Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 6 de 6
Filter
Add more filters










Database
Language
Publication year range
1.
Article in English | MEDLINE | ID: mdl-38875094

ABSTRACT

Auditability and verifiability are critical elements in establishing trustworthiness in federated learning (FL). These principles promote transparency, accountability, and independent validation of FL processes. Incorporating auditability and verifiability is imperative for building trust and ensuring the robustness of FL methodologies. Typical FL architectures rely on a trustworthy central authority to manage the FL process. However, reliance on a central authority could become a single point of failure, making it an attractive target for cyber-attacks and insider frauds. Moreover, the central entity lacks auditability and verifiability, which undermines the privacy and security that FL aims to ensure. This article proposes an auditable and verifiable decentralized FL (DFL) framework. We first develop a smart-contract-based monitoring system for DFL participants. This monitoring system is then deployed to each DFL participant and executed when the local model training is initiated. The monitoring system records necessary information during the local training process for auditing purposes. Afterward, each DFL participant sends the local model and monitoring system to the respective blockchain node. The blockchain nodes representing each DFL participant exchange the local models and use the monitoring system to validate each local model. To ensure an auditable and verifiable decentralized aggregation procedure, we record the aggregation steps taken by each blockchain node in the aggregation contract. Following the aggregation phase, each blockchain node applies a multisignature scheme to the aggregated model, producing a globally verifiable model. Based on the signed global model and the aggregation contract, each blockchain node implements a consensus protocol to store the validated global model in tamper-proof storage. To evaluate the performance of our proposed model, we conducted a series of experiments with different machine learning architectures and datasets, including CIFAR-10, F-MNIST, and MedMNIST. The experimental results indicate a slight increase in time consumption compared with the state-of-the-art, serving as a tradeoff to ensure auditability and verifiability. The proposed blockchain-enabled DFL also saves up to 95% communication costs for the participant side.

2.
Rev Sci Instrum ; 93(11): 114103, 2022 Nov 01.
Article in English | MEDLINE | ID: mdl-36461517

ABSTRACT

Computed tomography angiography (CTA) has become the main imaging technique for cardiovascular diseases. Before performing the transcatheter aortic valve intervention operation, segmenting images of the aortic sinus and nearby cardiovascular tissue from enhanced images of the human heart is essential for auxiliary diagnosis and guiding doctors to make treatment plans. This paper proposes a nnU-Net (no-new-Net) framework based on deep learning (DL) methods to segment the aorta and the heart tissue near the aortic valve in cardiac CTA images, and verifies its accuracy and effectiveness. A total of 130 sets of cardiac CTA image data (88 training sets, 22 validation sets, and 20 test sets) of different subjects have been used for the study. The advantage of the nnU-Net model is that it can automatically perform preprocessing and data augmentation according to the input image data, can dynamically adjust the network structure and parameter configuration, and has a high model generalization ability. Experimental results show that the DL method based on nnU-Net can accurately and effectively complete the segmentation task of cardiac aorta and cardiac tissue near the root on the cardiac CTA dataset, and achieves an average Dice similarity coefficient of 0.9698 ± 0.0081. The actual inference segmentation effect basically meets the preoperative needs of the clinic. Using the DL method based on the nnU-Net model solves the problems of low accuracy in threshold segmentation, bad segmentation of organs with fuzzy edges, and poor adaptability to different patients' cardiac CTA images. nnU-Net will become an excellent DL technology in cardiac CTA image segmentation tasks.


Subject(s)
Cardiovascular Diseases , Deep Learning , Humans , Aorta/diagnostic imaging , Heart , Tomography, X-Ray Computed
4.
Nat Commun ; 13(1): 4269, 2022 07 25.
Article in English | MEDLINE | ID: mdl-35879326

ABSTRACT

In order to realize the full potential of wireless edge artificial intelligence (AI), very large and diverse datasets will often be required for energy-demanding model training on resource-constrained edge devices. This paper proposes a lead federated neuromorphic learning (LFNL) technique, which is a decentralized energy-efficient brain-inspired computing method based on spiking neural networks. The proposed technique will enable edge devices to exploit brain-like biophysiological structure to collaboratively train a global model while helping preserve privacy. Experimental results show that, under the situation of uneven dataset distribution among edge devices, LFNL achieves a comparable recognition accuracy to existing edge AI techniques, while substantially reducing data traffic by >3.5× and computational latency by >2.0×. Furthermore, LFNL significantly reduces energy consumption by >4.5× compared to standard federated learning with a slight accuracy loss up to 1.5%. Therefore, the proposed LFNL can facilitate the development of brain-inspired computing and edge AI.


Subject(s)
Artificial Intelligence , Neural Networks, Computer , Brain/physiology , Recognition, Psychology
5.
Sensors (Basel) ; 21(12)2021 Jun 20.
Article in English | MEDLINE | ID: mdl-34202977

ABSTRACT

Successful cyber-attacks are caused by the exploitation of some vulnerabilities in the software and/or hardware that exist in systems deployed in premises or the cloud. Although hundreds of vulnerabilities are discovered every year, only a small fraction of them actually become exploited, thereby there exists a severe class imbalance between the number of exploited and non-exploited vulnerabilities. The open source national vulnerability database, the largest repository to index and maintain all known vulnerabilities, assigns a unique identifier to each vulnerability. Each registered vulnerability also gets a severity score based on the impact it might inflict upon if compromised. Recent research works showed that the cvss score is not the only factor to select a vulnerability for exploitation, and other attributes in the national vulnerability database can be effectively utilized as predictive feature to predict the most exploitable vulnerabilities. Since cybersecurity management is highly resource savvy, organizations such as cloud systems will benefit when the most likely exploitable vulnerabilities that exist in their system software or hardware can be predicted with as much accuracy and reliability as possible, to best utilize the available resources to fix those first. Various existing research works have developed vulnerability exploitation prediction models by addressing the existing class imbalance based on algorithmic and artificial data resampling techniques but still suffer greatly from the overfitting problem to the major class rendering them practically unreliable. In this research, we have designed a novel cost function feature to address the existing class imbalance. We also have utilized the available large text corpus in the extracted dataset to develop a custom-trained word vector that can better capture the context of the local text data for utilization as an embedded layer in neural networks. Our developed vulnerability exploitation prediction models powered by a novel cost function and custom-trained word vector have achieved very high overall performance metrics for accuracy, precision, recall, F1-Score and AUC score with values of 0.92, 0.89, 0.98, 0.94 and 0.97, respectively, thereby outperforming any existing models while successfully overcoming the existing overfitting problem for class imbalance.


Subject(s)
Algorithms , Machine Learning , Computer Security , Neural Networks, Computer , Reproducibility of Results
6.
J Med Syst ; 35(5): 745-53, 2011 Oct.
Article in English | MEDLINE | ID: mdl-20703727

ABSTRACT

Wireless body sensor network (WBSN) has gained significant interests as an important infrastructure for real-time biomedical healthcare systems, while the security of the sensitive health information becomes one of the main challenges. Due to the constraints of limited power, traditional cryptographic key distribution schemes are not suitable for WBSN. This paper proposes a novel energy-efficient approach, BodyKey, which can distribute the keys using the electrocardiograph biometrics. BodyKey represents the biometric features as ordered set, and deals with the biometric variations using set reconciliation. In this way, only limited necessary information needs to be communicated for key agreement, and the total energy consumption for key distribution can thus be reduced. Experiments on the PhysioBank Database show that BodyKey can perform an energy consumption rate of 0.01 mJ/bit with an equal accuracy rate of 97.28%, allowing the system to be used as an energy-efficient key distribution scheme for secure communications in WBSN.


Subject(s)
Biometry/instrumentation , Confidentiality , Conservation of Energy Resources , Electrocardiography , Monitoring, Physiologic/instrumentation , Telemetry , Biomedical Engineering , China , Humans , Monitoring, Physiologic/methods , Signal Processing, Computer-Assisted/instrumentation
SELECTION OF CITATIONS
SEARCH DETAIL
...