-
A Quality-of-Service Compliance System using Federated Learning and Optimistic Rollups
Authors:
Joao Paulo de Brito Goncalves,
Guilherme Emerick Sathler,
Rodolfo da Silva Villaca
Abstract:
Edge computing brings a new paradigm in which the sharing of computing, storage, and bandwidth resources as close as possible to the mobile devices or sensors generating a large amount of data. A parallel trend is the rise of phones and tablets as primary computing devices for many people. The powerful sensors present on these devices combined with the fact that they are mobile, mean they have acc…
▽ More
Edge computing brings a new paradigm in which the sharing of computing, storage, and bandwidth resources as close as possible to the mobile devices or sensors generating a large amount of data. A parallel trend is the rise of phones and tablets as primary computing devices for many people. The powerful sensors present on these devices combined with the fact that they are mobile, mean they have access to data of an unprecedentedly diverse and private nature. Models learned on such data hold the promise of greatly improving usability by powering more intelligent applications, but the sensitive nature of the data means there are risks and responsibilities to storing it in a centralized location. To address the data privacy required for some data in these devices we propose the use of Federated Learning (FL) so that specific data about services performed by clients do not leave the source machines. Instead of sharing data, users collaboratively train a model by only sending weight updates to a server. However, the naive use of FL in those scenarios exposes it to a risk of corruption, whether intentional or not, during the training phase. To improve the security of the FL structure, we propose a decentralized Blockchain-based FL in an edge computing scenario. We also apply blockchain to create a reward mechanism in FL to enable incentive strategy for trainers.
△ Less
Submitted 14 November, 2023;
originally announced December 2023.
-
eXplainable Artificial Intelligence on Medical Images: A Survey
Authors:
Matteus Vargas Simão da Silva,
Rodrigo Reis Arrais,
Jhessica Victoria Santos da Silva,
Felipe Souza Tânios,
Mateus Antonio Chinelatto,
Natalia Backhaus Pereira,
Renata De Paris,
Lucas Cesar Ferreira Domingos,
Rodrigo Dória Villaça,
Vitor Lopes Fabris,
Nayara Rossi Brito da Silva,
Ana Claudia Akemi Matsuki de Faria,
Jose Victor Nogueira Alves da Silva,
Fabiana Cristina Queiroz de Oliveira Marucci,
Francisco Alves de Souza Neto,
Danilo Xavier Silva,
Vitor Yukio Kondo,
Claudio Filipi Gonçalves dos Santos
Abstract:
Over the last few years, the number of works about deep learning applied to the medical field has increased enormously. The necessity of a rigorous assessment of these models is required to explain these results to all people involved in medical exams. A recent field in the machine learning area is explainable artificial intelligence, also known as XAI, which targets to explain the results of such…
▽ More
Over the last few years, the number of works about deep learning applied to the medical field has increased enormously. The necessity of a rigorous assessment of these models is required to explain these results to all people involved in medical exams. A recent field in the machine learning area is explainable artificial intelligence, also known as XAI, which targets to explain the results of such black box models to permit the desired assessment. This survey analyses several recent studies in the XAI field applied to medical diagnosis research, allowing some explainability of the machine learning results in several different diseases, such as cancers and COVID-19.
△ Less
Submitted 12 May, 2023;
originally announced May 2023.
-
Data Integrity Verification in Network Slicing using Oracles and Smart Contracts
Authors:
Joao Paulo de Brito Goncalves,
Gustavo Alochio,
Rodolfo da Silva Villaca,
Roberta Lima Gomes
Abstract:
The fifth-generation (5G) wireless networks are expected to provide various services compared to the 4G and previous generations of networks. The Quality of Service requirements can be quite different in terms of latency, bandwidth, reliability, and availability. 5G technology allows the fragmentation of the network into small pieces, known as network slices. This network slicing is done by specif…
▽ More
The fifth-generation (5G) wireless networks are expected to provide various services compared to the 4G and previous generations of networks. The Quality of Service requirements can be quite different in terms of latency, bandwidth, reliability, and availability. 5G technology allows the fragmentation of the network into small pieces, known as network slices. This network slicing is done by specific tools and the configuration must be protected from attacks that may be performed by malicious users. Thus in this paper, a solution to protect and prevent these failures from happening is addressed. For this solution to be carried out, a study was conducted on the Blockchain technology, as well as the use of Oracles in order to implement an integrity verification system, a system capable of assuring 5G network slices configuration integrity through a complete architecture involving Blockchain, Smart Contracts and Oracles.
△ Less
Submitted 28 July, 2022;
originally announced July 2022.
-
On Machine Learning DoS Attack Identification from Cloud Computing Telemetry
Authors:
João Henrique Corrêa,
Patrick Marques Ciarelli,
Moises R. N. Ribeiro,
Rodolfo da Silva Villaca
Abstract:
The detection of Denial of Service (DoS) attacks remains a challenge for the cloud environment, affecting a massive number of services and applications hosted by such virtualized infrastructures. Typically, in the literature, the detection of DoS attacks is performed solely by analyzing the traffic of packets in the network. This work advocates for the use of telemetry from the cloud to detect DoS…
▽ More
The detection of Denial of Service (DoS) attacks remains a challenge for the cloud environment, affecting a massive number of services and applications hosted by such virtualized infrastructures. Typically, in the literature, the detection of DoS attacks is performed solely by analyzing the traffic of packets in the network. This work advocates for the use of telemetry from the cloud to detect DoS attacks using Machine Learning algorithms. Our hypothesis is based on richness of such native data collection services, with metrics from both physical and virtual hosts. Our preliminary results demonstrate that DoS can be identified accurately with k-Nearest Neighbors (kNN) and decision tree (CART).
△ Less
Submitted 11 April, 2019;
originally announced April 2019.