32 research outputs found

    Lightweight and Unobtrusive Data Obfuscation at IoT Edge for Remote Inference

    Full text link
    Executing deep neural networks for inference on the server-class or cloud backend based on data generated at the edge of Internet of Things is desirable due primarily to the limited compute power of edge devices and the need to protect the confidentiality of the inference neural networks. However, such a remote inference scheme incurs concerns regarding the privacy of the inference data transmitted by the edge devices to the curious backend. This paper presents a lightweight and unobtrusive approach to obfuscate the inference data at the edge devices. It is lightweight in that the edge device only needs to execute a small-scale neural network; it is unobtrusive in that the edge device does not need to indicate whether obfuscation is applied. Extensive evaluation by three case studies of free spoken digit recognition, handwritten digit recognition, and American sign language recognition shows that our approach effectively protects the confidentiality of the raw forms of the inference data while effectively preserving the backend's inference accuracy.Comment: This paper has been accepted by IEEE Internet of Things Journal, Special Issue on Artificial Intelligence Powered Edge Computing for Internet of Thing

    Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices

    Full text link
    Home appliance manufacturers strive to obtain feedback from users to improve their products and services to build a smart home system. To help manufacturers develop a smart home system, we design a federated learning (FL) system leveraging the reputation mechanism to assist home appliance manufacturers to train a machine learning model based on customers' data. Then, manufacturers can predict customers' requirements and consumption behaviors in the future. The working flow of the system includes two stages: in the first stage, customers train the initial model provided by the manufacturer using both the mobile phone and the mobile edge computing (MEC) server. Customers collect data from various home appliances using phones, and then they download and train the initial model with their local data. After deriving local models, customers sign on their models and send them to the blockchain. In case customers or manufacturers are malicious, we use the blockchain to replace the centralized aggregator in the traditional FL system. Since records on the blockchain are untampered, malicious customers or manufacturers' activities are traceable. In the second stage, manufacturers select customers or organizations as miners for calculating the averaged model using received models from customers. By the end of the crowdsourcing task, one of the miners, who is selected as the temporary leader, uploads the model to the blockchain. To protect customers' privacy and improve the test accuracy, we enforce differential privacy on the extracted features and propose a new normalization technique. We experimentally demonstrate that our normalization technique outperforms batch normalization when features are under differential privacy protection. In addition, to attract more customers to participate in the crowdsourcing FL task, we design an incentive mechanism to award participants.Comment: This paper appears in IEEE Internet of Things Journal (IoT-J

    Defensive behavior is linked to altered surface chemistry following infection in a termite society

    Get PDF
    The care-kill response determines whether a sick individual will be treated or eliminated from an insect society, but little is known about the physiological underpinnings of this process. We exploited the stepwise infection dynamics of an entomopathogenic fungus in a termite to explore how care-kill transitions occur, and identify the chemical cues behind these shifts. We found collective responses towards pathogen-injected individuals to vary according to severity and timing of pathogen challenge, with elimination, via cannibalism, occurring sooner in response to a severe active infection. However, injection with inactivated fungal blastospores also resulted in increased albeit delayed cannibalism, even though it did not universally cause host death. This indicates that the decision to eliminate an individual is triggered before pathogen viability or terminal disease status has been established. We then compared the surface chemistry of differently challenged individuals, finding increased amounts of long-chained methyl-branched alkanes with similar branching patterns in individuals injected with both dead and viable fungal blastospores, with the latter showing the largest increase. This coincided with the highest amounts of observed cannibalism as well as signs of severe moribundity. Our study provides new mechanistic insight into the emergent collective behaviors involved in the disease defense of a termite society

    Transforming Emotional Regime: Pai Hsien- yung’s Crystal Boys

    No full text
    “Transforming Emotional Regime: Pai Hsien- yung’s Crystal Boys” turns towards literature as a means of exploring emotional hierarchies that both inform and organize homophobia and anti-queer violence within the structure of the family. Linshan Jiang takes us through Crystal Boys––a canonical piece of Taiwanese queer lit- erature––a love story between two male lovers up against the social order of fielial piety in Taiwan during the 1960s
    corecore