Archives

DisLLM: Distributed LLMs for Privacy Assurance in Resource-Constrained Environments

Large Language Models (LLMs) have revolutionized natural language processing, but deploying them in resource-constrained environments and privacy-sensitive domains remains challenging. This paper introduces the Distributed Large Language Model (DisLLM), a novel distributed learning framework that addresses privacy preservation and computational efficiency issues in LLM fine-tuning and inference. DisLLM leverages the Splitfed Learning (SFL) approach, combining […]

Read More

A survey on privacy of personal and non-personal data in B5G/6G networks

The upcoming Beyond 5G (B5G) and 6G networks are expected to provide enhanced capabilities such asultra-high data rates, dense connectivity, and high scalability. It opens many possibilities for a new generation of services driven by Artificial Intelligence (AI) and billions of interconnected smart devices. However, with this expected massive upgrade, the privacy of people, organizations, […]

Read More
model poison decision boundary shift

SHERPA: Explainable Robust Algorithms for Privacy-Preserved Federated Learning in Future Networks to Defend Against Data Poisoning Attacks

With the rapid progression of communication and localisation of big data over billions of devices, distributed Machine Learning (ML) techniques are emerging to cater for the development of Artificial Intelligence (AI)-based services in a distributed manner. Federated Learning (FL) is such an innovative approach to achieve a privacy-preserved AI that facilitates ML model sharing and […]

Read More

Rec-Def: A Recommendation-based Defence Mechanism for Privacy Preservation in Federated Learning Systems

  • November 19, 2023
  • Comments off

An emergence of attention and regulations on consumer privacy can be observed over the recent years with the ubiquitous availability of IoT systems handling personal data. Federated Learning (FL) arises as a privacy-preserved Machine Learning (ML) technique where data can be kept private within these devices without transmitting to third parties. Yet, many privacy attacks […]

Read More

From Opacity to Clarity: Leveraging XAI for Robust Network Traffic Classification

  • November 19, 2023
  • Comments off

A wide adoption of Artificial Intelligence (AI) can be observed in recent years over networking to provide zero-touch, full autonomy of services towards the next generation Beyond 5G (B5G)/6G. However, AI-driven attacks on these services are a major concern in reaching the full potential of this future vision. Identifying how resilient the AI models are […]

Read More

Privacy-preserved Collaborative Federated Learning Platform for Industrial Internet of Things

  • November 19, 2023
  • Comments off

Federated learning (FL) is an intriguing approach to privacy-preserving collaborative learning. Decentralised FL is achieving increased favour for investigation due to the mitigation of vulnerability for a single point of failure and more controllability for end users over their models. However, many existing decentralised FL systems face limitations, such as privacy concerns, latency in aggregation, […]

Read More

FL-TIA: Novel Time Inference Attacks on Federated Learning

  • November 19, 2023
  • Comments off

Federated Learning (FL) is an emerging privacy-preserved distributed Machine Learning (ML) technique where multiple clients can contribute to training an ML model without sharing private data. Even though FL offers a certain level of privacy by design, recent works show that FL is vulnerable to numerous privacy attacks. One of the key features of FL […]

Read More

A Federated Learning Approach for Improving Security in Network Slicing

  • November 17, 2023
  • Comments off

Network Slicing (NS) is a predominant technology in future telecommunication networks, including Fifth Generation (5G), which supports the realization of heterogeneous applications and services. It allows the allocation of a dedicated logical network slice of the physical network to each application. Security is one of the paramount challenges in an NS ecosystem. Several technologies, including […]

Read More

Service Migration Authentication Protocol for MEC

  • December 7, 2022
  • Comments off

Multi-Access Edge Computing (MEC) is a novel edge computing paradigm that enhances the access level capacity of mobile networks by shifting the serviceable Data center infrastructure proximate to the end devices. With this proximate placement and service provisioning, migration of a service from one edge enabled gNodeB (gNB) to another is intrinsic to maintain the […]

Read More