• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhong Zhengyi, Bao Weidong, Wang Ji, Wu Guanlin, Zhao Xiang. A Hierarchically Heterogeneous Federated Learning Method for Cloud-Edge-End System[J]. Journal of Computer Research and Development, 2022, 59(11): 2408-2422. DOI: 10.7544/issn1000-1239.20220458
Citation: Zhong Zhengyi, Bao Weidong, Wang Ji, Wu Guanlin, Zhao Xiang. A Hierarchically Heterogeneous Federated Learning Method for Cloud-Edge-End System[J]. Journal of Computer Research and Development, 2022, 59(11): 2408-2422. DOI: 10.7544/issn1000-1239.20220458

A Hierarchically Heterogeneous Federated Learning Method for Cloud-Edge-End System

Funds: This work was supported by the National Natural Science Foundation of China (62002369, 61872378), the Scientific Research Project of National University of Defense Technology (ZK19-03), and the Graduate Innovation Fund of Hunan Province (CX20210033).
More Information
  • Published Date: October 31, 2022
  • Federated learning (FL) has gained applause with great advantages by replacing data transmission with uploading model parameters, effectively avoiding privacy leakage. However, when federated learning is applied to the cloud-edge-end system, for one thing, there are two-level distributed frameworks in cloud-edge-end system, i.e. edge and end, challenging the traditional single-layer federated learning; for another thing, the upper complexity bound of end models is not always the same due to resource heterogeneity, which cannot satisfy the assumption of a unified model for clients in the federated learning framework. To solve the first problem above, based on the traditional single-layer federated learning method, we propose a hierarchically federated learning method for the cloud-edge-end system. For the second problem, we split a deep model into a series of sub-models by inserting early exit branches, where sub-models with different computing complexities match different clients’ resource statuses, thus accomplishing hierarchically heterogeneous federated learning. Additionally, due to factors like human resources, there is a lot of unlabeled data on end devices, which cannot be used for effective model training. Therefore, we propose a semi-supervised learning method for federated learning to effectively utilize unlabeled data. Finally, the methods of this paper are verified by MNIST and FashionMNIST datasets. Experimental results show that compared with other methods, the method proposed in this paper can improve accuracy by up to 22% under the premise of privacy security, and at the same time, the resources overhead in computing, communication, and storage have been significantly reduced.
  • Related Articles

    [1]Li Yuxi, Chen Jingjing, Zhuo Fucai, Xu Jian, Ji Dong. Verifiable Boolean Searchable Encryption Based on Blockchain Index[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440501
    [2]Zhu Longlong, Chen Xiang, Chen Haodong, Niu Jitang, Liu Wenjing, Lin Shengrui, Zhang Dong, Wu Chunming. An Accurate Blockchain Anomaly Detection Mechanism Built on Approximate Sketch Algorithms[J]. Journal of Computer Research and Development, 2024, 61(10): 2526-2539. DOI: 10.7544/issn1000-1239.202440477
    [3]Ke Yuhong, Lin Chao, Huang Xinyi, Wu Wei, Chen Yujie. An Efficient Passwordless Authentication Scheme Based on Blockchain[J]. Journal of Computer Research and Development, 2024, 61(10): 2514-2525. DOI: 10.7544/issn1000-1239.202440468
    [4]Chen Xiao, Huang Muhong, Tian Yifan, Wang Yan, Cao Sheng, Zhang Xiaosong. Internet of Vehicles Data Sharing Scheme via Blockchain Sharding[J]. Journal of Computer Research and Development, 2024, 61(9): 2246-2260. DOI: 10.7544/issn1000-1239.202330899
    [5]He Yunhua, Luo Mingshun, Hu Qing, Wu Bin, Wang Chao, Xiao Ke. Research Progress on Security Technology for Cross-Chain Service of Energy Blockchain[J]. Journal of Computer Research and Development, 2024, 61(4): 1018-1037. DOI: 10.7544/issn1000-1239.202220892
    [6]Liu Wei, Tang Congke, Ma Jie, Tian Zhao, Wang Qi, She Wei. A Federated Learning Model for Privacy Protection Based on Blockchain and Dynamic Evaluation[J]. Journal of Computer Research and Development, 2023, 60(11): 2583-2593. DOI: 10.7544/issn1000-1239.202330269
    [7]Zhang Zelin, Wang Huaqun. Dynamic Key Management of Industrial Internet Based on Blockchain[J]. Journal of Computer Research and Development, 2023, 60(2): 386-397. DOI: 10.7544/issn1000-1239.202111095
    [8]Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
    [9]Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang. Cyber Security Threat Intelligence Sharing Model Based on Blockchain[J]. Journal of Computer Research and Development, 2020, 57(4): 836-846. DOI: 10.7544/issn1000-1239.2020.20190404
    [10]Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming. Blockchain-Based Verification Scheme for Deletion Operation in Cloud[J]. Journal of Computer Research and Development, 2018, 55(10): 2199-2207. DOI: 10.7544/issn1000-1239.2018.20180436
  • Cited by

    Periodical cited type(0)

    Other cited types(2)

Catalog

    Article views (299) PDF downloads (176) Cited by(2)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return