End-to-end deep auto-encoder for segmenting a moving object with limited tra...IJECEIAES
Deep learning-based approaches have been widely used in various applications, including segmentation and classification. However, a large amount of data is required to train such techniques. Indeed, in the surveillance video domain, there are few accessible data due to acquisition and experiment complexity. In this paper, we propose an end-to-end deep auto-encoder system for object segmenting from surveillance videos. Our main purpose is to enhance the process of distinguishing the foreground object when only limited data are available. To this end, we propose two approaches based on transfer learning and multi-depth auto-encoders to avoid over-fitting by combining classical data augmentation and principal component analysis (PCA) techniques to improve the quality of training data. Our approach achieves good results outperforming other popular models, which used the same principle of training with limited data. In addition, a detailed explanation of these techniques and some recommendations are provided. Our methodology constitutes a useful strategy for increasing samples in the deep learning domain and can be applied to improve segmentation accuracy. We believe that our strategy has a considerable interest in various applications such as medical and biological fields, especially in the early stages of experiments where there are few samples.
A Generic Model for Student Data Analytic Web Service (SDAWS)Editor IJCATR
Any university management system accumulates a cartload of data and analytics can be applied on it to gather useful
information to aid the academic decision making process. This paper is a novel attempt to demonstrate the significance of a data
analytic web service in the education domain. This can be integrated with the University Management System or any other application
of the university easily. Analytics as a web service offers much benefits over the traditional analysis methods. The web service can be
hosted on a web server and accessed over the internet or on to the private cloud of the campus. The data from various courses from
different departments can be uploaded and analyzed easily. In this paper we design a web service framework to be used in educational
data mining that provide analysis as a service.
End-to-end deep auto-encoder for segmenting a moving object with limited tra...IJECEIAES
Deep learning-based approaches have been widely used in various applications, including segmentation and classification. However, a large amount of data is required to train such techniques. Indeed, in the surveillance video domain, there are few accessible data due to acquisition and experiment complexity. In this paper, we propose an end-to-end deep auto-encoder system for object segmenting from surveillance videos. Our main purpose is to enhance the process of distinguishing the foreground object when only limited data are available. To this end, we propose two approaches based on transfer learning and multi-depth auto-encoders to avoid over-fitting by combining classical data augmentation and principal component analysis (PCA) techniques to improve the quality of training data. Our approach achieves good results outperforming other popular models, which used the same principle of training with limited data. In addition, a detailed explanation of these techniques and some recommendations are provided. Our methodology constitutes a useful strategy for increasing samples in the deep learning domain and can be applied to improve segmentation accuracy. We believe that our strategy has a considerable interest in various applications such as medical and biological fields, especially in the early stages of experiments where there are few samples.
A Generic Model for Student Data Analytic Web Service (SDAWS)Editor IJCATR
Any university management system accumulates a cartload of data and analytics can be applied on it to gather useful
information to aid the academic decision making process. This paper is a novel attempt to demonstrate the significance of a data
analytic web service in the education domain. This can be integrated with the University Management System or any other application
of the university easily. Analytics as a web service offers much benefits over the traditional analysis methods. The web service can be
hosted on a web server and accessed over the internet or on to the private cloud of the campus. The data from various courses from
different departments can be uploaded and analyzed easily. In this paper we design a web service framework to be used in educational
data mining that provide analysis as a service.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Digital Security by Design: ISCF Digital Security by Design Research Projects...KTN
KTN ran a collaborators' workshop on 26 September 2019 in London to explain more about the Digital Security by Design Challenge announced by the government.
The Digital Security by Design challenge has been recently announced by the Department for Business, Energy & Industrial Strategy (BEIS). This challenge, amounting to £70 million of government funding over 5 years, was delivered by UK Research and Innovation (UKRI) through the Industrial Strategy Challenge Fund (ISCF).
This Collaborators' Workshop provides an opportunity to hear more details of the challenge and forthcoming competitions.
A Scoping Workshop for this challenge was held on 30th May: http://ow.ly/oz6230pHlGl
Find out more about the Defence and Security Interest Group at https://ktn-uk.co.uk/interests/defence-security
Join the Defence and Security Interest Group at https://www.linkedin.com/groups/8584397 or Follow KTN_UK Defence group on Twitter https://twitter.com/KTNUK_Defence
Slides presenting preliminary overview of thesis work presented at the International Conference on Electronic Learning in the Workplace at Columbia University on June 11, 2010.
Presentation by Hugo Leroux and Liming Zhu, CSIRO, to the 'Unlocking value from publicly funded Clinical Research Data' workshop, cohosted by ARDC and CSIRO at ANU on 6 March 2019.
A Model for Encryption of a Text Phrase using Genetic Algorithmijtsrd
"In any organization it is an essential task to protect the data from unauthorized users. Information Systems hardware, software, networks, and data resources need to be protected and secured to ensure quality, performance, and integrity. Security management deals with the accuracy, integrity, and safety of information resources. When effective security measures are in place, they can reduce errors, fraud, and losses. In the current work, the authors have proposed a model for encryption of a text phrase employing genetic algorithm. The entropy inherently available in genetic algorithm is exploited for introducing chaos in a text phrase thereby rendering it unreadable. The no of cross over points and mutation points decides the strength of the algorithm. The prototype of the model is implemented for testing the operational feasibility of the model and the few test cases are presented Dr. Poornima G. Naik | Mr. Pandurang M. More | Dr. Girish R. Naik ""A Model for Encryption of a Text Phrase using Genetic Algorithm"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Fostering Innovation, Integration and Inclusion Through Interdisciplinary Practices in Management , March 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23063.pdf
Paper URL: https://www.ijtsrd.com/computer-science/data-processing/23063/a-model-for-encryption-of-a-text-phrase-using-genetic-algorithm/dr-poornima-g-naik"
this ppt about machine learning method federated learning that how helps to train the model without sharing the personal information from local devices
Big data cloud-based recommendation system using NLP techniques with machine ...TELKOMNIKA JOURNAL
Recommendation systems (RS) are crucial for social networking sites. Without it, finding precise products is harder. However, existing systems lack adequate efficiency, especially with big data. This paper presents a prototype cloud-based recommendation system for processing big data. The proposed work is implemented by utilizing the matrix factorization method with three approaches. In the first approach, singular value decomposition (SVD) is used, which is an old and traditional recommendation technique. The second recommendation approach is fine-tuned using the alternating least squares (ALS) algorithm with Apache Spark. Finally, the deep neural network (DNN) algorithm is utilized with TensorFlow. This study solves the challenge of handling large-scale datasets in the collaborative filtering (CF) technique after tuning the algorithms by adjusting the parameters in the second approach, which uses machine learning, as well as in the third approach, which uses deep learning. Furthermore, the results of these two approaches outperformed conventional techniques and achieved an acceptable computational time. The dataset size is about 1.5 GB and it is collected from the Goodreads website API. Moreover, the Hadoop distributed file system (HDFS) is used as cloud storage instead of the computer’s local disk for handling larger dataset sizes in the future.
A study secure multi authentication based data classification model in cloud ...IJAAS Team
Abstract: Cloud computing is the most popular term among enterprises and news. The concepts come true because of fast internet bandwidth and advanced cooperation technology. Resources on the cloud can be accessed through internet without self built infrastructure. Cloud computing is effectively managing the security in the cloud applications. Data classification is a machine learning technique used to predict the class of the unclassified data. Data mining uses different tools to know the unknown, valid patterns and relationshipsin the dataset. These tools are mathematical algorithms, statistical models and Machine Learning (ML) algorithms. In this paper author uses improved Bayesian technique to classify the data and encrypt the sensitive data using hybrid stagnography. The encrypted and non encrypted sensitive data is sent to cloud environment and evaluate the parameters with different encryption algorithms.
Eric Nyberg's Presentation "From Jeopardy! To Cognitive Agents: Effective Learning in the Wild" on Cognitive Systems Institute Group Speaker Series July 9, 2015
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Digital Security by Design: ISCF Digital Security by Design Research Projects...KTN
KTN ran a collaborators' workshop on 26 September 2019 in London to explain more about the Digital Security by Design Challenge announced by the government.
The Digital Security by Design challenge has been recently announced by the Department for Business, Energy & Industrial Strategy (BEIS). This challenge, amounting to £70 million of government funding over 5 years, was delivered by UK Research and Innovation (UKRI) through the Industrial Strategy Challenge Fund (ISCF).
This Collaborators' Workshop provides an opportunity to hear more details of the challenge and forthcoming competitions.
A Scoping Workshop for this challenge was held on 30th May: http://ow.ly/oz6230pHlGl
Find out more about the Defence and Security Interest Group at https://ktn-uk.co.uk/interests/defence-security
Join the Defence and Security Interest Group at https://www.linkedin.com/groups/8584397 or Follow KTN_UK Defence group on Twitter https://twitter.com/KTNUK_Defence
Slides presenting preliminary overview of thesis work presented at the International Conference on Electronic Learning in the Workplace at Columbia University on June 11, 2010.
Presentation by Hugo Leroux and Liming Zhu, CSIRO, to the 'Unlocking value from publicly funded Clinical Research Data' workshop, cohosted by ARDC and CSIRO at ANU on 6 March 2019.
A Model for Encryption of a Text Phrase using Genetic Algorithmijtsrd
"In any organization it is an essential task to protect the data from unauthorized users. Information Systems hardware, software, networks, and data resources need to be protected and secured to ensure quality, performance, and integrity. Security management deals with the accuracy, integrity, and safety of information resources. When effective security measures are in place, they can reduce errors, fraud, and losses. In the current work, the authors have proposed a model for encryption of a text phrase employing genetic algorithm. The entropy inherently available in genetic algorithm is exploited for introducing chaos in a text phrase thereby rendering it unreadable. The no of cross over points and mutation points decides the strength of the algorithm. The prototype of the model is implemented for testing the operational feasibility of the model and the few test cases are presented Dr. Poornima G. Naik | Mr. Pandurang M. More | Dr. Girish R. Naik ""A Model for Encryption of a Text Phrase using Genetic Algorithm"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Fostering Innovation, Integration and Inclusion Through Interdisciplinary Practices in Management , March 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23063.pdf
Paper URL: https://www.ijtsrd.com/computer-science/data-processing/23063/a-model-for-encryption-of-a-text-phrase-using-genetic-algorithm/dr-poornima-g-naik"
this ppt about machine learning method federated learning that how helps to train the model without sharing the personal information from local devices
Big data cloud-based recommendation system using NLP techniques with machine ...TELKOMNIKA JOURNAL
Recommendation systems (RS) are crucial for social networking sites. Without it, finding precise products is harder. However, existing systems lack adequate efficiency, especially with big data. This paper presents a prototype cloud-based recommendation system for processing big data. The proposed work is implemented by utilizing the matrix factorization method with three approaches. In the first approach, singular value decomposition (SVD) is used, which is an old and traditional recommendation technique. The second recommendation approach is fine-tuned using the alternating least squares (ALS) algorithm with Apache Spark. Finally, the deep neural network (DNN) algorithm is utilized with TensorFlow. This study solves the challenge of handling large-scale datasets in the collaborative filtering (CF) technique after tuning the algorithms by adjusting the parameters in the second approach, which uses machine learning, as well as in the third approach, which uses deep learning. Furthermore, the results of these two approaches outperformed conventional techniques and achieved an acceptable computational time. The dataset size is about 1.5 GB and it is collected from the Goodreads website API. Moreover, the Hadoop distributed file system (HDFS) is used as cloud storage instead of the computer’s local disk for handling larger dataset sizes in the future.
A study secure multi authentication based data classification model in cloud ...IJAAS Team
Abstract: Cloud computing is the most popular term among enterprises and news. The concepts come true because of fast internet bandwidth and advanced cooperation technology. Resources on the cloud can be accessed through internet without self built infrastructure. Cloud computing is effectively managing the security in the cloud applications. Data classification is a machine learning technique used to predict the class of the unclassified data. Data mining uses different tools to know the unknown, valid patterns and relationshipsin the dataset. These tools are mathematical algorithms, statistical models and Machine Learning (ML) algorithms. In this paper author uses improved Bayesian technique to classify the data and encrypt the sensitive data using hybrid stagnography. The encrypted and non encrypted sensitive data is sent to cloud environment and evaluate the parameters with different encryption algorithms.
Eric Nyberg's Presentation "From Jeopardy! To Cognitive Agents: Effective Learning in the Wild" on Cognitive Systems Institute Group Speaker Series July 9, 2015
Transforming Brand Perception and Boosting Profitabilityaaryangarg12
In today's digital era, the dynamics of brand perception, consumer behavior, and profitability have been profoundly reshaped by the synergy of branding, social media, and website design. This research paper investigates the transformative power of these elements in influencing how individuals perceive brands and products and how this transformation can be harnessed to drive sales and profitability for businesses.
Through an exploration of brand psychology and consumer behavior, this study sheds light on the intricate ways in which effective branding strategies, strategic social media engagement, and user-centric website design contribute to altering consumers' perceptions. We delve into the principles that underlie successful brand transformations, examining how visual identity, messaging, and storytelling can captivate and resonate with target audiences.
Methodologically, this research employs a comprehensive approach, combining qualitative and quantitative analyses. Real-world case studies illustrate the impact of branding, social media campaigns, and website redesigns on consumer perception, sales figures, and profitability. We assess the various metrics, including brand awareness, customer engagement, conversion rates, and revenue growth, to measure the effectiveness of these strategies.
The results underscore the pivotal role of cohesive branding, social media influence, and website usability in shaping positive brand perceptions, influencing consumer decisions, and ultimately bolstering sales and profitability. This paper provides actionable insights and strategic recommendations for businesses seeking to leverage branding, social media, and website design as potent tools to enhance their market position and financial success.
Storytelling For The Web: Integrate Storytelling in your Design ProcessChiara Aliotta
In this slides I explain how I have used storytelling techniques to elevate websites and brands and create memorable user experiences. You can discover practical tips as I showcase the elements of good storytelling and its applied to some examples of diverse brands/projects..
Fonts play a crucial role in both User Interface (UI) and User Experience (UX) design. They affect readability, accessibility, aesthetics, and overall user perception.
Technoblade The Legacy of a Minecraft Legend.Techno Merch
Technoblade, born Alex on June 1, 1999, was a legendary Minecraft YouTuber known for his sharp wit and exceptional PvP skills. Starting his channel in 2013, he gained nearly 11 million subscribers. His private battle with metastatic sarcoma ended in June 2022, but his enduring legacy continues to inspire millions.
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page pmgdscunsri
Figma is a cloud-based design tool widely used by designers for prototyping, UI/UX design, and real-time collaboration. With features such as precision pen tools, grid system, and reusable components, Figma makes it easy for teams to work together on design projects. Its flexibility and accessibility make Figma a top choice in the digital age.
Connect Conference 2022: Passive House - Economic and Environmental Solution...TE Studio
Passive House: The Economic and Environmental Solution for Sustainable Real Estate. Lecture by Tim Eian of TE Studio Passive House Design in November 2022 in Minneapolis.
- The Built Environment
- Let's imagine the perfect building
- The Passive House standard
- Why Passive House targets
- Clean Energy Plans?!
- How does Passive House compare and fit in?
- The business case for Passive House real estate
- Tools to quantify the value of Passive House
- What can I do?
- Resources
1. Bangalore Institute of Technology
K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Information Science &
Engineering
Presented By Under the Guidance of
1BI20IS052 Pavithra N
Manoj B Kulkarni Dept of ISE , BIT
“Visual Object Detection for Privacy-Preserving
Federated Learning”
3. INTRODUCTION
• The challenge of building visual object detection models on large training datasets
due to privacy concerns and difficulties in collecting and sharing data across
organizations.
• The use of Federated Learning (FL) as a distributed machine learning paradigm that
allows participants to train local models while ensuring data privacy and security.
• The proposal of FedVisionBC, a blockchain-based federated learning system for
visual object detection, to overcome single point of failure, model poisoning attacks,
and membership inference attacks in traditional federated learning
4. K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
1. Title: YOLOv3: An Incremental Improvement
• Authors: Joseph Redmon, Ali Farhadi
• Year: 2019 (arXiv)
• Proposed Idea: introduce updates and improvements to the YOLOv3 object
detection algorithm. These enhancements include changes to the bounding box
prediction method, the introduction of a new network architecture called Darknet-53,
and comparisons with other detection methods
LITERATURE SURVEY
5. K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
• Methodology
YOLOv3 object detection algorithm involves making design changes, training a
new network, using anchor boxes for bounding box prediction, and implementing a
feature extractor network called Darknet-53
• Limitations
• May not perform well real-world scenarios
• Performs well only in COCO dataset
• It doesn’t completely overcome the limitations of YOLOv3
6. K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
2. Title: Federated Machine Learning: Concept and Applications
• Authors: Qiang Yang, Yang Liu, Tianjian Chen, Yongxin Tong
• Year: 2020 (arXiv)
• Proposed Idea: Federated Machine Learning enables training models across
decentralized devices while keeping data local, preserving privacy. Applications
span healthcare for secure patient data analysis, energy sector optimization in smart
grids, and improving user experience in mobile devices without compromising
privacy.
7. K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
Methodology:-
• Vertical Federated Learning System: This methodology involves collaborating on a model where each
party holds different features of the data. For example, one party might have information about
customer demographics while another has purchasing history.
• Horizontal Federated Learning System: Here, multiple parties possess similar data types but different
samples. For instance, different hospitals might have patient records for different regions. Horizontal
federated learning enables training a model across these datasets without centralizing the data,
preserving data locality and privacy.
• Federated Transfer Learning: This approach combines transfer learning with federated learning. A
pre-trained model on one dataset (source domain) is fine-tuned on another dataset distributed across
multiple parties (target domain), leveraging knowledge from the source domain to improve learning
efficiency and performance in the target domain while respecting data privacy.
8. Architecture
Limitations:-
• Data Fragment: Refers to the challenge of data being distributed across multiple parties, leading to fragmentation.
• Heterogeneous Data: Describes the scenario where data across different parties vary significantly in terms of
format, structure, or semantics.
• Security and Privacy Concerns: In federated learning, ensuring the security and privacy of data is paramount.
Techniques such as encryption, differential privacy, and secure aggregation are employed to protect sensitive
information and prevent unauthorized access or leakage during model training and inference.
9. K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
3. Title: Blockchain and Federated Learning for Privacy-Preserved Data Sharing in
Industrial IoT
• Authors: Yunlong Lu, Yueyue Dai, Yan Zhang
• Year: June 2021 (IEEE)
• Proposed Idea: Blockchain and federated learning to create a secure data sharing
architecture that maintains privacy by sharing data models instead of actual data,
achieving high accuracy, efficiency, and security for distributed multiple parties.
• Methodology
It consists of two modules: a permissioned blockchain module and a federated learning
module. The permissioned blockchain establishes secure connections among all end
IoT devices, while the federated learning module maintains data privacy by sharing the
data model instead of the actual data.
11. K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
4. Title: Contour-Aware Recurrent Cross Constraint Network for Salient Object
Detection
• Authors: Cuili Yao, Yuqiu Kong, Lin Feng, Bo Jin
• Year: Dec 2022 (IEEE)
• Proposed Idea: The Contour-Aware Recurrent Cross Constraint Network (CARCCNet),
which is a fully convolutional neural network designed to improve object contour
detection in salient object detection tasks. The network incorporates recurrent cross
constraint modules to enhance the detection of object contours.
12. K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
• Methodology
It involves training and evaluating the proposed CARCCNet on five popular salient
object detection datasets, describing the network architecture and each module,
conducting ablation study experiments, and presenting implementation and
evaluation metrics results compared with other state-of-the-art SOD methods.
• Limitations
• It doesn’t show same performance for different salient object data set
• Computational complexity of real-time applications
13. 5. Title: Blockchain-Federated-Learning and Deep Learning Models for COVID-19
Detection Using CT Imaging.
• Authors: Rajesh Kumar, Abdullah Aman Khan, Jay Kumar.
• Year: July 2022 (IEEE)
• Proposed Idea: is a device-aware DNN-based object detection offloading
framework for mobile edge devices. It aims to optimize resource utilization by
considering factors such as computing power and network bandwidth, and uses a
greedy algorithm to find the optimal offloading decision in polynomial time.
15. Methodology:
• Problem Formulation: This step involves precisely defining the task or objective of the study, including
identifying the problem to be solved, specifying the input and output variables, and delineating any
constraints or requirements.
• Greedy Algorithm: A heuristic approach that makes locally optimal choices at each step with the hope of
finding a global optimum. Greedy algorithms are often used when solving optimization problems and can
offer simplicity and efficiency, but they may not always guarantee the best solution.
• Experimental Validation: This phase involves designing and conducting experiments to assess the
performance and effectiveness of the proposed methodology or algorithm. Experimental validation
provides empirical evidence to support the claims and conclusions drawn from the study.
16. K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
PROPOSED SYSTEM
• The proposed system is called FedVisionBC.
• It uses an aggregation node and a verification node instead of a central server to
solve the single point of failure problem.
• It also employs encryption techniques, verification nodes, and smart contracts to
resist model poisoning attacks.
• The system integrates the Ethereum blockchain, federated learning, differential
privacy technology, smart contracts, and Interplanetary File System (IPFS).
• It uses the ADPFedAvg algorithm to prevent membership inference attacks using
user-level differential privacy technology and the federated average algorithm.
18. ALGORITHMS
1. FedAvg (Federated Average Algorithm):
• FedAvg is a key algorithm in federated learning. It facilitates participants to train local models on their
data while preserving data privacy and security.
• It encompasses stages such as initialization, local model training, validation, aggregation, and update,
ensuring a collaborative approach to model development.
• It mitigates privacy risks by separating model training from direct access to raw training data.
• This decoupling ensures that sensitive information is not exposed during the learning process.
19. 2. ADPFedAvg (Adaptive Differential Privacy Federated Learning Algorithm), :
• ADPFedAvg introduces user-level differential privacy technology and combines it with adaptive
clipping technology
• The algorithm augments global model updates, obtained by averaging local updates, with Gaussian
noise. This addition contributes to the privacy protection of the global model while maintaining its
utility.
20.
21. Methodology
•Blockchain Integration: The system integrates blockchain technology to address the single point of failure
in traditional federated learning, ensuring a decentralized and secure environment for model aggregation and
updates.
•Privacy Protection: The methodology focuses on safeguarding user privacy by implementing encryption,
digital signature technology, and verification nodes to reduce the risk of poisoning attacks in the federated
learning process.
•Smart Contracts: A smart contract is designed within the framework to automate protocol execution and
manage interactions between nodes involved in the federated object detection system, ensuring secure and
efficient operations.
•Intelligent Aggregation: An intelligent aggregation method is employed to evaluate and select optimal
models without leaving operational traces, enhancing the efficiency and effectiveness of model selection in
the federated learning process.
24. K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
REFERENCES
[1] J. Zhang, J. Zhou, J. Guo and X. Sun, "Visual Object Detection for Privacy-Preserving Federated Learning," in IEEE Access, vol.
11, pp. 33324-33335, 2023
[2] Joseph Redmon, Ali Farhadi "YOLOv3: An Incremental Improvement" arXiv:1804.02767v1 [cs.CV] 8 Apr 2019.
[3] Qiang Yang,Yang Liu, Tianjian Chen ,Yongxin Tong “Federated Machine Learning:Concept and Applications”
arXiv:1902.04885v1 [cs.AI] 13 Feb 2020
[4] Yunlong Lu, Yueyue Dai, Yan Zhang “Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT”
IEEE Transactions on Industrial Informatics, Vol. 16, No. 6, June 2021
[5] Cuili Yao, Yuqiu Kong, Lin Feng, Bo Jin “Contour-Aware Recurrent Cross Constraint Network for Salient Object Detection” IEEE
Access, December 16, 2022.
[6] Rajesh Kumar, Abdullah Aman Khan, Jay Kumar “Blockchain-Federated-Learning and Deep Learning Models for COVID-19
Detection Using CT Imaging” IEEE Sensors Journal, Vol. 21, No. 14, July 15, 2022
25. K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
THANK YOU