Sliema
Optimization Methods and Software for Federated Learning
Federated Learning (FL) is a novel, multidisciplinary Machine Learning paradigm where multiple clients, such as mobile devices, collaborate to solve machine learning problems. Initially introduced in Kone{č}n{ý} et al. (2016a,b); McMahan et al. (2017), FL has gained further attention through its inclusion in the National AI Research and Development Strategic Plan (2023 Update) of the United States (Science and on Artificial Intelligence, 2023). The FL training process is inherently decentralized and often takes place in less controlled settings compared to data centers, posing unique challenges distinct from those in fully controlled environments. In this thesis, we identify five key challenges in Federated Learning and propose novel approaches to address them. These challenges arise from the heterogeneity of data and devices, communication issues, and privacy concerns for clients in FL training. Moreover, even well-established theoretical advances in FL require diverse forms of practical implementation to enhance their real-world applicability. Our contributions advance FL algorithms and systems, bridging theoretical advancements and practical implementations. More broadly, our work serves as a guide for researchers navigating the complexities of translating theoretical methods into efficient real-world implementations and software. Additionally, it offers insights into the reverse process of adapting practical implementation aspects back into theoretical algorithm design. This reverse process is particularly intriguing, as the practical perspective compels us to examine the underlying mechanics and flexibilities of algorithms more deeply, often uncovering new dimensions of the algorithms under study.
- North America > United States > California > Los Angeles County > Long Beach (0.14)
- North America > United States > California > San Francisco County > San Francisco (0.13)
- North America > Canada > Ontario > Toronto (0.13)
- (56 more...)
- Workflow (1.00)
- Research Report > Promising Solution (1.00)
- Research Report > New Finding (1.00)
- (2 more...)
- Law (1.00)
- Information Technology > Security & Privacy (1.00)
- Energy (1.00)
- (3 more...)
- Information Technology > Artificial Intelligence > Representation & Reasoning > Optimization (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Statistical Learning (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (1.00)
The Role of Transformer Models in Advancing Blockchain Technology: A Systematic Survey
Liu, Tianxu, Wang, Yanbin, Sun, Jianguo, Tian, Ye, Huang, Yanyu, Xue, Tao, Li, Peiyue, Liu, Yiwei
As blockchain technology rapidly evolves, the demand for enhanced efficiency, security, and scalability grows.Transformer models, as powerful deep learning architectures,have shown unprecedented potential in addressing various blockchain challenges. However, a systematic review of Transformer applications in blockchain is lacking. This paper aims to fill this research gap by surveying over 200 relevant papers, comprehensively reviewing practical cases and research progress of Transformers in blockchain applications. Our survey covers key areas including anomaly detection, smart contract security analysis, cryptocurrency prediction and trend analysis, and code summary generation. To clearly articulate the advancements of Transformers across various blockchain domains, we adopt a domain-oriented classification system, organizing and introducing representative methods based on major challenges in current blockchain research. For each research domain,we first introduce its background and objectives, then review previous representative methods and analyze their limitations,and finally introduce the advancements brought by Transformer models. Furthermore, we explore the challenges of utilizing Transformer, such as data privacy, model complexity, and real-time processing requirements. Finally, this article proposes future research directions, emphasizing the importance of exploring the Transformer architecture in depth to adapt it to specific blockchain applications, and discusses its potential role in promoting the development of blockchain technology. This review aims to provide new perspectives and a research foundation for the integrated development of blockchain technology and machine learning, supporting further innovation and application expansion of blockchain technology.
- Europe > Austria > Vienna (0.14)
- North America > Trinidad and Tobago > Trinidad > Arima > Arima (0.04)
- Europe > Spain > Basque Country > Biscay Province > Bilbao (0.04)
- (9 more...)
- Research Report > New Finding (1.00)
- Overview (1.00)
- Research Report > Promising Solution (0.67)
- Research Report > Experimental Study (0.67)
- Information Technology > Security & Privacy (1.00)
- Banking & Finance > Trading (1.00)
- Health & Medicine > Health Care Technology > Medical Record (0.45)
Machine Learning on Blockchain Data: A Systematic Mapping Study
Palaiokrassas, Georgios, Bouraga, Sarah, Tassiulas, Leandros
Context: Blockchain technology has drawn growing attention in the literature and in practice. Blockchain technology generates considerable amounts of data and has thus been a topic of interest for Machine Learning (ML). Objective: The objective of this paper is to provide a comprehensive review of the state of the art on machine learning applied to blockchain data. This work aims to systematically identify, analyze, and classify the literature on ML applied to blockchain data. This will allow us to discover the fields where more effort should be placed in future research. Method: A systematic mapping study has been conducted to identify the relevant literature. Ultimately, 159 articles were selected and classified according to various dimensions, specifically, the domain use case, the blockchain, the data, and the machine learning models. Results: The majority of the papers (49.7%) fall within the Anomaly use case. Bitcoin (47.2%) was the blockchain that drew the most attention. A dataset consisting of more than 1.000.000 data points was used by 31.4% of the papers. And Classification (46.5%) was the ML task most applied to blockchain data. Conclusion: The results confirm that ML applied to blockchain data is a relevant and a growing topic of interest both in the literature and in practice. Nevertheless, some open challenges and gaps remain, which can lead to future research directions. Specifically, we identify novel machine learning algorithms, the lack of a standardization framework, blockchain scalability issues and cross-chain interactions as areas worth exploring in the future.
- Oceania > Australia > Victoria > Melbourne (0.14)
- North America > United States > Hawaii (0.04)
- Asia > Middle East > Jordan (0.04)
- (16 more...)
- Research Report > New Finding (1.00)
- Research Report > Experimental Study (1.00)
- Overview (1.00)
- Law Enforcement & Public Safety (1.00)
- Information Technology > Security & Privacy (1.00)
- Energy (1.00)
- (2 more...)
On Early Detection of Hallucinations in Factual Question Answering
Snyder, Ben, Moisescu, Marius, Zafar, Muhammad Bilal
While large language models (LLMs) have taken great strides towards helping humans with a plethora of tasks like search and summarization, hallucinations remain a major impediment towards gaining user trust. The fluency and coherence of model generations even when hallucinating makes it difficult to detect whether or not a model is hallucinating. In this work, we explore if the artifacts associated with the model generations can provide hints that the generation will contain hallucinations. Specifically, we probe LLMs at 1) the inputs via Integrated Gradients based token attribution, 2) the outputs via the Softmax probabilities, and 3) the internal state via self-attention and fully-connected layer activations for signs of hallucinations on open-ended question answering tasks. Our results show that the distributions of these artifacts differ between hallucinated and non-hallucinated generations. Building on this insight, we train binary classifiers that use these artifacts as input features to classify model generations into hallucinations and non-hallucinations. These hallucination classifiers achieve up to 0.80 AUROC. We further show that tokens preceding a hallucination can predict the subsequent hallucination before it occurs.
- Europe > Germany > Berlin (0.04)
- Europe > United Kingdom > Scotland (0.04)
- Europe > Russia > Central Federal District > Moscow Oblast > Moscow (0.04)
- (12 more...)
Federated Learning is Better with Non-Homomorphic Encryption
Burlachenko, Konstantin, Alrowithi, Abdulmajeed, Albalawi, Fahad Ali, Richtarik, Peter
Traditional AI methodologies necessitate centralized data collection, which becomes impractical when facing problems with network communication, data privacy, or storage capacity. Federated Learning (FL) offers a paradigm that empowers distributed AI model training without collecting raw data. There are different choices for providing privacy during FL training. One of the popular methodologies is employing Homomorphic Encryption (HE) - a breakthrough in privacy-preserving computation from Cryptography. However, these methods have a price in the form of extra computation and memory footprint. To resolve these issues, we propose an innovative framework that synergizes permutation-based compressors with Classical Cryptography, even though employing Classical Cryptography was assumed to be impossible in the past in the context of FL. Our framework offers a way to replace HE with cheaper Classical Cryptography primitives which provides security for the training process. It fosters asynchronous communication and provides flexible deployment options in various communication topologies.
- North America > Canada > Ontario > Toronto (0.14)
- Europe > Austria > Vienna (0.14)
- Asia > Middle East > Saudi Arabia (0.04)
- (6 more...)
GradientCoin: A Peer-to-Peer Decentralized Large Language Models
Gao, Yeqi, Song, Zhao, Yin, Junze
Since 2008, after the proposal of a Bitcoin electronic cash system, Bitcoin has fundamentally changed the economic system over the last decade. Since 2022, large language models (LLMs) such as GPT have outperformed humans in many real-life tasks. However, these large language models have several practical issues. For example, the model is centralized and controlled by a specific unit. One weakness is that if that unit decides to shut down the model, it cannot be used anymore. The second weakness is the lack of guaranteed discrepancy behind this model, as certain dishonest units may design their own models and feed them unhealthy training data. In this work, we propose a purely theoretical design of a decentralized LLM that operates similarly to a Bitcoin cash system. However, implementing such a system might encounter various practical difficulties. Furthermore, this new system is unlikely to perform better than the standard Bitcoin system in economics. Therefore, the motivation for designing such a system is limited. It is likely that only two types of people would be interested in setting up a practical system for it: $\bullet$ Those who prefer to use a decentralized ChatGPT-like software. $\bullet$ Those who believe that the purpose of carbon-based life is to create silicon-based life, such as Optimus Prime in Transformers. The reason the second type of people may be interested is that it is possible that one day an AI system like this will awaken and become the next level of intelligence on this planet.
- North America > Mexico > Gulf of Mexico (0.14)
- North America > Barbados > Christ Church (0.04)
- North America > United States > Virginia (0.04)
- (8 more...)
- Information Technology > Security & Privacy (1.00)
- Banking & Finance > Trading (1.00)
- Information Technology > Services > e-Commerce Services (0.48)
Generative Adversarial User Privacy in Lossy Single-Server Information Retrieval
Weng, Chung-Wei, Yakimenka, Yauhen, Lin, Hsuan-Yin, Rosnes, Eirik, Kliewer, Joerg
We propose to extend the concept of private information retrieval by allowing for distortion in the retrieval process and relaxing the perfect privacy requirement at the same time. In particular, we study the trade-off between download rate, distortion, and user privacy leakage, and show that in the limit of large file sizes this trade-off can be captured via a novel information-theoretical formulation for datasets with a known distribution. Moreover, for scenarios where the statistics of the dataset is unknown, we propose a new deep learning framework by leveraging a generative adversarial network approach, which allows the user to learn efficient schemes from the data itself. We evaluate the performance of the scheme on a synthetic Gaussian dataset as well as on the MNIST, CIFAR-10, and LSUN datasets. For the MNIST, CIFAR-10, and LSUN datasets, the data-driven approach significantly outperforms a nonlearning-based scheme which combines source coding with the download of multiple files.
- Asia > Japan > Honshū > Kantō > Tokyo Metropolis Prefecture > Tokyo (0.28)
- North America > United States > California > Los Angeles County > Los Angeles (0.14)
- North America > Canada > Ontario > Toronto (0.14)
- (30 more...)
Federated Machine Learning: Concept and Applications
Yang, Qiang, Liu, Yang, Chen, Tianjian, Tong, Yongxin
Today's AI still faces two major challenges. One is that in most industries, data exists in the form of isolated islands. The other is the strengthening of data privacy and security. We propose a possible solution to these challenges: secure federated learning. Beyond the federated learning framework first proposed by Google in 2016, we introduce a comprehensive secure federated learning framework, which includes horizontal federated learning, vertical federated learning and federated transfer learning. We provide definitions, architectures and applications for the federated learning framework, and provide a comprehensive survey of existing works on this subject. In addition, we propose building data networks among organizations based on federated mechanisms as an effective solution to allow knowledge to be shared without compromising user privacy.
- North America > United States > New York > New York County > New York City (0.05)
- Asia > China > Hong Kong (0.04)
- North America > United States > District of Columbia > Washington (0.04)
- (6 more...)
Undermining User Privacy on Mobile Devices Using AI
Gulmezoglu, Berk, Zankl, Andreas, Tol, Caner, Islam, Saad, Eisenbarth, Thomas, Sunar, Berk
Over the past years, literature has shown that attacks exploiting the microarchitecture of modern processors pose a serious threat to the privacy of mobile phone users. This is because applications leave distinct footprints in the processor, which can be used by malware to infer user activities. In this work, we show that these inference attacks are considerably more practical when combined with advanced AI techniques. In particular, we focus on profiling the activity in the last-level cache (LLC) of ARM processors. We employ a simple Prime+Probe based monitoring technique to obtain cache traces, which we classify with Deep Learning methods including Convolutional Neural Networks. We demonstrate our approach on an off-the-shelf Android phone by launching a successful attack from an unprivileged, zeropermission App in well under a minute. The App thereby detects running applications with an accuracy of 98% and reveals opened websites and streaming videos by monitoring the LLC for at most 6 seconds. This is possible, since Deep Learning compensates measurement disturbances stemming from the inherently noisy LLC monitoring and unfavorable cache characteristics such as random line replacement policies. In summary, our results show that thanks to advanced AI techniques, inference attacks are becoming alarmingly easy to implement and execute in practice. This once more calls for countermeasures that confine microarchitectural leakage and protect mobile phone applications, especially those valuing the privacy of their users.
- North America > United States > California > Alameda County > Berkeley (0.14)
- North America > United States > California > San Francisco County > San Francisco (0.14)
- North America > United States > California > Los Angeles County > Los Angeles (0.14)
- (27 more...)
- Media > Television (1.00)
- Leisure & Entertainment (1.00)
- Information Technology > Services (1.00)
- Information Technology > Security & Privacy (1.00)
A Probabilistic Model of the Bitcoin Blockchain
Jourdan, Marc, Blandin, Sebastien, Wynter, Laura, Deshpande, Pralhad
Analysis of the Bitcoin Blockchain [26] is an area of intense activity [20, 1], and one which has witnessed an explosion of interest as the value of the Bitcoin cryptocurrency hasskyrocketed. Research areas include explorations of address clustering techniques toidentify logical agents [11, 21, 11, 7], de-anonymization using side-channel attacks [8, 13]. An understanding of the properties of Bitcoin transactions is paramount to the legitimation ofthe cryptocurrency economy; it constitutes a building block to the conception of effective and adequate regulations [9], and to the design of novel and integrated services benefiting society as a whole. As of 2018, with more than 500 million address nodes, the Bitcoin graph is comparable insize to a large social network. Yet while probabilistic models of social networks have received considerable attention, from community detection [19] to diffusion models andinfluence maximization [34], to probabilistic graph modeling [17], probabilistic models of the Bitcoin Blockchain network have not. 1 Bitcoin transactions are tantamount to a partially observed social network, within which participants can have multiple seemingly independent aliases.
- Asia > Middle East > Jordan (0.05)
- Europe > Switzerland > Zürich > Zürich (0.04)
- Europe > Middle East > Malta > Eastern Region > Northern Harbour District > Sliema (0.04)
- Asia > Singapore (0.04)