (2003) Composition of secure multi-party protocols: a comprehensive study. vol 2815. Springer

  109. Canetti R (2013) Security and composition of cryptographic protocols: a tutorial. Secure Multi-Party Comput 61–119

  110. Joseph A (2018) A framework for efficient secure three-party computation. PhD thesis, Indian Institute of Science Bangalore

  111. Dong C, Weng J, Liu J-N, Yang A, Zhiquan L, Yang Y, Ma J (2022) Maliciously secure and efficient large-scale genome-wide association study with multi-party computation. IEEE Trans Depend Secure Comput

  112. Blanton M, Kang A, Yuan C (2020) Improved building blocks for secure multi-party computation based on secret sharing with honest majority. In: International conference on applied cryptography and network security. Springer, pp 377–397

  113. Ziller A, Trask A, Lopardo A, Szymkow B, Wagner B, Bluemke E, Nounahon J-M, Passerat-Palmbach J, Prakash K, Rose N et al (2021) Pysyft: a library for easy federated learning. In: Federated learning systems. Springer, pp 111–139

  114. Acar A, Aksu H, Uluagac AS, Conti M (2018) A survey on homomorphic encryption schemes: theory and implementation. ACM Comput Surv (Csur) 51(4):1–35

    Article  Google Scholar 

  115. Hosseini E, Khisti A (2021) Secure aggregation in federated learning via multiparty homomorphic encryption. In: 2021 IEEE globecom workshops (GC Wkshps). IEEE, pp 1–6

  116. Yousuf H, Lahzi M, Salloum SA, Shaalan K (2021) Systematic review on fully homomorphic encryption scheme and its application. Recent Adv Intell Syst Smart Appl 537–551

  117. Peralta G, Cid-Fuentes RG, Bilbao J, Crespo PM (2019) Homomorphic encryption and network coding in iot architectures: advantages and future challenges. Electronics 8(8):827

    Article  Google Scholar 

  118. Ogburn M, Turner C, Dahal P (2013) Homomorphic encryption. Procedia Comput Sci 20:502–509

    Article  Google Scholar 

  119. Li S, Ngai E, Voigt T (2021) Byzantine-robust aggregation in federated learning empowered industrial iot. IEEE Trans Ind Inform

  120. Xu C, Jia Y, Zhu L, Zhang C, Jin G, Sharif K (2022) Tdfl: Truth discovery based byzantine robust federated learning. IEEE Trans Parallel Distrib Syst

  121. Jin R, Hu J, Min G, Lin H (2022) Byzantine-robust and efficient federated learning for the internet of things. IEEE Internet Things Magn 5(1):114–118

    Article  Google Scholar 

  122. Rawat A, Zizzo G, Hameed MZ, Muñoz-González L (2022) Security and robustness in federated learning. In: Federated learning. Springer, pp 363–390

  123. Ma X, Sun X, Wu Y, Liu Z, Chen X, Dong C (2022) Differentially private byzantine-robust federated learning. IEEE Trans Parallel Distrib Syst

  124. He Y, Chen Y, Yang X, Yu H, Huang Y-H, Gu Y (2022) Learning critically: Selective self-distillation in federated learning on non-iid data. IEEE Trans Big Data

  125. Taya A, Nishio T, Morikura M, Yamamoto K (2022) Decentralized and model-free federated learning: Consensus-based distillation in function space. IEEE Trans Signal Inf Process Netw

  126. Gorsline M, Smith J, Merkel C (2021) On the adversarial robustness of quantized neural networks. In: Proceedings of the 2021 on great lakes symposium on VLSI, pp 189–194

  127. Sachdeva S, Ali A (2022) Machine learning with digital forensics for attack classification in cloud network environment. Int J Syst Assur Eng Manag 13(1):156–165

    Article  Google Scholar 

  128. Regazzoni F, Palmieri P, Smailbegovic F, Cammarota R, Polian I (2021) Protecting artificial intelligence ips: a survey of watermarking and fingerprinting for machine learning. CAAI Trans Intell Technol 6(2):180–191

    Article  Google Scholar 

  129. Basit A, Tufail M, Hong K-S, Rehan M, Ahmed I (2022) Event-triggered distributed exponential h observers design for discrete-time nonlinear systems over wireless sensor networks. In: 2022 13th Asian control conference (ASCC), pp 1730–1735. https://doi.org/10.23919/ASCC56756.2022.9828291

  130. Ahmed I, Rehan M, Hong K-S, Basit A (2022) Event-triggered leaderless robust consensus control of nonlinear multi-agents under disturbances. In: 2022 13th Asian control conference (ASCC), pp 1736–1741. https://doi.org/10.23919/ASCC56756.2022.9828087

  131. Ahmed I, Rehan M, Hong K-S, Basit A (2022) A consensus-based approach for economic dispatch considering multiple fueling strategy of electricity production sector over a smart grid. In: 2022 13th Asian control conference (ASCC), pp 1196–1201. https://doi.org/10.23919/ASCC56756.2022.9828267

  132. Ahmed I, Rehan M, Iqbal N (2022) A novel exponential approach for dynamic event-triggered leaderless consensus of nonlinear multi-agent systems over directed graphs. IEEE Trans Circuits Syst II Express Briefs 69(3):1782–1786. https://doi.org/10.1109/TCSII.2021.3120791

    Article  Google Scholar 

  133. Ardizzon F, Diamant R, Casari P, Tomasin S (2022) Machine learning-based distributed authentication of uwan nodes with limited shared information. In: 2022 Sixth underwater communications and networking conference (UComms). IEEE, pp 1–5

  134. Deng L, Li G, Han S, Shi L, Xie Y (2020) Model compression and hardware acceleration for neural networks: a comprehensive survey. Proc IEEE 108(4):485–532

    Article  Google Scholar 

  135. Filho CP, Marques E Jr, Chang V, Dos Santos L, Bernardini F, Pires PF, Ochi L, Delicato FC (2022) A systematic literature review on distributed machine learning in edge computing. Sensors 22(7):2665

    Article  Google Scholar 

  136. Wang J, Cao B, Yu P, Sun L, Bao W, Zhu X (2018) Deep learning towards mobile applications. In: 2018 IEEE 38th international conference on distributed computing systems (ICDCS). IEEE, pp 1385–1393

  137. Huang L, Zhang Z, Du Z, Li S, Zheng H, Xie Y, Tan N (2022) Epquant: a graph neural network compression approach based on product quantization. Neurocomputing 503:49–61

    Article  Google Scholar 

  138. Harris D, Rinberg A, Rottenstreich O (2022) Compressing distributed network sketches with traffic-aware summaries. IEEE Trans Netw Serv Manag. https://doi.org/10.1109/TNSM.2022.3172299

    Article  Google Scholar 

  139. Zhou Q, Qu Z, Guo S, Luo B, Guo J, Xu Z, Akerkar R (2021) On-device learning systems for edge intelligence: a software and hardware synergy perspective. IEEE Internet Things J 8(15):11916–11934. https://doi.org/10.1109/JIOT.2021.3063147

    Article  Google Scholar 

  140. Tekalp AM, Covell M, Timofte R, Dong C (2021) Editorial: Introduction to the issue on deep learning for image/video restoration and compression. IEEE J Sel Top Signal Process 15(2):157–161. https://doi.org/10.1109/JSTSP.2021.3053364

    Article  Google Scholar 

  141. Chen Y, Hu SX, Shen X, Ai C, Suykens JAK (2022) Compressing features for learning with noisy labels. IEEE Trans Neural Netw Learn Syst 1–15. https://doi.org/10.1109/TNNLS.2022.3186930

  142. Wei K, Li J, Ma C, Ding M, Chen C, Jin S, Han Z, Poor HV (2022) Low-latency federated learning over wireless channels with differential privacy. IEEE J Sel Areas Commun 40(1):290–307. https://doi.org/10.1109/JSAC.2021.3126052

    Article  Google Scholar 

  143. Ma C, Yuan L, Han L, Ding M, Bhaskar R, Li J (2021) Data level privacy preserving: a stochastic perturbation approach based on differential privacy. IEEE Trans Knowl Data Eng. https://doi.org/10.1109/TKDE.2021.3137047

    Article  Google Scholar 

  144. Yan H, Li X, Li H, Li J, Sun W, Li F (2022) Monitoring-based differential privacy mechanism against query flooding-based model extraction attack. IEEE Trans Dependable Secure Comput 19(4):2680–2694. https://doi.org/10.1109/TDSC.2021.3069258

    Article  Google Scholar 

  145. Liu B, Ding M, Shaham S, Rahayu W, Farokhi F, Lin Z (2021) When machine learning meets privacy: a survey and outlook. ACM Comput Surv (CSUR) 54(2):1–36

    Article  Google Scholar 

  146. Liu Y, Wen R, He X, Salem A, Zhang Z, Backes M, De Cristofaro E, Fritz M, Zhang Y (2022) \(\{\)ML-Doctor\(\}\): Holistic risk assessment of inference attacks against machine learning models. In: 31st USENIX security symposium (USENIX Security 22), pp 4525–4542

  147. Kumová V, Pilát M (2021) Beating white-box defenses with black-box attacks. In: 2021 International joint conference on neural networks (IJCNN). IEEE, pp 1–8

  148. Wang K, Yuan F, Zhao L, Hou R, Ji Z, Meng D (2022) Secure hybrid replacement policy: mitigating conflict-based cache side channel attacks. Microprocess Microsyst 89:104420

    Article  Google Scholar 

  149. Wang Q, Yang H, Wu G, Choo K-KR, Zhang Z, Miao G, Ren Y (2022) Black-box adversarial attacks on xss attack detection model. Comput Secur 113:102554

    Article  Google Scholar 

  150. Chen J, Wang X, Zhang Y, Zheng H, Yu S, Bao L (2022) Agent manipulator: stealthy strategy attacks on deep reinforcement learning. Appl Intell 1–28

  151. Wu B, Zhong L, Li H, Ye Y (2022) Efficient complementary graph convolutional network without negative sampling for item recommendation. Knowl-Based Syst 256:109758

    Article  Google Scholar 

  152. Naseer M, Khan S, Hayat M, Khan FS, Porikli F (2022) Stylized adversarial defense. IEEE Trans Pattern Anal Mach Intell

  153. Ni C, Cang LS, Gope P, Min G (2022) Data anonymization evaluation for big data and iot environment. Inf Sci 605:381–392

    Article  Google Scholar 

  154. Hossayni H, Khan I, Crespi N (2021) Data anonymization for maintenance knowledge sharing. IT Prof 23(5):23–30

    Article  Google Scholar 

  155. Cai Z, Xiong Z, Xu H, Wang P, Li W, Pan Y (2021) Generative adversarial networks: a survey toward private and secure applications. ACM Comput Surv (CSUR) 54(6):1–38

    Article  Google Scholar 

  156. Maximov M, Elezi I, Leal-Taixé L (2020) Ciagan: Conditional identity anonymization generative adversarial networks. In: Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, pp 5447–5456

  157. Khan P, Khan Y, Kumar S (2021) Single identity clustering-based data anonymization in healthcare. In: Computationally intelligent systems and their applications. Springer, pp 1–9

  158. Ito S, Kikuchi H (2022) Estimation of cost of k–anonymity in the number of dummy records. J Ambient Intell Hum Comput 1–10

  159. Kotal A, Piplai A, Chukkapalli SSL, Joshi A (2022) Privetab: Secure and privacy-preserving sharing of tabular data. In: Proceedings of the 2022 ACM on international workshop on security and privacy analytics, pp 35–45

  160. Nasr M, Songi S, Thakurta A, Papernot N, Carlin N (2021) Adversary instantiation: Lower bounds for differentially private machine learning. In: 2021 IEEE symposium on security and privacy (SP). IEEE, pp 866–882

  161. Shang F, Xu T, Liu Y, Liu H, Shen L, Gong M (2021) Differentially private admm algorithms for machine learning. IEEE Trans Inf For Secur 16:4733–4745

    Article  Google Scholar 

  162. Wei K, Li J, Ma C, Ding M, Poor HV (2021) Differentially private federated learning: algorithm, analysis and optimization. In: Federated learning systems. Springer, pp 51–78

  163. Wang T, Zhao J, Hu Z, Yang X, Ren X, Lam K-Y (2021) Local differential privacy for data collection and analysis. Neurocomputing 426:114–133

    Article  Google Scholar 

  164. Froelicher D, Troncoso-Pastoriza JR, Pyrgelis A, Sav S, Sousa JS, Bossuat J-P, Hubaux J-P (2021) Scalable privacy-preserving distributed learning. Proc Privacy Enhanc Technol 2021(2):323–347

    Article  Google Scholar 

  165. Luo S, Fan P, Li K, Xing H, Luo L, Yu H (2022) Fast parameter synchronization for distributed learning with selective multicast. In: ICC 2022-IEEE international conference on communications. IEEE, pp 4775–4780

  166. Zhang R, Zhu Q (2018) A game-theoretic approach to design secure and resilient distributed support vector machines. IEEE Trans Neural Netw Learn Syst 29(11):5512–5527

    Article  MathSciNet  Google Scholar 

  167. Savazzi S, Nicoli M, Bennis M, Kianoush S, Barbieri L (2021) Opportunities of federated learning in connected, cooperative, and automated industrial systems. IEEE Commun Mag 59(2):16–21

    Article  Google Scholar 

  168. Yang M, Qian H, Wang X, Zhou Y, Zhu H (2021) Client selection for federated learning with label noise. IEEE Trans Veh Technol 71(2):2193–2197

    Article  Google Scholar 

  169. Zheng J, Chan PP, Chi H, He Z (2022) A concealed poisoning attack to reduce deep neural networks’ robustness against adversarial samples. Inf Sci

  170. Castillo J (2022) Blockchain: A decentralized solution for secure applications. PhD thesis, UNIVERSITY OF TEXAS AT SAN ANTONIO

  171. Dahmane S, Yagoubi MB, Kerrache CA, Lorenz P, Lagraa N, Lakas A (2022) Toward a secure edge-enabled and artificially intelligent internet of flying things using blockchain. IEEE Internet Things Magn 5(2):90–95

    Article  Google Scholar 

  172. Rodríguez-Barroso N, Martínez-Cámara E, Luzón MV, Herrera F (2022) Backdoor attacks-resilient aggregation based on robust filtering of outliers in federated learning for image classification. Knowl-Based Syst 245:108588

    Article  Google Scholar 

  173. Mukherjee S, Xu Y, Trivedi A, Patowary N, Ferres JL (2021) privgan: protecting gans from membership inference attacks at low cost to utility. Proc Priv Enhanc Technol 2021(3):142–163

    Google Scholar 

  174. De Cristofaro E (2021) A critical overview of privacy in machine learning. IEEE Secur Privacy 19(4):19–27

    Article  Google Scholar 

  175. Liu L, Wang Y, Liu G, Peng K, Wang C (2022) Membership inference attacks against machine learning models via prediction sensitivity. IEEE Trans Depend Secure Comput

  176. Subramanian J, Sinha A, Seraj R, Mahajan A (2022) Approximate information state for approximate planning and reinforcement learning in partially observed systems. J Mach Learn Res 23:12–1

    MathSciNet  Google Scholar 

  177. Oroojlooyjadid A, Nazari M, Snyder LV, Takáč M (2022) A deep q-network for the beer game: deep reinforcement learning for inventory optimization. Manuf Serv Oper Manag 24(1):285–304

    Article  Google Scholar 

  178. Huang L, Wei S, Gao C, Liu N (2022) Cyclical adversarial attack pierces black-box deep neural networks. Pattern Recogn 108831

  179. Pavlidis A, Faehn E, Louërat M-M, Stratigopoulos H-G (2022) Run-time hardware trojan detection in analog and mixed-signal ics. In: 40th IEEE VLSI test symposium 2022

  180. Sethi K, Madhav YV, Kumar R, Bera P (2021) Attention based multi-agent intrusion detection systems using reinforcement learning. J Inf Secur Appl 61:102923

    Google Scholar 

  181. Jafari M, Rahman MA, Paudyal S (2022) Optimal false data injection attacks against power system frequency stability. IEEE Trans Smart Grid

  182. Barua A, Al Alamin MA, Hossain MS, Hossain E (2022) Security and privacy threats for bluetooth low energy in iot and wearable devices: a comprehensive survey. IEEE Open J Commun Soc

  183. Lee XY, Esfandiari Y, Tan KL, Sarkar S (2021) Query-based targeted action-space adversarial policies on deep reinforcement learning agents. In: Proceedings of the ACM/IEEE 12th international conference on cyber-physical systems, pp 87–97

  184. García J, Sagredo I (2022) Instance-based defense against adversarial attacks in deep reinforcement learning. Eng Appl Artif Intell 107:104514

    Article  Google Scholar 

  185. Suya F, Chi J, Evans D, Tian Y (2020) Hybrid batch attacks: Finding black-box adversarial examples with limited queries. In: 29th USENIX security symposium (USENIX Security 20), pp 1327–1344

  186. Wang X, Cai M, Sohel F, Sang N, Chang Z (2021) Adversarial point cloud perturbations against 3d object detection in autonomous driving systems. Neurocomputing 466:27–36

    Article  Google Scholar 

  187. Bharath Kumar D, Kumar N, Dunston SD, Rajam V (2022) Analysis of the impact of white box adversarial attacks in resnet while classifying retinal fundus images. In: International conference on computational intelligence in data science. Springer, pp 162–175

  188. Wang Z, Ma J, Wang X, Hu J, Qin Z, Ren K (2022) Threats to training: a survey of poisoning attacks and defenses on machine learning systems. ACM J ACM (JACM)

  189. Sheatsley R, Papernot N, Weisman MJ, Verma G, McDaniel P (2022) Adversarial examples for network intrusion detection systems. J Comput Secur (Preprint), 1–26

  190. Alpdemir MN (2022) Tactical uav path optimization under radar threat using deep reinforcement learning. Neural Comput Appl 34(7):5649–5664

    Article  Google Scholar 

  191. Alavizadeh H, Jang-Jaccard J, Enoch SY, Al-Sahaf H, Welch I, Camtepe SA, Kim DD (2022) A survey on cyber situation awareness systems: framework, techniques, and insights. ACM Comput Surv (CSUR)

  192. Sewak M, Sahay SK, Rathore H (2022) Deep reinforcement learning in the advanced cybersecurity threat detection and protection. Inf Syst Front 1–23

  193. Pessach D, Shmueli E (2022) A review on fairness in machine learning. ACM Comput Surv (CSUR) 55(3):1–44

    Article  Google Scholar 

  194. Guo Y, Zhou Y, Zhang Z (2021) Fault diagnosis of multi-channel data by the cnn with the multilinear principal component analysis. Measurement 171:108513

    Article  Google Scholar 

  195. Liu J, Huang J, Zhou Y, Li X, Ji S, Xiong H, Dou D (2022) From distributed machine learning to federated learning: a survey. Knowl Inf Syst 1–33

  196. Hu Y, Chen M, Saad W, Poor HV, Cui S (2021) Distributed multi-agent meta learning for trajectory design in wireless drone networks. IEEE J Sel Areas Commun 39(10):3177–3192

    Article  Google Scholar 

  197. Wang J, Li Q, Hu Y, Li X et al (2022) A privacy preservation framework for feedforward-designed convolutional neural networks. Neural Netw 155:14–27

    Article  Google Scholar 

  198. Chen W-N, Choo CAC, Kairouz P, Suresh AT (2022) The fundamental price of secure aggregation in differentially private federated learning. In: International conference on machine learning. PMLR, pp 3056–3089

  199. Duan Q, Hu S, Deng R, Lu Z (2022) Combined federated and split learning in edge computing for ubiquitous intelligence in internet of things: State-of-the-art and future directions. Sensors 22(16):5983

    Article  Google Scholar 

  200. Gandikota V, Kane D, Maity RK, Mazumdar A (2021) vqsgd: vector quantized stochastic gradient descent. In: International conference on artificial intelligence and statistics. PMLR, pp 2197–2205

  201. Dobraunig C, Grassi L, Helminger L, Rechberger C, Schofnegger M, Walch R (2021) Pasta: a case for hybrid homomorphic encryption. Cryptology ePrint Archive

  202. Takahashi A, Zaverucha G (2021) Verifiable encryption from mpc-in-the-head. Cryptology ePrint Archive

  203. Lakshmi TN, Jyothi S, Kumar MR (2021) Image encryption algorithms using machine learning and deep learning techniques-a survey. In: Modern approaches in machine learning and cognitive science: a walkthrough. Springer, pp 507–515

  204. Xu G, Li H, Liu S, Yang K, Lin X (2019) Verifynet: secure and verifiable federated learning. IEEE Trans Inf For Secur 15:911–926

    Article  Google Scholar 

  205. Bowler AL, Pound MP, Watson NJ (2021) Domain adaptation and federated learning for ultrasonic monitoring of beer fermentation. Fermentation 7(4):253

    Article  Google Scholar 

  206. Sun W, Lei S, Wang L, Liu Z, Zhang Y (2020) Adaptive federated learning and digital twin for industrial internet of things. IEEE Trans Ind Inf 17(8):5605–5614

    Article  Google Scholar 

  207. Khoa TV, Saputra YM, Hoang DT, Trung NL, Nguyen D, Ha NV, Dutkiewicz E (2020) Collaborative learning model for cyberattack detection systems in iot industry 4.0. In: 2020 IEEE wireless communications and networking conference (WCNC). IEEE, pp 1–6

  208. Neudecker D, Grosskopf M, Herman M, Haeck W, Grechanuk P, Vander Wiel S, Rising ME, Kahler A, Sly N, Talou P (2020) Enhancing nuclear data validation analysis by using machine learning. Nucl Data Sheets 167:36–60

    Article  Google Scholar 

  209. Li X, Qu Z, Zhao S, Tang B, Lu Z, Liu Y (2021) Lomar: A local defense against poisoning attack on federated learning. IEEE Trans Dependable Secure Comput

  210. Mahela OP, Khosravy M, Gupta N, Khan B, Alhelou HH, Mahla R, Patel N, Siano P (2020) Comprehensive overview of multi-agent systems for controlling smart grids. CSEE J Power Energy Syst

  211. Ahmad S, Bokhari M (2012) A new approach to multi agent based architecture for secure and effective e-learning. Int J Comput Appl 46(22):26–29

    Google Scholar 

  212. Morris A, Guan J, Azhar A (2021) An xri mixed-reality internet-of-things architectural framework toward immersive and adaptive smart environments. In: 2021 IEEE international symposium on mixed and augmented reality adjunct (ISMAR-Adjunct). IEEE, pp 68–74

  213. Zhu Q, Ishii H (2022) Introduction to the special section on learning and security for multi-agent systems. Annual Reviews in Control

  214. Drawel N, Bentahar J, Laarej A, Rjoub G (2022) Formal verification of group and propagated trust in multi-agent systems. Auton Agent Multi-Agent Syst 36(1):1–31

    Article  Google Scholar 

  215. Alsamhi SH, Shvetsov AV, Shvetsova SV, Hawbani A, Guizan M, Alhartomi MA, Ma O (2022) Blockchain-empowered security and energy efficiency of drone swarm consensus for environment exploration. IEEE Trans Green Commun Netw

  216. Zulfiqar M, Kamran M, Rasheed M (2022) A blockchain-enabled trust aware energy trading framework using games theory and multi-agent system in smat grid. Energy 255:124450

    Article  Google Scholar 

  217. Singh P, Singh MK, Singh R, Singh N (2022) Federated learning: Challenges, methods, and future directions. In: Federated learning for IoT applications. Springer, pp 199–214

  218. Wu C, Wu F, Lyu L, Huang Y, Xie X (2022) Communication-efficient federated learning via knowledge distillation. Nat Commun 13(1):1–8

    Google Scholar 

  219. Gong X, Sharma A, Karanam S, Wu Z, Chen T, Doermann D, Innanje A (2021) Ensemble attention distillation for privacy-preserving federated learning. In: Proceedings of the IEEE/CVF international conference on computer vision, pp 15076–15086

  220. Luo X, Wu Y, Xiao X, Ooi BC (2021) Feature inference attack on model predictions in vertical federated learning. In: 2021 IEEE 37th international conference on data engineering (ICDE). IEEE, pp 181–192

  221. Feng C-M, Yang Z, Fu H, Xu Y, Yang J, Shao L (2021) Donet: dual-octave network for fast mr image reconstruction. IEEE Trans Neural Netw Learn Syst

  222. Batina L, Bhasin S, Jap D, Picek S (2021) Sca strikes back: Reverse engineering neural network architectures using side channels. IEEE Design & Test

  223. Al Aziz MM, Anjum MM, Mohammed N, Jiang X (2022) Generalized genomic data sharing for differentially private federated learning. J Biomed Inform 104113

  224. Zhao P, Cao Z, Jiang J, Gao F (2022) Practical private aggregation in federated learning against inference attack. IEEE Internet Things J

  225. Zhang A, Wan W, Harada K (2022) Fast pivoting gait generation by model predictive control designed with basis functions. Adv Robot 36(15):735–749

    Article  Google Scholar 

  226. Wibawa F, Catak FO, Kuzlu M, Sarp S, Cali U (2022) Homomorphic encryption and federated learning based privacy-preserving cnn training: Covid-19 detection use-case. In: Proceedings of the 2022 European interdisciplinary cybersecurity conference, pp 85–90

  227. Cheng K, Fan T, Jin Y, Liu Y, Chen T, Papadopoulos D, Yang Q (2021) Secureboost: a lossless federated learning framework. IEEE Intell Syst 36(6):87–98

    Article  Google Scholar 

  228. Maddock S, Cormode G, Wang T, Maple C, Jha S (2022) Federated boosted decision trees with differential privacy. arXiv preprint arXiv:2210.02910

  229. Li A, Duan Y, Yang H, Chen Y, Yang J (2020) Tiprdc: task-independent privacy-respecting data crowdsourcing framework for deep learning with anonymized intermediate representations. In: Proceedings of the 26th ACM SIGKDD international conference on knowledge discovery & data mining, pp 824–832

  230. Prieto VM, Alvarez M, López-García R, Cacheda F (2012) A scale for crawler effectiveness on the client-side hidden web. Comput Sci Inf Syst 9(2):561–583

    Article  Google Scholar 

  231. Zhu B, Liu JZ, Cauley SF, Rosen BR, Rosen MS (2018) Image reconstruction by domain-transform manifold learning. Nature 555(7697):487–492

    Article  Google Scholar 

  232. Li C, Li H, Chen X (2021) A framework for fast estimation of structural seismic responses using ensemble machine learning model. Smart Struct Syst 28(3):425–441

    Google Scholar 

  233. Handa A, Sharma A, Shukla SK (2019) Machine learning in cybersecurity: a review. Wiley Interdiscip Rev Data Min Knowl Discov 9(4):1306

    Article  Google Scholar 

  234. Hao W, Huang Y, Zhao G (2022) Acoustic sources localization for composite pate using arrival time and bp neural network. Polym Testing 115:107754

    Article  Google Scholar 

  235. Su L, Zhou R, Wang N, Chen J, Li Z (2022) Multi-agent multi-armed bandit learning for content caching in edge networks. In: 2022 IEEE international conference on web services (ICWS). IEEE, pp 11–16

  236. El Sayed H, Zeadally S, Puthal D (2020) Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks. Veh Commun 24:100227

    Google Scholar 

  237. Dan Y, Zhao Y, Li X, Li S, Hu M, Hu J (2020) Generative adversarial networks (gan) based efficient sampling of chemical composition space for inverse design of inorganic materials. npj Comput Mater 6(1):1–7

    Article  Google Scholar 

  238. Ball JE, Anderson DT, Chan CS Sr (2017) Comprehensive survey of deep learning in remote sensing: theories, tools, and challenges for the community. J Appl Remote Sens 11(4):042609

    Article  Google Scholar 

  239. Chen D, Yu N, Zhang Y, Fritz M (2020) Gan-leaks: A taxonomy of membership inference attacks against generative models. In: Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, pp 343–362

  240. Ordway-West E, Parveen P, Henslee A (2018) Autoencoder evaluation and hyper-parameter tuning in an unsupervised setting. In: 2018 IEEE international congress on big data (BigData Congress). IEEE, pp 205–209

  241. Ye D, Zhu T, Zhou W, Philip SY (2019) Differentially private malicious agent avoidance in multiagent advising learning. IEEE Trans Cybern 50(10):4214–4227

    Article  Google Scholar 

  242. Vietri G, Balle B, Krishnamurthy A, Wu S (2020) Private reinforcement learning with pac and regret guarantees. In: International conference on machine learning. PMLR, pp 9754–9764

  243. Zhou J, Zeng S, Zhang B (2020) Two-stage knowledge transfer framework for image classification. Pattern Recogn 107:107529

    Article  Google Scholar 

  244. Mühl C. Personalizing private aggregation of teacher ensembles

  245. Wei X, Shen C (2022) Federated learning over noisy channels: Convergence analysis and design examples. IEEE Trans Cogn Commun Netw

  246. Loukil F, Abed M, Boukadi K (2021) Blockchain adoption in education: a systematic literature review. Educ Inf Technol 26(5):5779–5797

    Article  Google Scholar 

  247. Nguyen DC, Ding M, Pham Q-V, Pathirana PN, Le LB, Seneviratne A, Li J, Niyato D, Poor HV (2021) Federated learning meets blockchain in edge computing: opportunities and challenges. IEEE Internet Things J 8(16):12806–12825

    Article  Google Scholar 

  248. Bistritz I, Baharav T, Leshem A, Bambos N (2020) My fair bandit: distributed learning of max-min fairness with multi-player bandits. In: International conference on machine learning. PMLR, pp 930–940

  249. Berguig Y, Laassiri J, Hanaoui S (2021) Anonymous and lightweight secure authentication protocol for mobile agent system. J Inf Secur Appl 63:103007

    Google Scholar 

  250. Uddin MA, Stranieri A, Gondal I, Balasubramanian V (2021) A survey on the adoption of blockchain in iot: challenges and solutions. Blockchain Res Appl 2(2):100006

    Article  Google Scholar 

  251. Kaliyar RK, Goswami A, Narang P (2021) Deepfake: improving fake news detection using tensor decomposition-based deep neural network. J Supercomput 77(2):1015–1037

    Article  Google Scholar 

  252. Abrahamyan L, Chen Y, Bekoulis G, Deligiannis N (2021) Learned gradient compression for distributed deep learning. IEEE Trans Neural Netw Learn Syst

  253. Emaminejad N, Akhavian R (2022) Trustworthy ai and robotics: Implications for the aec industry. Autom Constr 139:104298

    Article  Google Scholar 

  254. Vásquez-Carbonell M (2022) A systematic literature review of augmented reality in engineering education: hardware, software, student motivation & development recommendations. Digital Educ Rev 41:249–267

    Article  Google Scholar 

Download references

Acknowledgements

The author Muhammad Khalid would like to express their profound gratitude to King Abdullah City for Atomic and Renewable Energy (K.A.CARE), Saudi Arabia for their financial support in accomplishing this work. Also, the authors would like to acknowledge the support from the Interdisciplinary Research Center for Sustainable Energy Systems at King Fahd University of Petroleum Minerals, Saudi Arabia under project No. INSE2415.

Funding

All authors confirms that they do not possess any identifiable conflicting financial interests or personal affiliations that might have influenced the research presented in this manuscript.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Muhammad Khalid, Miswar Akhtar and Muhammad Maaruf. The first draft of the manuscript was written by Ijaz Ahmed and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript

Corresponding authors

Correspondence to Ijaz Ahmed or Muhammad Khalid.

Ethics declarations

Conflict of interest

The authors declare no Conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmed, I., Syed, M.A., Maaruf, M. et al. Distributed computing in multi-agent systems: a survey of decentralized machine learning approaches. Computing 107, 2 (2025). https://doi.org/10.1007/s00607-024-01356-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00607-024-01356-0

Keywords

Mathematics Subject Classification

Navigation