|
[1] R. Michael and Lareina, “Mckinsey technology trends outlook 2022.” McKinsey & Company, 2022. [2] H. Brendan McMahan, E. Moore, D. Ramage, S. Hampson, and B. Agüera y Ar- cas, “Communication-efficient learning of deep networks from decentralized data,” arXiv e-prints, pp. arXiv–1602, 2016. [3] A. C. Yao, “Protocols for secure computations,” in 23rd annual symposium on foundations of computer science (sfcs 1982), pp. 160–164, IEEE, 1982. [4] O. Goldreich, “Secure multi-party computation,” Manuscript. Preliminary version, vol. 78, no. 110, 1998. [5] I.P.FellegiandA.B.Sunter,“Atheoryforrecordlinkage,”Journal of the American Statistical Association, vol. 64, no. 328, pp. 1183–1210, 1969. [6] C. Dwork, “Differential privacy,” in Automata, Languages and Programming: 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II 33, pp. 1–12, Springer, 2006. [7] R. L. Rivest, L. Adleman, M. L. Dertouzos, et al., “On data banks and privacy homomorphisms,” Foundations of secure computation, vol. 4, no. 11, pp. 169–180, 1978. [8] C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proceedings of the forty-first annual ACM symposium on Theory of computing, pp. 169–178, 2009. [9] P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Advances in Cryptology—EUROCRYPT'99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2–6, 1999 Proceedings 18, pp. 223–238, Springer, 1999. [10] J. Verbraeken, M. Wolting, J. Katzy, J. Kloppenburg, T. Verbelen, and J. S. Rellermeyer, “A survey on distributed machine learning,” Acm computing surveys (csur), vol. 53, no. 2, pp. 1–33, 2020. [11] Y. Zhan, J. Zhang, Z. Hong, L. Wu, P. Li, and S. Guo, “A survey of incentive mechanism design for federated learning,” IEEE Transactions on Emerging Topics in Computing, vol. 10, no. 2, pp. 1035–1044, 2021. [12] R.Jia, D.Dao, B.Wang, F. A. Hubis, N. Hynes, N. M. Gürel, B. Li, C. Zhang, D. Song, and C. J. Spanos, “Towards efficient data valuation based on the shapley value,” in The 22nd International Conference on Artificial Intelligence and Statistics, pp. 1167–1176, PMLR, 2019. [13] X.Yang, W. Tan, C.Peng, S.Xiang, and K.Niu, “Federated learning incentive mechanism design via enhanced shapley value method,” Wireless Communications and Mobile Computing, vol. 2022, 2022. [14] Y.Zhan, P.Li, K.Wang, S.Guo, and Y.Xia, “Big data analytics by crowdlearning: Architecture and mechanism design,” IEEE Network, vol. 34, no. 3, pp. 143–147, 2020. [15] Y.Zhan and J.Zhang, “Anincentivemechanismdesignforefficientedgelearningby deep reinforcement learning approach,” in IEEE INFOCOM 2020-IEEE Conference on Computer Communications, pp. 2489–2498, IEEE, 2020. [16] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” Decentralized business review, p. 21260, 2008. [17] N. Szabo, “Smart contracts: building blocks for digital markets,” EXTROPY: The Journal of Transhumanist Thought,(16), vol. 18, no. 2, p. 28, 1996. [18] V. Buterin et al., “A next-generation smart contract and decentralized application platform,” white paper, vol. 3, no. 37, pp. 2–1, 2014. [19] K. R. Özyilmaz, M. Doğan, and A. Yurdakul, “Idmob: Iot data marketplace on blockchain,” in 2018 crypto valley conference on blockchain technology (CVCBT), pp. 11–19, IEEE, 2018. [20] A. Marathe, K. Narayanan, A. Gupta, and P. Manoj, “Dinemmo: decentralized incentivization for enterprise marketplace models,” in 2018 IEEE 25th International Conference on High Performance Computing Workshops (HiPCW), pp. 95–100, IEEE, 2018. [21] D. Justin and B. Harris, “Decentralized & collaborative ai on blockchain,” in Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain), Atlanta, GA, USA, pp. 14–17, 2019. [22] H.Kim, J.Park, M.Bennis, and S.-L.Kim, “Blockchained on-device federated learning,” IEEE Communications Letters, vol. 24, no. 6, pp. 1279–1283, 2019. [23] Y. Liu, Z. Ai, S. Sun, S. Zhang, Z. Liu, and H. Yu, “Fedcoin: A peer-to-peer payment system for federated learning,” in Federated Learning: Privacy and Incentive, pp. 125–138, Springer, 2020. [24] X.FengandL.Chen, “Dataprivacyprotectionsharingstrategybasedonconsortium blockchain and federated learning,” in 2022 International Conference on Artificial Intelligence and Computer Information Technology (AICIT), pp. 1–4, IEEE, 2022. [25] A. E. Kazdin and R. R. Bootzin, “The token economy: An evaluative review 1,” Journal of applied behavior analysis, vol. 5, no. 3, pp. 343–372, 1972. [26] J. Benet and N. Greco, “Filecoin: A decentralized storage network,” Protoc. Labs, pp. 1–36, 2018. [27] F. Vogelsteller and V. Buterin, “Erc-20: Token standard.” Ethereum Improvement Proposals, November 2015. [28] S. Ellis, A. Juels, and S. Nazarov, “Chainlink: A decentralized oracle network,” Retrieved March, vol. 11, no. 2018, p. 1, 2017. [29] Möbius, “Learning from imbalanced insurance data.”https://www.kaggle.com/ datasets/arashnic/imbalanced-data-practice, 2021. [30] Hyperledger Foundation, “Hyperledger besu.” https://www.hyperledger.org/ use/besu, 2023.
|