scispace - formally typeset
Search or ask a question
Author

KumariSaru

Bio: KumariSaru is an academic researcher from Chaudhary Charan Singh University. The author has contributed to research in topics: Differential privacy & Inference attack. The author has co-authored 1 publications.

Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a machine learning as a service (MLaaS) has recently been valued by the organizations for machine learning training over SaaS over a period of time.
Abstract: Because of the powerful computing and storage capability in cloud computing, machine learning as a service (MLaaS) has recently been valued by the organizations for machine learning training over s...

9 citations


Cited by
More filters
Proceedings ArticleDOI
01 Aug 2022
TL;DR: This paper discusses the promising role of ReL for DCCS in terms of different aspects, including device condition monitoring, predictions, management of the systems, etc, and provides a list of Re L algorithms and their pitfalls which helps D CCS by considering various constraints.
Abstract: The distributed computing continuum systems (DCCS) and representation learning (ReL) are two diverse computer science technologies with their use cases, applications, and benefits. The DCCS helps increase flexibility with improved performance of hybrid IoT-Edge-Cloud infrastructures. In contrast, representation learning extracts the features (meaningful information) and underlying explanatory factors from the given datasets. With these benefits, using ReL for DCCS to improve its performance by monitoring the devices will increase the utilization efficiency, zero downtime, etc. In this context, this paper discusses the promising role of ReL for DCCS in terms of different aspects, including device condition monitoring, predictions, management of the systems, etc. This paper also provides a list of ReL algorithms and their pitfalls which helps DCCS by considering various constraints. In addition, this paper list different challenges imposed on ReL to analyze DCCS data. It also provides future research directions to make the systems autonomous, performing multiple tasks simultaneously with the help of other AI/ML approaches.

7 citations

Journal ArticleDOI
TL;DR: DisBezant as mentioned in this paper proposes a credibility-based mechanism to resist the Byzantine attack in non-iid (not independent and identically distributed) dataset which is usually gathered from heterogeneous ships.
Abstract: With the intelligentization of Maritime Transportation System (MTS), Internet of Thing (IoT) and machine learning technologies have been widely used to achieve the intelligent control and routing planning for ships. As an important branch of machine learning, federated learning is the first choice to train an accurate joint model without sharing ships' data directly. However, there are still many unsolved challenges while using federated learning in IoT-enabled MTS, such as the privacy preservation and Byzantine attacks. To surmount the above challenges, a novel mechanism, namely DisBezant, is designed to achieve the secure and Byzantine-robust federated learning in IoT-enabled MTS. Specifically, a credibility-based mechanism is proposed to resist the Byzantine attack in non-iid (not independent and identically distributed) dataset which is usually gathered from heterogeneous ships. The credibility is introduced to measure the trustworthiness of uploaded knowledge from ships and is updated based on their shared information in each epoch. Then, we design an efficient privacy-preserving gradient aggregation protocol based on a secure two-party calculation protocol. With the help of a central server, we can accurately recognise the Byzantine attackers and update the global model parameters privately. Furthermore, we theoretically discussed the privacy preservation and efficiency of DisBezant. To verify the effectiveness of our DisBezant, we evaluate it over three real datasets and the results demonstrate that DisBezant can efficiently and effectively achieve the Byzantine-robust federated learning. Although there are 40% nodes are Byzantine attackers in participants, our DisBezant can still recognise them and ensure the accurate model training.

6 citations

Journal ArticleDOI
01 Feb 2023
TL;DR: DisBezant as mentioned in this paper proposes a credibility-based mechanism to resist the Byzantine attack in non-iid (not independent and identically distributed) dataset which is usually gathered from heterogeneous ships.
Abstract: With the intelligentization of Maritime Transportation System (MTS), Internet of Thing (IoT) and machine learning technologies have been widely used to achieve the intelligent control and routing planning for ships. As an important branch of machine learning, federated learning is the first choice to train an accurate joint model without sharing ships’ data directly. However, there are still many unsolved challenges while using federated learning in IoT-enabled MTS, such as the privacy preservation and Byzantine attacks. To surmount the above challenges, a novel mechanism, namely DisBezant, is designed to achieve the secure and Byzantine-robust federated learning in IoT-enabled MTS. Specifically, a credibility-based mechanism is proposed to resist the Byzantine attack in non-iid (not independent and identically distributed) dataset which is usually gathered from heterogeneous ships. The credibility is introduced to measure the trustworthiness of uploaded knowledge from ships and is updated based on their shared information in each epoch. Then, we design an efficient privacy-preserving gradient aggregation protocol based on a secure two-party calculation protocol. With the help of a central server, we can accurately recognise the Byzantine attackers and update the global model parameters privately. Furthermore, we theoretically discussed the privacy preservation and efficiency of DisBezant. To verify the effectiveness of our DisBezant, we evaluate it over three real datasets and the results demonstrate that DisBezant can efficiently and effectively achieve the Byzantine-robust federated learning. Although there are 40% nodes are Byzantine attackers in participants, our DisBezant can still recognise them and ensure the accurate model training.

5 citations

Proceedings ArticleDOI
01 Aug 2022
TL;DR: In this paper , the authors discuss the promising role of ReL for DCCS in terms of different aspects, including device condition monitoring, predictions, management of the systems, etc.
Abstract: The distributed computing continuum systems (DCCS) and representation learning (ReL) are two diverse computer science technologies with their use cases, applications, and benefits. The DCCS helps increase flexibility with improved performance of hybrid IoT-Edge-Cloud infrastructures. In contrast, representation learning extracts the features (meaningful information) and underlying explanatory factors from the given datasets. With these benefits, using ReL for DCCS to improve its performance by monitoring the devices will increase the utilization efficiency, zero downtime, etc. In this context, this paper discusses the promising role of ReL for DCCS in terms of different aspects, including device condition monitoring, predictions, management of the systems, etc. This paper also provides a list of ReL algorithms and their pitfalls which helps DCCS by considering various constraints. In addition, this paper list different challenges imposed on ReL to analyze DCCS data. It also provides future research directions to make the systems autonomous, performing multiple tasks simultaneously with the help of other AI/ML approaches.

4 citations

Journal ArticleDOI
TL;DR: In this paper , a general governance and sustainable architecture for distributed computing continuum systems (DCCS) is proposed, which reflects the human body's self-healing model, and the proposed model has three stages: first, it analyzes system data to acquire knowledge; second it can leverage the knowledge to monitor and predict future conditions; and third it takes further actions to autonomously solve any issue or to alert administrators.
Abstract: Abstract Distributed computing continuum systems (DCCS) make use of a vast number of computing devices to process data generated by edge devices such as the Internet of Things and sensor nodes. Besides performing computations, these devices also produce data including, for example, event logs, configuration files, network management information. When these data are analyzed, we can learn more about the devices, such as their capabilities, processing efficiency, resource usage, and failure prediction. However, these data are available in different forms and have different attributes due to the highly heterogeneous nature of DCCS. The diversity of data poses various challenges which we discuss by relating them to big data, so that we can utilize the advantages of big data analytical tools. We enumerate several existing tools that can perform the monitoring task and also summarize their characteristics. Further, we provide a general governance and sustainable architecture for DCCS, which reflects the human body’s self-healing model. The proposed model has three stages: first, it analyzes system data to acquire knowledge; second, it can leverage the knowledge to monitor and predict future conditions; and third, it takes further actions to autonomously solve any issue or to alert administrators. Thus, the DCCS model is designed to minimize the system’s downtime while optimizing resource usage. A small set of data is used to illustrate the monitoring and prediction of the performance of a system through Bayesian network structure learning. Finally, we discuss the limitations of the governance and sustainability model, and we provide possible solutions to overcome them and make the system more efficient.

3 citations