{"id":"https://openalex.org/W4319586080","doi":"https://doi.org/10.1109/candar57322.2022.00033","title":"Towards the Design of Locally Differential Private Hardware System for Edge Computing","display_name":"Towards the Design of Locally Differential Private Hardware System for Edge Computing","publication_year":2022,"publication_date":"2022-11-01","ids":{"openalex":"https://openalex.org/W4319586080","doi":"https://doi.org/10.1109/candar57322.2022.00033"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/candar57322.2022.00033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020117824","display_name":"Kaito Taguchi","orcid":null},"institutions":[{"id":"https://openalex.org/I135598925","display_name":"Kyushu University","ror":"https://ror.org/00p4k0j84","country_code":"JP","type":"education","lineage":["https://openalex.org/I135598925"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kaito Taguchi","raw_affiliation_strings":["Kyushu University, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Kyushu University, Fukuoka, Japan","institution_ids":["https://openalex.org/I135598925"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001126368","display_name":"Kouichi Sakurai","orcid":"https://orcid.org/0000-0003-4621-1674"},"institutions":[{"id":"https://openalex.org/I135598925","display_name":"Kyushu University","ror":"https://ror.org/00p4k0j84","country_code":"JP","type":"education","lineage":["https://openalex.org/I135598925"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kouichi Sakurai","raw_affiliation_strings":["Kyushu University, Fukuoka, Japan"],"affiliations":[{"raw_affiliation_string":"Kyushu University, Fukuoka, Japan","institution_ids":["https://openalex.org/I135598925"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059705629","display_name":"Masahiro Iida","orcid":"https://orcid.org/0000-0002-9654-2319"},"institutions":[{"id":"https://openalex.org/I96036126","display_name":"Kumamoto University","ror":"https://ror.org/02cgss904","country_code":"JP","type":"education","lineage":["https://openalex.org/I96036126"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masahiro Iida","raw_affiliation_strings":["Kumamoto University, Kumamoto, Japan"],"affiliations":[{"raw_affiliation_string":"Kumamoto University, Kumamoto, Japan","institution_ids":["https://openalex.org/I96036126"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.162,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.418212,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":60,"max":70},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential Privacy","score":0.88630307},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.46452487},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4117626}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.88630307},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.83399224},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6474093},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5707139},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.47265306},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.46452487},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.446173},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.42703968},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.4268747},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4117626},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34180194},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22244683},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1963054},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.18138045},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1812155},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/candar57322.2022.00033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W1583056432","https://openalex.org/W1873763122","https://openalex.org/W1967818063","https://openalex.org/W2033532123","https://openalex.org/W2053801139","https://openalex.org/W2097272254","https://openalex.org/W2108907376","https://openalex.org/W2884661045","https://openalex.org/W2911978475","https://openalex.org/W2982301203","https://openalex.org/W3092538966"],"related_works":["https://openalex.org/W4376106090","https://openalex.org/W4319586080","https://openalex.org/W4293869292","https://openalex.org/W4285407613","https://openalex.org/W3138718334","https://openalex.org/W3131650874","https://openalex.org/W3000385466","https://openalex.org/W2988694805","https://openalex.org/W2941572917","https://openalex.org/W2900470768"],"abstract_inverted_index":{"A":[0],"challenging":[1,217],"issue":[2],"for":[3],"edge":[4],"computing":[5],"is":[6,26,151,167],"how":[7],"to":[8,70,93,168,172,180],"correct":[9],"meaningful":[10],"information":[11],"from":[12,176],"sensor":[13],"data":[14,21],"while":[15,105],"keeping":[16,106],"the":[17,20,29,71,82,95,120,126,130,145,148,159,190,198,207],"privacy":[18,67,135,174,182],"of":[19,62,74,84,140,147,162,200,211],"and":[22,58,86,102,124,179,209],"individuals.":[23],"One":[24],"approach":[25],"given":[27],"by":[28,158],"recent":[30],"work":[31,122],"[Choi":[32],"et":[33],"al.":[34],"\u201cGuaranteeing":[35],"Local":[36],"Differential":[37],"Privacy":[38],"on":[39,48],"Ultra-Low-Power":[40,63],"Systems\u201d":[41],"2018":[42],"ACM/IEEE":[43],"45th":[44],"Annual":[45],"International":[46],"Symposium":[47],"Computer":[49],"Architecture":[50],"(ISCA)].":[51],"They":[52,88],"point":[53,60],"out":[54],"that":[55],"low":[56,72,100,141,177],"resolution":[57,142,178],"fixed":[59],"characteristics":[61],"implementations":[64],"may":[65],"break":[66],"guarantees":[68,197],"due":[69],"quality":[73],"noising.":[75],"For":[76],"overcoming":[77],"this":[78,114,185],"weakness,":[79],"they":[80],"introduce":[81],"techniques":[83],"resampling":[85],"thresholding.":[87],"also":[89],"implemented":[90],"in":[91,119,132,184],"hardware":[92],"show":[94,116],"proposed":[96],"method":[97,214],"achieves":[98],"both":[99],"overhead":[101],"high":[103],"utility":[104,199],"local":[107],"differential":[108],"privacy,":[109],"with":[110,193,215],"sensor/IoT":[111],"benchmarks.":[112],"Whereas,":[113],"research":[115],"some":[117],"flaw":[118],"existing":[121],"above":[123],"improve":[125],"method.":[127,203],"We":[128],"give":[129],"case":[131],"which":[133,153,196],"infinite":[134],"loss":[136,175],"still":[137],"occurs":[138],"because":[139],"even":[143],"though":[144],"width":[146],"output":[149],"distribution":[150],"restricted,":[152],"was":[154],"not":[155],"investigated":[156],"yet":[157],"original":[160],"paper":[161],"ISCA2018.":[163],"Our":[164],"major":[165],"contribution":[166],"propose":[169],"an":[170],"improvement":[171],"avoid":[173],"enhance":[181],"protection":[183],"circuit.":[186],"Furthermore,":[187],"we":[188,205],"report":[189],"experimental":[191],"results":[192],"software":[194],"simulations,":[195],"our":[201,212],"improving":[202],"Finally,":[204],"discuss":[206],"power":[208],"limitation":[210],"improved":[213],"future":[216],"issues.":[218]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4319586080","counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-01-02T04:01:30.737012","created_date":"2023-02-09"}