期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Super-proximity routing in structured peer-to-peer overlay networks 被引量:1
1
作者 吴增德 饶卫雄 马范援 《Journal of Zhejiang University Science》 EI CSCD 2004年第1期16-21,共6页
Peer to Peer systems are emerging as one of the most popular Internet applications. Structured Peer to Peer overlay networks use identifier based routing algorithms to allow robustness, load balancing, and distrib... Peer to Peer systems are emerging as one of the most popular Internet applications. Structured Peer to Peer overlay networks use identifier based routing algorithms to allow robustness, load balancing, and distributed lookup needed in this environment. However, identifier based routing that is independent of Internet topology tends to be of low efficiency. Aimed at improving the routing efficiency, the super proximity routing algorithms presented in this paper combine Internet topology and overlay routing table in choosing the next hop. Experimental results showed that the algorithms greatly improve the efficiency of Peer to Peer routing. 展开更多
关键词 ROUTING peer to peer network Distributed systems INTERNET
下载PDF
Accelerated transmission in peer-to-peer network
2
作者 庄艳艳 刘业 钮麟 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期226-231,共6页
The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate network... The design and evaluation of accelerated transmission (AT) systems in peer-to-peer networks for data transmission are introduced. Based on transfer control protocol (TCP) and peer-to-peer (P2P) substrate networks, AT can select peers of high performance quality, monitor the transfer status of each peer, dynamically adjust the transmission velocity and react to connection degradation with high accuracy and low overhead. The system performance is evaluated by simulations, and the interrelationship between network flow, bandwidth utilities and network throughput is analyzed. Owing to the collaborative operation of neighboring peers, AT accelerates the process of data transmission and the collective network performance is much more satisfactory. 展开更多
关键词 peer to peer network transfer control protocol (TCP) available bandwidth
下载PDF
Research on the trust evaluation model of the P2P system based on the probability statistics method
3
《International English Education Research》 2013年第12期66-68,共3页
The trust evaluation model of the existing P2P system is facing the attack behavior of two kinds of strategy malicious nodes: the strategic deception and the dishonest recommendation, which seriously affect the accur... The trust evaluation model of the existing P2P system is facing the attack behavior of two kinds of strategy malicious nodes: the strategic deception and the dishonest recommendation, which seriously affect the accuracy and the effectiveness of the trust evaluation of the model calculation nodes. In view of the disadvantages of the existing models, the author puts forward a trust evaluation model based on the probabilistic method. The model uses the concepts of the subjective trust relationship in the human society, and on the basis of the direct experience and the feedback information, calculate the direct trust and the recommendation trust of the nodes by using the probability statistical method. And through the identification of the importance of the direct experience, distinguish the reliability of the feedback information and recommenders, and improve the effectiveness of the trust evaluation model. The simulation experiment shows that compared with the existing trust evaluation model, this model can effectively restrain the threat of the strategic deception and the dishonesty recommendation, especially the attack of the complex cooperative cheating on the system. 展开更多
关键词 peer to peer network RECOMMENDATION malicious act cooperative cheat
下载PDF
DEFEAT:A decentralized federated learning against gradient attacks
4
作者 Guangxi Lu Zuobin Xiong +3 位作者 Ruinian Li Nael Mohammad Yingshu Li Wei Li 《High-Confidence Computing》 2023年第3期22-29,共8页
As one of the most promising machine learning frameworks emerging in recent years,Federated learning(FL)has received lots of attention.The main idea of centralized FL is to train a global model by aggregating local mo... As one of the most promising machine learning frameworks emerging in recent years,Federated learning(FL)has received lots of attention.The main idea of centralized FL is to train a global model by aggregating local model parameters and maintain the private data of users locally.However,recent studies have shown that traditional centralized federated learning is vulnerable to various attacks,such as gradient attacks,where a malicious server collects local model gradients and uses them to recover the private data stored on the client.In this paper,we propose a decentralized federated learning against aTtacks(DEFEAT)framework and use it to defend the gradient attack.The decentralized structure adopted by this paper uses a peer-to-peer network to transmit,aggregate,and update local models.In DEFEAT,the participating clients only need to communicate with their single-hop neighbors to learn the global model,in which the model accuracy and communication cost during the training process of DEFEAT are well balanced.Through a series of experiments and detailed case studies on real datasets,we evaluate the excellent model performance of DEFEAT and the privacy preservation capability against gradient attacks. 展开更多
关键词 Federated learning peer to peer network Privacy protection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部