You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book addresses privacy in dynamical systems, with applications to smart metering, traffic estimation, and building management. In the first part, the book explores statistical methods for privacy preservation from the areas of differential privacy and information-theoretic privacy (e.g., using privacy metrics motivated by mutual information, relative entropy, and Fisher information) with provable guarantees. In the second part, it investigates the use of homomorphic encryption for the implementation of control laws over encrypted numbers to support the development of fully secure remote estimation and control. Chiefly intended for graduate students and researchers, the book provides an essential overview of the latest developments in privacy-aware design for dynamical systems.
Federated Learning: Theory and Practi ce provides a holisti c treatment to federated learning as a distributed learning system with various forms of decentralized data and features. Part I of the book begins with a broad overview of opti mizati on fundamentals and modeling challenges, covering various aspects of communicati on effi ciency, theoretical convergence, and security. Part II featuresemerging challenges stemming from many socially driven concerns of federated learning as a future public machine learning service. Part III concludes the book with a wide array of industrial applicati ons of federated learning, as well as ethical considerations, showcasing its immense potential for dri...
This book presents an in-depth overview of recent work related to the safety, security, and privacy of cyber-physical systems (CPSs). It brings together contributions from leading researchers in networked control systems and closely related fields to discuss overarching aspects of safety, security, and privacy; characterization of attacks; and solutions to detecting and mitigating such attacks. The book begins by providing an insightful taxonomy of problems, challenges and techniques related to safety, security, and privacy for CPSs. It then moves through a thorough discussion of various control-based solutions to these challenges, including cooperative fault-tolerant and resilient control a...
This book comprises a set of chapters that introduce various topics pertinent to novel approaches towards enhancing cyber-physical measures for increased security and resilience levels in control systems. The unifying theme of these approaches lies in the utilization of knowledge and models of the physical systems, rather than an attempt to reinvigorate conventional IT-based security measures. The contributing authors present perspectives on network security, game theory, and control, as well as views on how these disciplines can be combined to design resilient, safe, and secure control systems. The book explores how attacks in different forms, such as false data injections and denial-of-service can be very harmful, and may not be detected unless the security measures exploit the physical models. Several applications are discussed, power systems being considered most thoroughly. Because of its interdisciplinary nature—techniques from systems control, game theory, signal processing and computer science all make contributions—Security and Resilience of Control Systems will be of interest to academics, practitioners and graduate students with a broad spectrum of interests.
Railway systems have a long history of train protection and control, as to reduce the risk of train accidents. Many train control systems include automated communication between train and trackside equipment. But several different national systems are still facing cross-border rail traffic. Today, trains for cross-border traffic need to be equipped with train control systems that are installed on the tracks. This book covers the latest advances in Communication Based Train Control (CBTC) research in on-board components locomotive messaging systems, GPS sensors, communications wayside and switching networks. It also focuses on architecture and methodology using data fusion techniques. New wir...
In recent years fractional calculus has played an important role in various fields such as mechanics, electricity, chemistry, biology, economics, modeling, identification, control theory and signal processing. The scope of this book is to present the state of the art in the study of fractional systems and the application of fractional differentiation. Furthermore, the manufacture of nanowires is important for the design of nanosensors and the development of high-yield thin films is vital in procuring clean solar energy. This wide range of applications is of interest to engineers, physicists and mathematicians.
This book aims at the tiny machine learning (TinyML) software and hardware synergy for edge intelligence applications. It presents on-device learning techniques covering model-level neural network design, algorithm-level training optimization, and hardware-level instruction acceleration. Analyzing the limitations of conventional in-cloud computing would reveal that on-device learning is a promising research direction to meet the requirements of edge intelligence applications. As to the cutting-edge research of TinyML, implementing a high-efficiency learning framework and enabling system-level acceleration is one of the most fundamental issues. This book presents a comprehensive discussion of...
This book intends to present emerging Federated Learning (FL)-based architectures, frameworks, and models in Internet of Medical Things (IoMT) applications. It intends to build on the basics of the healthcare industry, the current data sharing requirements, and security and privacy issues in medical data sharing. Once IoMT is presented, the book shifts towards the proposal of privacy-preservation in IoMT, and explains how FL presents a viable solution to these challenges. The claims are supported through lucid illustrations, tables, and examples that present effective and secured FL schemes, simulations, and practical discussion on use-case scenarios in a simple manner. The book intends to c...
This book presents how federated learning helps to understand and learn from user activity in Internet of Things (IoT) applications while protecting user privacy. The authors first show how federated learning provides a unique way to build personalized models using data without intruding on users’ privacy. The authors then provide a comprehensive survey of state-of-the-art research on federated learning, giving the reader a general overview of the field. The book also investigates how a personalized federated learning framework is needed in cloud-edge architecture as well as in wireless-edge architecture for intelligent IoT applications. To cope with the heterogeneity issues in IoT environ...
IoT is empowered by various technologies used to detect, gather, store, act, process, transmit, oversee, and examine information. The combination of emergent technologies for information processing and distributed security, such as Cloud computing, Artificial intelligence, and Blockchain, brings new challenges in addressing distributed security methods that form the foundation of improved and eventually entirely new products and services. As systems interact with each other, it is essential to have an agreed interoperability standard, which is safe and valid. This book aims at providing an introduction by illustrating state-of-the-art security challenges and threats in IoT and the latest developments in IoT with Cloud, AI, and Blockchain security challenges. Various application case studies from domains such as science, engineering, and healthcare are introduced, along with their architecture and how they leverage various technologies Cloud, AI, and Blockchain. This book provides a comprehensive guide to researchers and students to design IoT integrated AI, Cloud, and Blockchain projects and to have an overview of the next generation challenges that may arise in the coming years.