• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Zhao, Bowen (Zhao, Bowen.) [1] | Chen, Wei-Neng (Chen, Wei-Neng.) [2] | Li, Xiaoguo (Li, Xiaoguo.) [3] | Liu, Ximeng (Liu, Ximeng.) [4] (Scholars:刘西蒙) | Pei, Qingqi (Pei, Qingqi.) [5] | Zhang, Jun (Zhang, Jun.) [6]

Indexed by:

EI Scopus SCIE

Abstract:

Recently, evolutionary computation (EC) has experienced significant advancements due to the integration of machine learning, distributed computing, and big data technologies. These developments have led to new research avenues in EC, such as distributed EC and surrogate-assisted EC. While these advancements have greatly enhanced the performance and applicability of EC, they have also raised concerns regarding privacy leakages, specifically the disclosure of optimal results and surrogate models. Consequently, the combination of evolutionary computation and privacy protection becomes an increasing necessity. However, a comprehensive exploration of privacy concerns in evolutionary computation is currently lacking, particularly in terms of identifying the object, motivation, position, and method of privacy protection. To address this gap, this paper aims to discuss three typical optimization paradigms, namely, centralized optimization, distributed optimization, and data-driven optimization, to characterize optimization modes of evolutionary computation and proposes BOOM (i.e., oBject, mOtivation, pOsition, and Method) to sort out privacy concerns related to evolutionary computation. In particular, the centralized optimization paradigm allows clients to outsource optimization problems to a centralized server and obtain optimization solutions from the server. The distributed optimization paradigm exploits the storage and computational power of distributed devices to solve optimization problems. On the other hand, the data-driven optimization paradigm utilizes historical data to address optimization problems without explicit objective functions. Within each of these paradigms, BOOM is used to characterize the object and motivation of privacy protection. Furthermore, this paper discuss the potential privacy-preserving technologies that strike a balance between optimization performance and privacy guarantees. Finally, this paper outlines several new research directions for privacy-preserving evolutionary computation.

Keyword:

Centralized optimization data-driven optimization Data privacy distributed optimization evolutionary computation Evolutionary computation Linear programming Machine learning Object recognition Privacy privacy protection Servers

Community:

  • [ 1 ] [Zhao, Bowen]Xidian Univ, Xian, Peoples R China
  • [ 2 ] [Pei, Qingqi]Xidian Univ, Xian, Peoples R China
  • [ 3 ] [Chen, Wei-Neng]South China Univ Technol, Guangzhou, Peoples R China
  • [ 4 ] [Li, Xiaoguo]Singapore Management Univ, Singapore, Singapore
  • [ 5 ] [Liu, Ximeng]Fuzhou Univ, Fuzhou, Peoples R China
  • [ 6 ] [Zhang, Jun]Nankai Univ, Tianjin, Peoples R China
  • [ 7 ] [Zhang, Jun]Hanyang Univ ERICA, Ansan, South Korea

Reprint 's Address:

  • [Chen, Wei-Neng]South China Univ Technol, Guangzhou, Peoples R China

Show more details

Version:

Related Keywords:

Related Article:

Source :

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE

ISSN: 1556-603X

Year: 2024

Issue: 1

Volume: 19

Page: 66-74

1 0 . 3 0 0

JCR@2023

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 1

Online/Total:66/10040407
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1