SlideShare a Scribd company logo
Bangalore Institute of Technology
K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Information Science &
Engineering
Presented By Under the Guidance of
1BI20IS052 Pavithra N
Manoj B Kulkarni Dept of ISE , BIT
“Visual Object Detection for Privacy-Preserving
Federated Learning”
• Introduction
• Literature Survey
• Proposed System
• Applications
• References
Agenda
INTRODUCTION
• The challenge of building visual object detection models on large training datasets
due to privacy concerns and difficulties in collecting and sharing data across
organizations.
• The use of Federated Learning (FL) as a distributed machine learning paradigm that
allows participants to train local models while ensuring data privacy and security.
• The proposal of FedVisionBC, a blockchain-based federated learning system for
visual object detection, to overcome single point of failure, model poisoning attacks,
and membership inference attacks in traditional federated learning
K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
1. Title: YOLOv3: An Incremental Improvement
• Authors: Joseph Redmon, Ali Farhadi
• Year: 2019 (arXiv)
• Proposed Idea: introduce updates and improvements to the YOLOv3 object
detection algorithm. These enhancements include changes to the bounding box
prediction method, the introduction of a new network architecture called Darknet-53,
and comparisons with other detection methods
LITERATURE SURVEY
K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
• Methodology
YOLOv3 object detection algorithm involves making design changes, training a
new network, using anchor boxes for bounding box prediction, and implementing a
feature extractor network called Darknet-53
• Limitations
• May not perform well real-world scenarios
• Performs well only in COCO dataset
• It doesn’t completely overcome the limitations of YOLOv3
K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
2. Title: Federated Machine Learning: Concept and Applications
• Authors: Qiang Yang, Yang Liu, Tianjian Chen, Yongxin Tong
• Year: 2020 (arXiv)
• Proposed Idea: Federated Machine Learning enables training models across
decentralized devices while keeping data local, preserving privacy. Applications
span healthcare for secure patient data analysis, energy sector optimization in smart
grids, and improving user experience in mobile devices without compromising
privacy.
K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
Methodology:-
• Vertical Federated Learning System: This methodology involves collaborating on a model where each
party holds different features of the data. For example, one party might have information about
customer demographics while another has purchasing history.
• Horizontal Federated Learning System: Here, multiple parties possess similar data types but different
samples. For instance, different hospitals might have patient records for different regions. Horizontal
federated learning enables training a model across these datasets without centralizing the data,
preserving data locality and privacy.
• Federated Transfer Learning: This approach combines transfer learning with federated learning. A
pre-trained model on one dataset (source domain) is fine-tuned on another dataset distributed across
multiple parties (target domain), leveraging knowledge from the source domain to improve learning
efficiency and performance in the target domain while respecting data privacy.
Architecture
Limitations:-
• Data Fragment: Refers to the challenge of data being distributed across multiple parties, leading to fragmentation.
• Heterogeneous Data: Describes the scenario where data across different parties vary significantly in terms of
format, structure, or semantics.
• Security and Privacy Concerns: In federated learning, ensuring the security and privacy of data is paramount.
Techniques such as encryption, differential privacy, and secure aggregation are employed to protect sensitive
information and prevent unauthorized access or leakage during model training and inference.
K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
3. Title: Blockchain and Federated Learning for Privacy-Preserved Data Sharing in
Industrial IoT
• Authors: Yunlong Lu, Yueyue Dai, Yan Zhang
• Year: June 2021 (IEEE)
• Proposed Idea: Blockchain and federated learning to create a secure data sharing
architecture that maintains privacy by sharing data models instead of actual data,
achieving high accuracy, efficiency, and security for distributed multiple parties.
• Methodology
It consists of two modules: a permissioned blockchain module and a federated learning
module. The permissioned blockchain establishes secure connections among all end
IoT devices, while the federated learning module maintains data privacy by sharing the
data model instead of the actual data.
Architecture
Limitations:
• May not be suitable for all types of data sharing scenarios.
K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
4. Title: Contour-Aware Recurrent Cross Constraint Network for Salient Object
Detection
• Authors: Cuili Yao, Yuqiu Kong, Lin Feng, Bo Jin
• Year: Dec 2022 (IEEE)
• Proposed Idea: The Contour-Aware Recurrent Cross Constraint Network (CARCCNet),
which is a fully convolutional neural network designed to improve object contour
detection in salient object detection tasks. The network incorporates recurrent cross
constraint modules to enhance the detection of object contours.
K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
• Methodology
It involves training and evaluating the proposed CARCCNet on five popular salient
object detection datasets, describing the network architecture and each module,
conducting ablation study experiments, and presenting implementation and
evaluation metrics results compared with other state-of-the-art SOD methods.
• Limitations
• It doesn’t show same performance for different salient object data set
• Computational complexity of real-time applications
5. Title: Blockchain-Federated-Learning and Deep Learning Models for COVID-19
Detection Using CT Imaging.
• Authors: Rajesh Kumar, Abdullah Aman Khan, Jay Kumar.
• Year: July 2022 (IEEE)
• Proposed Idea: is a device-aware DNN-based object detection offloading
framework for mobile edge devices. It aims to optimize resource utilization by
considering factors such as computing power and network bandwidth, and uses a
greedy algorithm to find the optimal offloading decision in polynomial time.
Architecture
Methodology:
• Problem Formulation: This step involves precisely defining the task or objective of the study, including
identifying the problem to be solved, specifying the input and output variables, and delineating any
constraints or requirements.
• Greedy Algorithm: A heuristic approach that makes locally optimal choices at each step with the hope of
finding a global optimum. Greedy algorithms are often used when solving optimization problems and can
offer simplicity and efficiency, but they may not always guarantee the best solution.
• Experimental Validation: This phase involves designing and conducting experiments to assess the
performance and effectiveness of the proposed methodology or algorithm. Experimental validation
provides empirical evidence to support the claims and conclusions drawn from the study.
K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
PROPOSED SYSTEM
• The proposed system is called FedVisionBC.
• It uses an aggregation node and a verification node instead of a central server to
solve the single point of failure problem.
• It also employs encryption techniques, verification nodes, and smart contracts to
resist model poisoning attacks.
• The system integrates the Ethereum blockchain, federated learning, differential
privacy technology, smart contracts, and Interplanetary File System (IPFS).
• It uses the ADPFedAvg algorithm to prevent membership inference attacks using
user-level differential privacy technology and the federated average algorithm.
Architecture
Training process of FedVisionBC
Framework of FedVisionBC
ALGORITHMS
1. FedAvg (Federated Average Algorithm):
• FedAvg is a key algorithm in federated learning. It facilitates participants to train local models on their
data while preserving data privacy and security.
• It encompasses stages such as initialization, local model training, validation, aggregation, and update,
ensuring a collaborative approach to model development.
• It mitigates privacy risks by separating model training from direct access to raw training data.
• This decoupling ensures that sensitive information is not exposed during the learning process.
2. ADPFedAvg (Adaptive Differential Privacy Federated Learning Algorithm), :
• ADPFedAvg introduces user-level differential privacy technology and combines it with adaptive
clipping technology
• The algorithm augments global model updates, obtained by averaging local updates, with Gaussian
noise. This addition contributes to the privacy protection of the global model while maintaining its
utility.
Methodology
•Blockchain Integration: The system integrates blockchain technology to address the single point of failure
in traditional federated learning, ensuring a decentralized and secure environment for model aggregation and
updates.
•Privacy Protection: The methodology focuses on safeguarding user privacy by implementing encryption,
digital signature technology, and verification nodes to reduce the risk of poisoning attacks in the federated
learning process.
•Smart Contracts: A smart contract is designed within the framework to automate protocol execution and
manage interactions between nodes involved in the federated object detection system, ensuring secure and
efficient operations.
•Intelligent Aggregation: An intelligent aggregation method is employed to evaluate and select optimal
models without leaving operational traces, enhancing the efficiency and effectiveness of model selection in
the federated learning process.
RESULTS
APPLICATIONS
• Surveillance Systems
• Autonomous Vehicles
• Traffic Management
• Industrial Automation
• Robotics
• Security Systems
K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
REFERENCES
[1] J. Zhang, J. Zhou, J. Guo and X. Sun, "Visual Object Detection for Privacy-Preserving Federated Learning," in IEEE Access, vol.
11, pp. 33324-33335, 2023
[2] Joseph Redmon, Ali Farhadi "YOLOv3: An Incremental Improvement" arXiv:1804.02767v1 [cs.CV] 8 Apr 2019.
[3] Qiang Yang,Yang Liu, Tianjian Chen ,Yongxin Tong “Federated Machine Learning:Concept and Applications”
arXiv:1902.04885v1 [cs.AI] 13 Feb 2020
[4] Yunlong Lu, Yueyue Dai, Yan Zhang “Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT”
IEEE Transactions on Industrial Informatics, Vol. 16, No. 6, June 2021
[5] Cuili Yao, Yuqiu Kong, Lin Feng, Bo Jin “Contour-Aware Recurrent Cross Constraint Network for Salient Object Detection” IEEE
Access, December 16, 2022.
[6] Rajesh Kumar, Abdullah Aman Khan, Jay Kumar “Blockchain-Federated-Learning and Deep Learning Models for COVID-19
Detection Using CT Imaging” IEEE Sensors Journal, Vol. 21, No. 14, July 15, 2022
K.R. Road, V.V. Pura, Bengaluru.-560004.
Department of Computer Science & Engineering
THANK YOU

More Related Content

Similar to seminarphasdfjgdhhgbjdfghbdjfgbdjfgbdfgdfgdfge2.ppt

M learning in education
M learning in educationM learning in education
M learning in education
eSAT Publishing House
 
An_Efficient_Privacy-Enhancing_Cross-Silo_Federated_Learning_and_Applications...
An_Efficient_Privacy-Enhancing_Cross-Silo_Federated_Learning_and_Applications...An_Efficient_Privacy-Enhancing_Cross-Silo_Federated_Learning_and_Applications...
An_Efficient_Privacy-Enhancing_Cross-Silo_Federated_Learning_and_Applications...
Shakas Technologies
 
Intelligent Career Guidance System.pptx
Intelligent Career Guidance System.pptxIntelligent Career Guidance System.pptx
Intelligent Career Guidance System.pptx
Anonymous366406
 
Mobile Computing - Research Survey May 05 2012
Mobile Computing - Research Survey May 05 2012Mobile Computing - Research Survey May 05 2012
Mobile Computing - Research Survey May 05 2012Joseph Hennawy
 
Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...
KTN
 
ICELW Conference Slides
ICELW Conference SlidesICELW Conference Slides
ICELW Conference Slides
toolboc
 
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
SBGC
 
Architecture and Standards
Architecture and StandardsArchitecture and Standards
Architecture and Standards
ARDC
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
ijtsrd
 
federated learning method of machine learning
federated learning method of machine learningfederated learning method of machine learning
federated learning method of machine learning
punyapuharshitha
 
A Web-based Attendance System Using Face Recognition
A Web-based Attendance System Using Face RecognitionA Web-based Attendance System Using Face Recognition
A Web-based Attendance System Using Face Recognition
IRJET Journal
 
Application To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksApplication To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural Networks
IJSRED
 
Journals analysis ppt
Journals analysis pptJournals analysis ppt
Journals analysis ppt
Muhammad Heikal
 
Big data cloud-based recommendation system using NLP techniques with machine ...
Big data cloud-based recommendation system using NLP techniques with machine ...Big data cloud-based recommendation system using NLP techniques with machine ...
Big data cloud-based recommendation system using NLP techniques with machine ...
TELKOMNIKA JOURNAL
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
IJAAS Team
 
Preliminry report
 Preliminry report Preliminry report
Preliminry reportJiten Ahuja
 
Ibm colloquium 070915_nyberg
Ibm colloquium 070915_nybergIbm colloquium 070915_nyberg
Ibm colloquium 070915_nyberg
diannepatricia
 
G12_PPT_final.pptx
G12_PPT_final.pptxG12_PPT_final.pptx
G12_PPT_final.pptx
pankajrao017
 
Precaution for Covid-19 based on Mask detection and sensor
Precaution for Covid-19 based on Mask detection and sensorPrecaution for Covid-19 based on Mask detection and sensor
Precaution for Covid-19 based on Mask detection and sensor
IRJET Journal
 

Similar to seminarphasdfjgdhhgbjdfghbdjfgbdjfgbdfgdfgdfge2.ppt (20)

M learning in education
M learning in educationM learning in education
M learning in education
 
An_Efficient_Privacy-Enhancing_Cross-Silo_Federated_Learning_and_Applications...
An_Efficient_Privacy-Enhancing_Cross-Silo_Federated_Learning_and_Applications...An_Efficient_Privacy-Enhancing_Cross-Silo_Federated_Learning_and_Applications...
An_Efficient_Privacy-Enhancing_Cross-Silo_Federated_Learning_and_Applications...
 
Intelligent Career Guidance System.pptx
Intelligent Career Guidance System.pptxIntelligent Career Guidance System.pptx
Intelligent Career Guidance System.pptx
 
Mobile Computing - Research Survey May 05 2012
Mobile Computing - Research Survey May 05 2012Mobile Computing - Research Survey May 05 2012
Mobile Computing - Research Survey May 05 2012
 
Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...
 
ICELW Conference Slides
ICELW Conference SlidesICELW Conference Slides
ICELW Conference Slides
 
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
Dotnet datamining ieee projects 2012 @ Seabirds ( Chennai, Pondicherry, Vello...
 
Architecture and Standards
Architecture and StandardsArchitecture and Standards
Architecture and Standards
 
T0 numtq0n tk=
T0 numtq0n tk=T0 numtq0n tk=
T0 numtq0n tk=
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
 
federated learning method of machine learning
federated learning method of machine learningfederated learning method of machine learning
federated learning method of machine learning
 
A Web-based Attendance System Using Face Recognition
A Web-based Attendance System Using Face RecognitionA Web-based Attendance System Using Face Recognition
A Web-based Attendance System Using Face Recognition
 
Application To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksApplication To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural Networks
 
Journals analysis ppt
Journals analysis pptJournals analysis ppt
Journals analysis ppt
 
Big data cloud-based recommendation system using NLP techniques with machine ...
Big data cloud-based recommendation system using NLP techniques with machine ...Big data cloud-based recommendation system using NLP techniques with machine ...
Big data cloud-based recommendation system using NLP techniques with machine ...
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
 
Preliminry report
 Preliminry report Preliminry report
Preliminry report
 
Ibm colloquium 070915_nyberg
Ibm colloquium 070915_nybergIbm colloquium 070915_nyberg
Ibm colloquium 070915_nyberg
 
G12_PPT_final.pptx
G12_PPT_final.pptxG12_PPT_final.pptx
G12_PPT_final.pptx
 
Precaution for Covid-19 based on Mask detection and sensor
Precaution for Covid-19 based on Mask detection and sensorPrecaution for Covid-19 based on Mask detection and sensor
Precaution for Covid-19 based on Mask detection and sensor
 

Recently uploaded

一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
7sd8fier
 
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
9a93xvy
 
Transforming Brand Perception and Boosting Profitability
Transforming Brand Perception and Boosting ProfitabilityTransforming Brand Perception and Boosting Profitability
Transforming Brand Perception and Boosting Profitability
aaryangarg12
 
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
kecekev
 
Storytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design ProcessStorytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design Process
Chiara Aliotta
 
Impact of Fonts: in Web and Apps Design
Impact of Fonts:  in Web and Apps DesignImpact of Fonts:  in Web and Apps Design
Impact of Fonts: in Web and Apps Design
contactproperweb2014
 
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
h7j5io0
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
n0tivyq
 
Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.
Techno Merch
 
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
9a93xvy
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
cy0krjxt
 
Portfolio.pdf
Portfolio.pdfPortfolio.pdf
Portfolio.pdf
garcese
 
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
pmgdscunsri
 
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
ameli25062005
 
Connect Conference 2022: Passive House - Economic and Environmental Solution...
Connect Conference 2022: Passive House -  Economic and Environmental Solution...Connect Conference 2022: Passive House -  Economic and Environmental Solution...
Connect Conference 2022: Passive House - Economic and Environmental Solution...
TE Studio
 
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With DesignsGame Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
184804
 
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdfSECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
eloprejohn333
 
一比一原版(Columbia毕业证)哥伦比亚大学毕业证如何办理
一比一原版(Columbia毕业证)哥伦比亚大学毕业证如何办理一比一原版(Columbia毕业证)哥伦比亚大学毕业证如何办理
一比一原版(Columbia毕业证)哥伦比亚大学毕业证如何办理
asuzyq
 
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
gpffo76j
 
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
7sd8fier
 

Recently uploaded (20)

一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
一比一原版(NCL毕业证书)纽卡斯尔大学毕业证成绩单如何办理
 
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
一比一原版(CITY毕业证书)谢菲尔德哈勒姆大学毕业证如何办理
 
Transforming Brand Perception and Boosting Profitability
Transforming Brand Perception and Boosting ProfitabilityTransforming Brand Perception and Boosting Profitability
Transforming Brand Perception and Boosting Profitability
 
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
一比一原版(UW毕业证)西雅图华盛顿大学毕业证如何办理
 
Storytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design ProcessStorytelling For The Web: Integrate Storytelling in your Design Process
Storytelling For The Web: Integrate Storytelling in your Design Process
 
Impact of Fonts: in Web and Apps Design
Impact of Fonts:  in Web and Apps DesignImpact of Fonts:  in Web and Apps Design
Impact of Fonts: in Web and Apps Design
 
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
一比一原版(Bolton毕业证书)博尔顿大学毕业证成绩单如何办理
 
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
一比一原版(Glasgow毕业证书)格拉斯哥大学毕业证成绩单如何办理
 
Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.Technoblade The Legacy of a Minecraft Legend.
Technoblade The Legacy of a Minecraft Legend.
 
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
一比一原版(RHUL毕业证书)伦敦大学皇家霍洛威学院毕业证如何办理
 
Design Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinkingDesign Thinking Design thinking Design thinking
Design Thinking Design thinking Design thinking
 
Portfolio.pdf
Portfolio.pdfPortfolio.pdf
Portfolio.pdf
 
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
Maximize Your Content with Beautiful Assets : Content & Asset for Landing Page
 
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
Коричневый и Кремовый Деликатный Органический Копирайтер Фрилансер Марке...
 
Connect Conference 2022: Passive House - Economic and Environmental Solution...
Connect Conference 2022: Passive House -  Economic and Environmental Solution...Connect Conference 2022: Passive House -  Economic and Environmental Solution...
Connect Conference 2022: Passive House - Economic and Environmental Solution...
 
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With DesignsGame Concept Presentation for Ukrainian Mythology Based Game With Designs
Game Concept Presentation for Ukrainian Mythology Based Game With Designs
 
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdfSECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
SECURING BUILDING PERMIT CITY OF CALOOCAN.pdf
 
一比一原版(Columbia毕业证)哥伦比亚大学毕业证如何办理
一比一原版(Columbia毕业证)哥伦比亚大学毕业证如何办理一比一原版(Columbia毕业证)哥伦比亚大学毕业证如何办理
一比一原版(Columbia毕业证)哥伦比亚大学毕业证如何办理
 
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
原版定做(penn毕业证书)美国宾夕法尼亚大学毕业证文凭学历证书原版一模一样
 
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
一比一原版(MMU毕业证书)曼彻斯特城市大学毕业证成绩单如何办理
 

seminarphasdfjgdhhgbjdfghbdjfgbdjfgbdfgdfgdfge2.ppt

  • 1. Bangalore Institute of Technology K.R. Road, V.V. Pura, Bengaluru.-560004. Department of Information Science & Engineering Presented By Under the Guidance of 1BI20IS052 Pavithra N Manoj B Kulkarni Dept of ISE , BIT “Visual Object Detection for Privacy-Preserving Federated Learning”
  • 2. • Introduction • Literature Survey • Proposed System • Applications • References Agenda
  • 3. INTRODUCTION • The challenge of building visual object detection models on large training datasets due to privacy concerns and difficulties in collecting and sharing data across organizations. • The use of Federated Learning (FL) as a distributed machine learning paradigm that allows participants to train local models while ensuring data privacy and security. • The proposal of FedVisionBC, a blockchain-based federated learning system for visual object detection, to overcome single point of failure, model poisoning attacks, and membership inference attacks in traditional federated learning
  • 4. K.R. Road, V.V. Pura, Bengaluru.-560004. Department of Computer Science & Engineering 1. Title: YOLOv3: An Incremental Improvement • Authors: Joseph Redmon, Ali Farhadi • Year: 2019 (arXiv) • Proposed Idea: introduce updates and improvements to the YOLOv3 object detection algorithm. These enhancements include changes to the bounding box prediction method, the introduction of a new network architecture called Darknet-53, and comparisons with other detection methods LITERATURE SURVEY
  • 5. K.R. Road, V.V. Pura, Bengaluru.-560004. Department of Computer Science & Engineering • Methodology YOLOv3 object detection algorithm involves making design changes, training a new network, using anchor boxes for bounding box prediction, and implementing a feature extractor network called Darknet-53 • Limitations • May not perform well real-world scenarios • Performs well only in COCO dataset • It doesn’t completely overcome the limitations of YOLOv3
  • 6. K.R. Road, V.V. Pura, Bengaluru.-560004. Department of Computer Science & Engineering 2. Title: Federated Machine Learning: Concept and Applications • Authors: Qiang Yang, Yang Liu, Tianjian Chen, Yongxin Tong • Year: 2020 (arXiv) • Proposed Idea: Federated Machine Learning enables training models across decentralized devices while keeping data local, preserving privacy. Applications span healthcare for secure patient data analysis, energy sector optimization in smart grids, and improving user experience in mobile devices without compromising privacy.
  • 7. K.R. Road, V.V. Pura, Bengaluru.-560004. Department of Computer Science & Engineering Methodology:- • Vertical Federated Learning System: This methodology involves collaborating on a model where each party holds different features of the data. For example, one party might have information about customer demographics while another has purchasing history. • Horizontal Federated Learning System: Here, multiple parties possess similar data types but different samples. For instance, different hospitals might have patient records for different regions. Horizontal federated learning enables training a model across these datasets without centralizing the data, preserving data locality and privacy. • Federated Transfer Learning: This approach combines transfer learning with federated learning. A pre-trained model on one dataset (source domain) is fine-tuned on another dataset distributed across multiple parties (target domain), leveraging knowledge from the source domain to improve learning efficiency and performance in the target domain while respecting data privacy.
  • 8. Architecture Limitations:- • Data Fragment: Refers to the challenge of data being distributed across multiple parties, leading to fragmentation. • Heterogeneous Data: Describes the scenario where data across different parties vary significantly in terms of format, structure, or semantics. • Security and Privacy Concerns: In federated learning, ensuring the security and privacy of data is paramount. Techniques such as encryption, differential privacy, and secure aggregation are employed to protect sensitive information and prevent unauthorized access or leakage during model training and inference.
  • 9. K.R. Road, V.V. Pura, Bengaluru.-560004. Department of Computer Science & Engineering 3. Title: Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT • Authors: Yunlong Lu, Yueyue Dai, Yan Zhang • Year: June 2021 (IEEE) • Proposed Idea: Blockchain and federated learning to create a secure data sharing architecture that maintains privacy by sharing data models instead of actual data, achieving high accuracy, efficiency, and security for distributed multiple parties. • Methodology It consists of two modules: a permissioned blockchain module and a federated learning module. The permissioned blockchain establishes secure connections among all end IoT devices, while the federated learning module maintains data privacy by sharing the data model instead of the actual data.
  • 10. Architecture Limitations: • May not be suitable for all types of data sharing scenarios.
  • 11. K.R. Road, V.V. Pura, Bengaluru.-560004. Department of Computer Science & Engineering 4. Title: Contour-Aware Recurrent Cross Constraint Network for Salient Object Detection • Authors: Cuili Yao, Yuqiu Kong, Lin Feng, Bo Jin • Year: Dec 2022 (IEEE) • Proposed Idea: The Contour-Aware Recurrent Cross Constraint Network (CARCCNet), which is a fully convolutional neural network designed to improve object contour detection in salient object detection tasks. The network incorporates recurrent cross constraint modules to enhance the detection of object contours.
  • 12. K.R. Road, V.V. Pura, Bengaluru.-560004. Department of Computer Science & Engineering • Methodology It involves training and evaluating the proposed CARCCNet on five popular salient object detection datasets, describing the network architecture and each module, conducting ablation study experiments, and presenting implementation and evaluation metrics results compared with other state-of-the-art SOD methods. • Limitations • It doesn’t show same performance for different salient object data set • Computational complexity of real-time applications
  • 13. 5. Title: Blockchain-Federated-Learning and Deep Learning Models for COVID-19 Detection Using CT Imaging. • Authors: Rajesh Kumar, Abdullah Aman Khan, Jay Kumar. • Year: July 2022 (IEEE) • Proposed Idea: is a device-aware DNN-based object detection offloading framework for mobile edge devices. It aims to optimize resource utilization by considering factors such as computing power and network bandwidth, and uses a greedy algorithm to find the optimal offloading decision in polynomial time.
  • 15. Methodology: • Problem Formulation: This step involves precisely defining the task or objective of the study, including identifying the problem to be solved, specifying the input and output variables, and delineating any constraints or requirements. • Greedy Algorithm: A heuristic approach that makes locally optimal choices at each step with the hope of finding a global optimum. Greedy algorithms are often used when solving optimization problems and can offer simplicity and efficiency, but they may not always guarantee the best solution. • Experimental Validation: This phase involves designing and conducting experiments to assess the performance and effectiveness of the proposed methodology or algorithm. Experimental validation provides empirical evidence to support the claims and conclusions drawn from the study.
  • 16. K.R. Road, V.V. Pura, Bengaluru.-560004. Department of Computer Science & Engineering PROPOSED SYSTEM • The proposed system is called FedVisionBC. • It uses an aggregation node and a verification node instead of a central server to solve the single point of failure problem. • It also employs encryption techniques, verification nodes, and smart contracts to resist model poisoning attacks. • The system integrates the Ethereum blockchain, federated learning, differential privacy technology, smart contracts, and Interplanetary File System (IPFS). • It uses the ADPFedAvg algorithm to prevent membership inference attacks using user-level differential privacy technology and the federated average algorithm.
  • 17. Architecture Training process of FedVisionBC Framework of FedVisionBC
  • 18. ALGORITHMS 1. FedAvg (Federated Average Algorithm): • FedAvg is a key algorithm in federated learning. It facilitates participants to train local models on their data while preserving data privacy and security. • It encompasses stages such as initialization, local model training, validation, aggregation, and update, ensuring a collaborative approach to model development. • It mitigates privacy risks by separating model training from direct access to raw training data. • This decoupling ensures that sensitive information is not exposed during the learning process.
  • 19. 2. ADPFedAvg (Adaptive Differential Privacy Federated Learning Algorithm), : • ADPFedAvg introduces user-level differential privacy technology and combines it with adaptive clipping technology • The algorithm augments global model updates, obtained by averaging local updates, with Gaussian noise. This addition contributes to the privacy protection of the global model while maintaining its utility.
  • 20.
  • 21. Methodology •Blockchain Integration: The system integrates blockchain technology to address the single point of failure in traditional federated learning, ensuring a decentralized and secure environment for model aggregation and updates. •Privacy Protection: The methodology focuses on safeguarding user privacy by implementing encryption, digital signature technology, and verification nodes to reduce the risk of poisoning attacks in the federated learning process. •Smart Contracts: A smart contract is designed within the framework to automate protocol execution and manage interactions between nodes involved in the federated object detection system, ensuring secure and efficient operations. •Intelligent Aggregation: An intelligent aggregation method is employed to evaluate and select optimal models without leaving operational traces, enhancing the efficiency and effectiveness of model selection in the federated learning process.
  • 23. APPLICATIONS • Surveillance Systems • Autonomous Vehicles • Traffic Management • Industrial Automation • Robotics • Security Systems
  • 24. K.R. Road, V.V. Pura, Bengaluru.-560004. Department of Computer Science & Engineering REFERENCES [1] J. Zhang, J. Zhou, J. Guo and X. Sun, "Visual Object Detection for Privacy-Preserving Federated Learning," in IEEE Access, vol. 11, pp. 33324-33335, 2023 [2] Joseph Redmon, Ali Farhadi "YOLOv3: An Incremental Improvement" arXiv:1804.02767v1 [cs.CV] 8 Apr 2019. [3] Qiang Yang,Yang Liu, Tianjian Chen ,Yongxin Tong “Federated Machine Learning:Concept and Applications” arXiv:1902.04885v1 [cs.AI] 13 Feb 2020 [4] Yunlong Lu, Yueyue Dai, Yan Zhang “Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT” IEEE Transactions on Industrial Informatics, Vol. 16, No. 6, June 2021 [5] Cuili Yao, Yuqiu Kong, Lin Feng, Bo Jin “Contour-Aware Recurrent Cross Constraint Network for Salient Object Detection” IEEE Access, December 16, 2022. [6] Rajesh Kumar, Abdullah Aman Khan, Jay Kumar “Blockchain-Federated-Learning and Deep Learning Models for COVID-19 Detection Using CT Imaging” IEEE Sensors Journal, Vol. 21, No. 14, July 15, 2022
  • 25. K.R. Road, V.V. Pura, Bengaluru.-560004. Department of Computer Science & Engineering THANK YOU