SlideShare a Scribd company logo
Privacy-preserving blockchain-based federated
learning for traffic
flow prediction
Research background
Research ideas
Research contents
Contributions
1
2
3
4
Future plans & References
5
Contents
1.Research background
Research background
Background:
As accurate and timely traffic flow information is extremely important for traffic management,
traffic flow prediction has become a vital component of intelligent transportation systems. However,
existing traffic flow prediction methods based on centralized machine learning need to gather raw
data for model training, which involves serious privacy exposure risks.
2.Research ideas
- - -
- - -
The process of proposing ideas
3.Research Contents
1. Fedrate Learning
The specific implementation of ideas
The goal of this paper is to achieve accurate and
timely TFP through a lightweight federated learning
scheme. Using GRU neural network as a lightweight
technology to predict future traffic flow and
implementing the application of FL in TFP systems.
Establish a dedicated consortium
blockchain and implement a decentralized
TFP system using FL. For the convenience of
system functionality, we first select a certain
number of RSUs as authorized miners. To this
end, upgrade the hardware configuration of
these RSUs to have powerful computing,
storage, and communication capabilities to
verify local model updates submitted by
distributed vehicles and identify low accuracy
and unreliable updates. Through carefully
designed consensus algorithms, they
generate a new block containing qualified
local model update records.
2. Distributed TFP Systems and Federated Learning
The specific implementation of ideas
Use a consensus algorithm called dBFT to execute the consensus process among miners; Only
qualified local model updates are aggregated to generate the latest global model.In this consensus
process, false or low-quality local model updates are not integrated into the global model training,
which improves the FL performance and reduces poisoning attacks. Therefore, the proposed
consortium blockchain with a dBFT-based consensus algorithm ensures the secure, reliable, and
privacy-preserving characteristics of the FL-based TFP method for ITS.
The specific implementation of ideas
3. Design of consortium blockchain
step 1:
Initialization
Step 2:
Leader Selection
Step 3:
Local model training
Step 4:
Model update verification
The specific implementation steps of consensus algorithm
Step 5:
Candidate block
verification
Step 6:
Global model
training
The specific implementation of ideas
4.Local Differential Privacy Technology for Protecting Vehicle Communication Privacy in TFP
Definition 1: Participants should add random perturbations to the data. In order to protect the privacy of
vehicle location information in TFP tasks, a Gaussian mechanism is used to add carefully designed noise to
interfere with the location information. Firstly, define the Gaussian mechanism as defined in Definition 2:
Definition 2:Gaussian mechanism
Definition 3:Vehicle information after disturbance
Experiment
Performance comparison of MAE, MSE, and RMSE, For federated
learning-based GRU model, LSTM model, SAE model, And SVM
model.
Experiment
4. Contributions
Introduced a federated learning framework to protect the privacy of
vehicle data.
Applying GRU model to FL framework to obtain accurate TFP.
In order to prevent malicious attackers from damaging the urban traffic
flow management system, a decentralized FL framework has been
implemented using blockchain to defend against poisoning attacks.
Contrib
utions
Contribution of the paper
Using local differential privacy technology to protect privacy in vehicle
location sharing.
5. Future plans &
References
Conduct experiments and improve ideas, with a preliminary logic.
The second semester of the first year of graduate school
Complete your own experiment and prepare the preliminary draft of the paper.
The first semester of the second year of graduate school
Successfully issued the paper.
The second semester of the second year of graduate school
Successfully graduated.
Third year of graduate school
My own graduate plan
References
[1] Y. Lv, Y. Duan, W. Kang, Z. Li, F.Y. Wang, Traffic flow prediction with big data: a deep learning approach, IEEE
Trans. Intell. Transp. Syst. 16 (2014) 865–873.
[2] R. Vinayakumar, M. Alazab, S. Srinivasan, Q. Pham, S.K. Padannayil, K. Simran, A visualized botnet detection
system based deep learning for the internet of things networks of smart cities, IEEE Trans. Ind. Appl. 56 (2020)
4436–4456.
[3] X. Yang, et al., Deep relative attributes, IEEE Trans. Multimed. 18 (2016) 1832–1842.
[4] M.S. Hossain, M. Al-Hammadi, G. Muhammad, Automatic fruit classification using deep learning for
industrial applications, IEEE Trans. Ind. Inf. 15 (2019) 1027–1034.
[5] L. Lyu, J. Yu, K. Nandakumar, Y. Li, X. Ma, J. Jin, H. Yu, K.S. Ng, Towards fair and privacy-preserving federated
deep models, IEEE Trans. Parallel Distrib. Syst. 31 (2020) 2524–2541.
[6] K. Cho, B. Van Merriënboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, Y. Bengio, Learning phrase
representations using rnn encoder– decoder for statistical machine translation, 2014, arXiv preprint arXiv:
1406.1078.
TH
A
N
KS
2 0 2 4 年 03月
T h a n k y o u f o r w a t c h i n g

More Related Content

Similar to Privacy-preserving blockchain-based federated learning for traffic flow prediction

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a survey
eSAT Publishing House
 
SECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBAC
SECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBACSECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBAC
SECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBAC
ijistjournal
 
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLESIEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
Ingenious Techno Solution
 
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...
Sara Perez
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Ijcem Journal
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Ijcem Journal
 
C0848062312
C0848062312C0848062312
C0848062312
9000092400
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
guesta67d4a
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
Dr. Amarjeet Singh
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
Dr. Amarjeet Singh
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
pijans
 
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
pijans
 
Classification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceClassification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of Service
IRJET Journal
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
Editor IJARCET
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
Editor IJARCET
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
IJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
IJCNCJournal
 
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
ijngnjournal
 

Similar to Privacy-preserving blockchain-based federated learning for traffic flow prediction (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a survey
 
SECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBAC
SECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBACSECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBAC
SECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBAC
 
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLESIEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
 
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
 
C0848062312
C0848062312C0848062312
C0848062312
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communica...
 
Classification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceClassification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of Service
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
 

Recently uploaded

SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆
SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆
SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆
Sérgio Sacani
 
Introduction_Ch_01_Biotech Biotechnology course .pptx
Introduction_Ch_01_Biotech Biotechnology course .pptxIntroduction_Ch_01_Biotech Biotechnology course .pptx
Introduction_Ch_01_Biotech Biotechnology course .pptx
QusayMaghayerh
 
11.1 Role of physical biological in deterioration of grains.pdf
11.1 Role of physical biological in deterioration of grains.pdf11.1 Role of physical biological in deterioration of grains.pdf
11.1 Role of physical biological in deterioration of grains.pdf
PirithiRaju
 
Signatures of wave erosion in Titan’s coasts
Signatures of wave erosion in Titan’s coastsSignatures of wave erosion in Titan’s coasts
Signatures of wave erosion in Titan’s coasts
Sérgio Sacani
 
Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...
Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...
Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...
frank0071
 
23PH301 - Optics - Unit 1 - Optical Lenses
23PH301 - Optics  -  Unit 1 - Optical Lenses23PH301 - Optics  -  Unit 1 - Optical Lenses
23PH301 - Optics - Unit 1 - Optical Lenses
RDhivya6
 
BIRDS DIVERSITY OF SOOTEA BISWANATH ASSAM.ppt.pptx
BIRDS  DIVERSITY OF SOOTEA BISWANATH ASSAM.ppt.pptxBIRDS  DIVERSITY OF SOOTEA BISWANATH ASSAM.ppt.pptx
BIRDS DIVERSITY OF SOOTEA BISWANATH ASSAM.ppt.pptx
goluk9330
 
The cost of acquiring information by natural selection
The cost of acquiring information by natural selectionThe cost of acquiring information by natural selection
The cost of acquiring information by natural selection
Carl Bergstrom
 
Direct Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart AgricultureDirect Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart Agriculture
International Food Policy Research Institute- South Asia Office
 
Post translation modification by Suyash Garg
Post translation modification by Suyash GargPost translation modification by Suyash Garg
Post translation modification by Suyash Garg
suyashempire
 
HUMAN EYE By-R.M Class 10 phy best digital notes.pdf
HUMAN EYE By-R.M Class 10 phy best digital notes.pdfHUMAN EYE By-R.M Class 10 phy best digital notes.pdf
HUMAN EYE By-R.M Class 10 phy best digital notes.pdf
Ritik83251
 
Farming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptxFarming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptx
Frédéric Baudron
 
gastroretentive drug delivery system-PPT.pptx
gastroretentive drug delivery system-PPT.pptxgastroretentive drug delivery system-PPT.pptx
gastroretentive drug delivery system-PPT.pptx
Shekar Boddu
 
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...
Sérgio Sacani
 
Compositions of iron-meteorite parent bodies constrainthe structure of the pr...
Compositions of iron-meteorite parent bodies constrainthe structure of the pr...Compositions of iron-meteorite parent bodies constrainthe structure of the pr...
Compositions of iron-meteorite parent bodies constrainthe structure of the pr...
Sérgio Sacani
 
Embracing Deep Variability For Reproducibility and Replicability
Embracing Deep Variability For Reproducibility and ReplicabilityEmbracing Deep Variability For Reproducibility and Replicability
Embracing Deep Variability For Reproducibility and Replicability
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
Reaching the age of Adolescence- Class 8
Reaching the age of Adolescence- Class 8Reaching the age of Adolescence- Class 8
Reaching the age of Adolescence- Class 8
abhinayakamasamudram
 
Flow chart.pdf LIFE SCIENCES CSIR UGC NET CONTENT
Flow chart.pdf  LIFE SCIENCES CSIR UGC NET CONTENTFlow chart.pdf  LIFE SCIENCES CSIR UGC NET CONTENT
Flow chart.pdf LIFE SCIENCES CSIR UGC NET CONTENT
savindersingh16
 
Lattice Defects in ionic solid compound.pptx
Lattice Defects in ionic solid compound.pptxLattice Defects in ionic solid compound.pptx
Lattice Defects in ionic solid compound.pptx
DrRajeshDas
 
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
Scintica Instrumentation
 

Recently uploaded (20)

SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆
SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆
SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆
 
Introduction_Ch_01_Biotech Biotechnology course .pptx
Introduction_Ch_01_Biotech Biotechnology course .pptxIntroduction_Ch_01_Biotech Biotechnology course .pptx
Introduction_Ch_01_Biotech Biotechnology course .pptx
 
11.1 Role of physical biological in deterioration of grains.pdf
11.1 Role of physical biological in deterioration of grains.pdf11.1 Role of physical biological in deterioration of grains.pdf
11.1 Role of physical biological in deterioration of grains.pdf
 
Signatures of wave erosion in Titan’s coasts
Signatures of wave erosion in Titan’s coastsSignatures of wave erosion in Titan’s coasts
Signatures of wave erosion in Titan’s coasts
 
Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...
Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...
Juaristi, Jon. - El canon espanol. El legado de la cultura española a la civi...
 
23PH301 - Optics - Unit 1 - Optical Lenses
23PH301 - Optics  -  Unit 1 - Optical Lenses23PH301 - Optics  -  Unit 1 - Optical Lenses
23PH301 - Optics - Unit 1 - Optical Lenses
 
BIRDS DIVERSITY OF SOOTEA BISWANATH ASSAM.ppt.pptx
BIRDS  DIVERSITY OF SOOTEA BISWANATH ASSAM.ppt.pptxBIRDS  DIVERSITY OF SOOTEA BISWANATH ASSAM.ppt.pptx
BIRDS DIVERSITY OF SOOTEA BISWANATH ASSAM.ppt.pptx
 
The cost of acquiring information by natural selection
The cost of acquiring information by natural selectionThe cost of acquiring information by natural selection
The cost of acquiring information by natural selection
 
Direct Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart AgricultureDirect Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart Agriculture
 
Post translation modification by Suyash Garg
Post translation modification by Suyash GargPost translation modification by Suyash Garg
Post translation modification by Suyash Garg
 
HUMAN EYE By-R.M Class 10 phy best digital notes.pdf
HUMAN EYE By-R.M Class 10 phy best digital notes.pdfHUMAN EYE By-R.M Class 10 phy best digital notes.pdf
HUMAN EYE By-R.M Class 10 phy best digital notes.pdf
 
Farming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptxFarming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptx
 
gastroretentive drug delivery system-PPT.pptx
gastroretentive drug delivery system-PPT.pptxgastroretentive drug delivery system-PPT.pptx
gastroretentive drug delivery system-PPT.pptx
 
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...
Candidate young stellar objects in the S-cluster: Kinematic analysis of a sub...
 
Compositions of iron-meteorite parent bodies constrainthe structure of the pr...
Compositions of iron-meteorite parent bodies constrainthe structure of the pr...Compositions of iron-meteorite parent bodies constrainthe structure of the pr...
Compositions of iron-meteorite parent bodies constrainthe structure of the pr...
 
Embracing Deep Variability For Reproducibility and Replicability
Embracing Deep Variability For Reproducibility and ReplicabilityEmbracing Deep Variability For Reproducibility and Replicability
Embracing Deep Variability For Reproducibility and Replicability
 
Reaching the age of Adolescence- Class 8
Reaching the age of Adolescence- Class 8Reaching the age of Adolescence- Class 8
Reaching the age of Adolescence- Class 8
 
Flow chart.pdf LIFE SCIENCES CSIR UGC NET CONTENT
Flow chart.pdf  LIFE SCIENCES CSIR UGC NET CONTENTFlow chart.pdf  LIFE SCIENCES CSIR UGC NET CONTENT
Flow chart.pdf LIFE SCIENCES CSIR UGC NET CONTENT
 
Lattice Defects in ionic solid compound.pptx
Lattice Defects in ionic solid compound.pptxLattice Defects in ionic solid compound.pptx
Lattice Defects in ionic solid compound.pptx
 
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
(June 12, 2024) Webinar: Development of PET theranostics targeting the molecu...
 

Privacy-preserving blockchain-based federated learning for traffic flow prediction

  • 2. Research background Research ideas Research contents Contributions 1 2 3 4 Future plans & References 5 Contents
  • 4. Research background Background: As accurate and timely traffic flow information is extremely important for traffic management, traffic flow prediction has become a vital component of intelligent transportation systems. However, existing traffic flow prediction methods based on centralized machine learning need to gather raw data for model training, which involves serious privacy exposure risks.
  • 6. - - - - - - The process of proposing ideas
  • 8. 1. Fedrate Learning The specific implementation of ideas The goal of this paper is to achieve accurate and timely TFP through a lightweight federated learning scheme. Using GRU neural network as a lightweight technology to predict future traffic flow and implementing the application of FL in TFP systems.
  • 9. Establish a dedicated consortium blockchain and implement a decentralized TFP system using FL. For the convenience of system functionality, we first select a certain number of RSUs as authorized miners. To this end, upgrade the hardware configuration of these RSUs to have powerful computing, storage, and communication capabilities to verify local model updates submitted by distributed vehicles and identify low accuracy and unreliable updates. Through carefully designed consensus algorithms, they generate a new block containing qualified local model update records. 2. Distributed TFP Systems and Federated Learning The specific implementation of ideas
  • 10. Use a consensus algorithm called dBFT to execute the consensus process among miners; Only qualified local model updates are aggregated to generate the latest global model.In this consensus process, false or low-quality local model updates are not integrated into the global model training, which improves the FL performance and reduces poisoning attacks. Therefore, the proposed consortium blockchain with a dBFT-based consensus algorithm ensures the secure, reliable, and privacy-preserving characteristics of the FL-based TFP method for ITS. The specific implementation of ideas 3. Design of consortium blockchain
  • 11.
  • 12. step 1: Initialization Step 2: Leader Selection Step 3: Local model training Step 4: Model update verification The specific implementation steps of consensus algorithm Step 5: Candidate block verification Step 6: Global model training
  • 13. The specific implementation of ideas 4.Local Differential Privacy Technology for Protecting Vehicle Communication Privacy in TFP Definition 1: Participants should add random perturbations to the data. In order to protect the privacy of vehicle location information in TFP tasks, a Gaussian mechanism is used to add carefully designed noise to interfere with the location information. Firstly, define the Gaussian mechanism as defined in Definition 2: Definition 2:Gaussian mechanism Definition 3:Vehicle information after disturbance
  • 14. Experiment Performance comparison of MAE, MSE, and RMSE, For federated learning-based GRU model, LSTM model, SAE model, And SVM model.
  • 17. Introduced a federated learning framework to protect the privacy of vehicle data. Applying GRU model to FL framework to obtain accurate TFP. In order to prevent malicious attackers from damaging the urban traffic flow management system, a decentralized FL framework has been implemented using blockchain to defend against poisoning attacks. Contrib utions Contribution of the paper Using local differential privacy technology to protect privacy in vehicle location sharing.
  • 18. 5. Future plans & References
  • 19. Conduct experiments and improve ideas, with a preliminary logic. The second semester of the first year of graduate school Complete your own experiment and prepare the preliminary draft of the paper. The first semester of the second year of graduate school Successfully issued the paper. The second semester of the second year of graduate school Successfully graduated. Third year of graduate school My own graduate plan
  • 20. References [1] Y. Lv, Y. Duan, W. Kang, Z. Li, F.Y. Wang, Traffic flow prediction with big data: a deep learning approach, IEEE Trans. Intell. Transp. Syst. 16 (2014) 865–873. [2] R. Vinayakumar, M. Alazab, S. Srinivasan, Q. Pham, S.K. Padannayil, K. Simran, A visualized botnet detection system based deep learning for the internet of things networks of smart cities, IEEE Trans. Ind. Appl. 56 (2020) 4436–4456. [3] X. Yang, et al., Deep relative attributes, IEEE Trans. Multimed. 18 (2016) 1832–1842. [4] M.S. Hossain, M. Al-Hammadi, G. Muhammad, Automatic fruit classification using deep learning for industrial applications, IEEE Trans. Ind. Inf. 15 (2019) 1027–1034. [5] L. Lyu, J. Yu, K. Nandakumar, Y. Li, X. Ma, J. Jin, H. Yu, K.S. Ng, Towards fair and privacy-preserving federated deep models, IEEE Trans. Parallel Distrib. Syst. 31 (2020) 2524–2541. [6] K. Cho, B. Van Merriënboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, Y. Bengio, Learning phrase representations using rnn encoder– decoder for statistical machine translation, 2014, arXiv preprint arXiv: 1406.1078.
  • 21. TH A N KS 2 0 2 4 年 03月 T h a n k y o u f o r w a t c h i n g