• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Jin Ge, Wei Xiaochao, Wei Senmao, Wang Hao. FPCBC: Federated Learning Privacy Preserving Classification System Based on Crowdsourcing Aggregation[J]. Journal of Computer Research and Development, 2022, 59(11): 2377-2394. DOI: 10.7544/issn1000-1239.20220528
Citation: Jin Ge, Wei Xiaochao, Wei Senmao, Wang Hao. FPCBC: Federated Learning Privacy Preserving Classification System Based on Crowdsourcing Aggregation[J]. Journal of Computer Research and Development, 2022, 59(11): 2377-2394. DOI: 10.7544/issn1000-1239.20220528

FPCBC: Federated Learning Privacy Preserving Classification System Based on Crowdsourcing Aggregation

Funds: This work was supported by the China Postdoctoral Science Foundation (2018M632712), the National Natural Science Foundation of China for Young Scientists (61802235), and the General Program of the National Natural Science Foundation of China (62071280).
More Information
  • Published Date: October 31, 2022
  • With the continuous increase of data assets from enterprises, governments and private individuals, the demand for classification applications such as images in the field of machine learning is also increasing. In order to meet various practical needs, the idea of cloud service deployment in machine learning as a service (MLAAS) has gradually become the mainstream. However, applications based on cloud services often bring serious data privacy and security leakage issues. FPCBC is a federated learning privacy-preserving classification system based on crowdsourcing aggregation. It crowdsources classification tasks to multiple edge participants and uses cloud computing to complete the whole process. However, instead of using the method of jointly training ideal models to obtain high-confidence classification results, we let the participants first train model based on limited local data and use the model to infer, and then we use mature algorithms to aggregate the inference results to obtain classification with higher accuracy. Importantly, users won’t leak any private data, which solves the privacy and security issues of traditional MLAAS. During the system implementation, we use homomorphic encryption to encrypt image data that requires machine learning inference; we also improve a crowdsourced federated learning classification algorithm, and implement the privacy-preserving computation of the entire system by introducing a dual-server mechanism. Experiments and performance analysis show that the system is feasible, the security degree of privacy protection has been significantly improved, and it is more suitable for application scenarios with high privacy and security requirements in real life.
  • Related Articles

    [1]Yu Ruiqi, Zhang Xinyun, Ren Shuang. A Review of Quantum Machine Learning Algorithms Based on Variational Quantum Circuit[J]. Journal of Computer Research and Development, 2025, 62(4): 821-851. DOI: 10.7544/issn1000-1239.202330979
    [2]Qian Luoxiong, Chen Mei, Ma Xueyan, Zhang Chi, Zhang Jinhong. Multi-View Clustering Based on Adaptive Tensor Singular Value Shrinkage[J]. Journal of Computer Research and Development, 2025, 62(3): 733-750. DOI: 10.7544/issn1000-1239.202330785
    [3]Pan Shijie, Gao Fei, Wan Linchun, Qin Sujuan, Wen Qiaoyan. Quantum Algorithm for Spectral Regression[J]. Journal of Computer Research and Development, 2021, 58(9): 1835-1842. DOI: 10.7544/issn1000-1239.2021.20210366
    [4]Yu Runlong, Zhao Hongke, Wang Zhong, Ye Yuyang, Zhang Peining, Liu Qi, Chen Enhong. Negatively Correlated Search with Asymmetry for Real-Parameter Optimization Problems[J]. Journal of Computer Research and Development, 2019, 56(8): 1746-1757. DOI: 10.7544/issn1000-1239.2019.20190198
    [5]Zhang Cheng, Wang Dong, Shen Chuan, Cheng Hong, Chen Lan, Wei Sui. Separable Compressive Imaging Method Based on Singular Value Decomposition[J]. Journal of Computer Research and Development, 2016, 53(12): 2816-2823. DOI: 10.7544/issn1000-1239.2016.20150414
    [6]Ning Xin, Li Weijun, Li Haoguang, Liu Wenjie. Uncorrelated Locality Preserving Discriminant Analysis Based on Bionics[J]. Journal of Computer Research and Development, 2016, 53(11): 2623-2629. DOI: 10.7544/issn1000-1239.2016.20150630
    [7]Zhao Feng, Huang Qingming, Gao Wen. An Image Matching Algorithm Based on Singular Value Decomposition[J]. Journal of Computer Research and Development, 2010, 47(1): 23-32.
    [8]Lin Yuan, Luo Siwei, and Yang Liner. Recommendation-Based Grid Resource Matching Algorithm[J]. Journal of Computer Research and Development, 2009, 46(11): 1814-1820.
    [9]Sun Yong, Wu Bo, and Feng Yanpeng. A Policy-and Value- Iteration Algorithm for POMDP[J]. Journal of Computer Research and Development, 2008, 45(10): 1763-1768.
    [10]Zhang Shihui, Kong Lingfu, and Feng Liang. An Improved Hestenes SVD Method and Its Parallel Computing and Application in Parallel Robot[J]. Journal of Computer Research and Development, 2008, 45(4): 716-724.
  • Cited by

    Periodical cited type(2)

    1. 李光. 基于区块链技术的建筑工程质量管理策略. 中国建筑装饰装修. 2025(02): 75-77 .
    2. Jing He,Xiaofeng Ma,Dawei Zhang,Feng Peng. Supervised and revocable decentralized identity privacy protection scheme. Security and Safety. 2024(04): 113-135 .

    Other cited types(1)

Catalog

    Article views (476) PDF downloads (173) Cited by(3)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return