Professional Documents
Culture Documents
A Blockchained Federated Learning Framework For Cognitive Computing in Industry 4.0 Networks
A Blockchained Federated Learning Framework For Cognitive Computing in Industry 4.0 Networks
4, APRIL 2021
Abstract—Cognitive computing, a revolutionary AI con- process thoughts like that of the human brain [4]. In this context,
cept emulating human brain’s reasoning process, is pro- the usage of AI is specifically for the best problem-solving
gressively flourishing in the Industry 4.0 automation. With algorithm [5]. To better improve, cognitive computing beyond
the advancement of various AI and machine learning tech-
nologies the evolution toward improved decision making and make great efforts to reproduce human intelligence by taking
as well as data-driven intelligent manufacturing has already advantage of a diversity of factors [1], smart decision making
been evident. However, several emerging issues, including as well as big data analytics for Industry 4.0 is impending
the poisoning attacks, performance, and inadequate data progress.
resources, etc., have to be resolved. Recent research works Despite all the advantageous features, data-driven cognitive
studied the problem lightly, which often leads to unreliable
performance, inefficiency, and privacy leakage. In this arti- computing(D2C) is facing some nontrivial bottlenecks in Indus-
cle, we developed a decentralized paradigm for big data- try 4.0 scenarios. The main barriers of big D2C for smart man-
driven cognitive computing (D2C), using federated learn- ufacturing are threefold: first, low efficiency; second, privacy
ing and blockchain jointly. Federated learning can solve leakage; and third, insufficient incentive to data contribution [6],
the problem of “data island” with privacy protection and [7]. The low-efficiency roots in the massive volume of data from
efficient processing while blockchain provides incentive
mechanism, fully decentralized fashion, and robust against a variety of Industry 4.0 devices [1]. For the data curators, there is
poisoning attacks. Using blockchain-enabled federated a risk of privacy leakage to contribute their data to the cognitive
learning help quick convergence with advanced veri- servers or service providers [8], which subsequently leads to the
fications and member selections. Extensive evaluation reduction of incentive to share the data [4]. These three issues
and assessment findings demonstrate D2C’s effectiveness
pose great challenges to the accuracy of outcomes.
relative to existing leading designs and models.
To fix the privacy issues, differential privacy [9], and
Index Terms—Big data-driven, blockchain, cognitive
computing, federated learning, Industry 4.0, smart manu-
cryptography-based methods [10] are widely deployed [11].
facturing. However, differential privacy and its variants lead to the degrada-
tion of data utility while cryptography-based methods increase
I. INTRODUCTION extra burdens to communication and computation resources
HE rapid proliferation of smart machines for Industry 4.0 [12]. The efficiency issues are mitigated by the mild modifi-
T and the development of novel approaches using AI and
distributed learning for human-level information processing
cation of algorithms or light-weighted cryptography methods.
These methods can only slightly alleviate this issue but bring
have enabled the prosperity of cognitive computing [1], [2]. It is about other issues like inaccuracy or less security protection
often regarded as the technology that is built upon the scientific simultaneously.
rationales behind AI and signal processing [3]. The ultimate goal Therefore, we propose to use federated learning as the learn-
is to allow the end machines like computers to learn from and ing paradigm for cognitive computing. With federated learning,
a central server and local servers maintain the same model at the
Manuscript received April 27, 2020; revised June 18, 2020; accepted same time [1], [13], [14]. The training process is completed on
June 30, 2020. Date of publication July 7, 2020; date of current ver- their own servers and only the model updates are exchanged from
sion January 4, 2021. Paper no. TII-20-2101. (Corresponding author: L.
Gao.)
local servers to the central server. Therefore, the local data will
Youyang Qu, Shiva Raj Pokhrel, Longxiang Gao, and Yong Xi- not be revealed and thereby the privacy is preserved. Besides, the
ang are with the Deakin Blockchain Innovation Lab. School of volume of model updates is much smaller compared to the data
Information Technology, Deakin University, Burwood, VIC 3125,
Australia (e-mail: y.qu@deakin.edu.au; shiva.pokhrel@deakin.edu.au;
itself. The efficiency is also guaranteed in this way. Nevertheless,
longxiang.gao@deakin.edu.au; yong.xiang@deakin.edu.au). federated learning also is subject to poisoning attacks, which
Sahil Garg is with the École de technologie supérieure, Montreal, is a primary attack in the data science domain [15], [16]. The
Quebec H3C 1K3, Canada (e-mail: sahil.garg@ieee.org). aggregation performance is also constrained by the number and
Color versions of one or more of the figures in this article are available
online at https://ieeexplore.ieee.org. quality of the local devices [17]. In addition, the incentive of
Digital Object Identifier 10.1109/TII.2020.3007817 participants is not yet considered [18]. All these existing and
1551-3203 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Central Mechanical Engineering Research Institute. Downloaded on March 21,2023 at 12:18:42 UTC from IEEE Xplore. Restrictions apply.
QU et al.: BLOCKCHAINED FEDERATED LEARNING FRAMEWORK FOR COGNITIVE COMPUTING IN INDUSTRY 4.0 NETWORKS 2965
emerging issues pose great challenges to the performances of Federated learning can provide advanced features from as-
cognitive computing. pects of privacy protection and efficiency. The architecture of
To further address these issues and make cognitive computing federated learning is discussed in [22]. Sattler et al. [13] pro-
more practical in Industry 4.0, we integrate blockchain to our posed a variant of federated learning to provide extra robust
proposal and developed a decentralized cognitive computing and communication efficiency. Blockchain is an advanced dis-
model (D2C). By deploying blockchain as the underlying ar- tributed ledger technology and has been deployed in several
chitecture, all local devices are regarded as the miners and users real-world applications. The decentralized features enable the
of the blockchain. The verification mechanism of blockchain can removal of a trusted central authority [15]. It provides several
guarantee the authenticity of the data while select high-quality advanced features such as data authenticity, verification, incen-
and trustful edge devices. The reward and privacy-preserving tive mechanism, etc [23].
mechanism provide sufficient incentive to the users to participate The advantageous characteristics of federated learning make
in the learning process and get rewards proportional to the it suitable to work as the learning paradigms of cognitive learn-
contribution. Moreover, by decentralizing the cognitive com- ing [1]. However, there are some issues for federated learning,
puting, each of the participants could lead the learning process, such as poisoning attacks, insufficient incentives, etc. Therefore,
which removes the assumption of a trusted central authority and some pioneer works on the integration of blockchain and fed-
prevents from single-point failure. erated learning appear to provide enhanced protection. Pokhrel
The main contributions of this article are summarized as and Choi [18], established on-vehicle federated learning using
follows. blockchain to ensure privacy protection and data authenticity
1) To improve the performances of Industry 4.0 manufac- [24]. Similarly, Lu et al. [17] extended this paradigm to the
turing, we propose a novel framework by using federated industrial internet of things to allow privacy-preserving data
learning paradigm for big D2C. With the proposed frame- sharing in this scenario. Kim et al. [25] discussed the significance
work, the privacy and performance issues associated in of member selection and incentive mechanism in blockchain
cognitive computing has been ameliorated significantly. to make federated learning more feasible and practical [26].
2) We devise a D2C paradigm in the industry 4.0 model by Nevertheless, there is barely any discussion on blockchained
jointly using federated learning and blockchain. By in- federated learning for cognitive computing.
corporating blockchain into federated learning, cognitive There are two similar works compared with the proposed
computing can further improve the performances in terms model. First, Pokhrel and Choi [14], [18], developed a novel
of poisoning attack resistance, accuracy, and incentive framework to use federated learning to improve the privacy
mechanism for Industry 4.0 automation. protection and efficiency simultaneously in the internet of ve-
3) To model the confrontation against the adversaries, we hicles scenario. This article provides a detailed analysis of the
develop an optimization model using a modified Marko- performance of efficient communication. The major difference
vian decision process, which improves the accuracy and is that blockchain is not used such that fails to provide incen-
robustness against poisoning attacks. tive mechanism, decentralization, and poisoning attack features.
Another relevant analysis is reported in [15]. However, there
are some significant differences. In this article, we enhanced
the ideas proposed in [14], [15], [18] as follows. First of all,
II. RELATED WORK we use blockchain-enabled federated learning as the underlying
In recent years, real momentum has been building up on structure of cognitive computing to enhance its performance in
the investigation of cognitive computing from various aspects, big data era. Second, in this work, we discuss a fully decentral-
in particular from the perspective of federated learning and ized federated learning compared with that which is not fully
blockchain. decentralized. Third, this work focuses more on the performance
To guarantee the privacy protection of cognitive computing, upgradation using a modified Markov decision process (MDP)
Liu et al. [19] devised a location privacy-preserving model but the previous one addressed the decentralized privacy issues.
based on dynamic spectrum auction . To further improve, Grissa Last but not least, the scenarios are quite different, which results
et al. [10] developed a novel location privacy model built upon in a significant distinction from the aspect of inner logic when
encrypted probabilistic data structures. The early-stage works deploying blockchain-enabled federated learning.
focused more on location privacy rather than the privacy of the
raw data. Motivated by this, Wang et al. [9] proposed a novel
differential privacy based data streaming model using Kalman III. BLOCKCHAIN-ENABLED FEDERATED LEARNING
filter. The efficiency is mainly guaranteed by the modification To enhance the D2C in Industry 4.0, we present the model
of algorithms or the development of hardware. In [20] and [1], of D2C using blockchain-enabled federated learning, which is
the authors proposed fog-based cognitive computing networks shown in Fig. 1. Cognitive computing requires data collection
independently, which is a classic way to improve efficiency. In from multiple resources while privacy issues are emerging from
terms of the incentive mechanism, the authors showed how it the end users or edge devices side. Therefore, we use federated
can enhance the performances of cognitive computing systems learning, with which only the model is shared rather than the raw
in [21]. However, current works barely considered all identified data. Both efficiency and data utility can be guaranteed in this
issues in a comprehensive manner. way. Besides, we use blockchain technology as the underlying
Authorized licensed use limited to: Central Mechanical Engineering Research Institute. Downloaded on March 21,2023 at 12:18:42 UTC from IEEE Xplore. Restrictions apply.
2966 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 4, APRIL 2021
1
NV
f (ω) = fk (ω), (1)
ND S i=1 sk ∈Si
Authorized licensed use limited to: Central Mechanical Engineering Research Institute. Downloaded on March 21,2023 at 12:18:42 UTC from IEEE Xplore. Restrictions apply.
QU et al.: BLOCKCHAINED FEDERATED LEARNING FRAMEWORK FOR COGNITIVE COMPUTING IN INDUSTRY 4.0 NETWORKS 2967
Authorized licensed use limited to: Central Mechanical Engineering Research Institute. Downloaded on March 21,2023 at 12:18:42 UTC from IEEE Xplore. Restrictions apply.
2968 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 4, APRIL 2021
IV. PERFORMANCE OPTIMIZATION USING MDP where the Ψ is the adversary’s maximum computing power.
When Ψ ≥ t, we say the adversary is able to analyze all global
In this section, we use the MDP to model the selection of the
updates while Ψ < t means the adversary is incapable of doing
aggregator (temporary central server) in each round such that the
so and have to choose a strategy to analyze.
D2C model is optimized in terms of accuracy and security. The
MDP is shown in Fig. 3. For clarity, we use a two-player game as
an example. This constraint could be extended to multiplayers B. System States of MDP
cases easily. In this context, the aggregator acts as the temporary central
The MDP is a game that is played in multiple but fi- server and broadcasts the global updates to all end devices for
nite times while the game is constrained by the probabilistic further utility. The global updates of the aggregator are published
Authorized licensed use limited to: Central Mechanical Engineering Research Institute. Downloaded on March 21,2023 at 12:18:42 UTC from IEEE Xplore. Restrictions apply.
QU et al.: BLOCKCHAINED FEDERATED LEARNING FRAMEWORK FOR COGNITIVE COMPUTING IN INDUSTRY 4.0 NETWORKS 2969
through blockchain depending on the current system state. The MDP. To formulate the Nash equilibrium, we define the payoff
adversary tries to infer the distribution or the data pattern, and of each stage as the subtraction of a QoS-based value and the
sometimes even the state transition rules. entropy-based information loss in (7)
From the aspect of the poisoning attack, both current global
updates and the adversary’s action should be considered. Intu- R (S t , Atu , Atad = QoS Atu − ω · IL S t (7)
itively, the aggregator has a prior belief in the action and strategy
of the adversary. Thus, the aggregator can only estimate the where QoS(Atu ) is a mapping function that denotes the qual-
adversary’s action based on the output of the last attack, which ity of global model updates, and IL(S t ) is the information
can be identified by the aggregator. For one thing, the output of loss of the global updates GUt derived from the information
the last attack indicates if the adversary successfully launches the entropy.
attack and inject the falsified data into it. For another, the current
system states have only one precondition, namely, the last system D. Nash Equilibrium
state of the MDP. An instance is that the aggregator identifies a In the modeled dynamic zero-sum game, the strategy of
significantly reverse trend away from the convergence and then MDP is defined as the probabilistic state transitions based on
it can be relatively sure of the existence of a poisoning attack in the actions of the aggregator and the adversary. To denote the
this round. That is also the reason why blockchain is necessary strategy of the aggregator, we use τ u : Su −→ δ(Au ) while
to store the record of all global updates, especially the ones τ ad : Sad −→ δ(Aad ) is the strategy of the adversary, where
impacted by poisoning attacks. We use ARt as the poisoning (Su , Sad ) ∈ S is the space of system state. Besides, δ(Au ) and
attack outputs at stage t. If ARt = 1, we regard the poisoning δ(Aad ) are two probability distributions over the action spaces
attack as a successful one. If ARt = 0, it indicates a failed of the aggregator and the adversary.
poisoning attack. Otherwise, there is a partially functioning To make the model practical, we define the learning process
poisoning attack. To sum up, the current action of the aggregator as a finite process while the initial state S0 starts from the
depends on both the global updates of this round and the output first aggregator shares the first global update GU0 at stage
of the last poisoning attack. We define the system state as t = 0. Based on a specific system state s ∈ S and two strategies
S t = {GUt , ARt } (5) (τ ad , τ u ), we reformulate the payoff of the aggregator as
P U τ (s) = E R S t , Atu , Atad
τu , τad , S 0 = s . (8)
Based on (5), we move on the discussion on the state tran- t=0
sitions in this MDP model. The uncertainty of state St roots in
the uncertainty of global updates GUt , while the system state According to the previous modeling, we want to derive the
depends on the actions of the two parties. Similarly, the attack optimal strategy, in which the actions Atu , Atad are decided by
result ARt is decided by the actions. Based on the abovemen- the policies τu , τad . Thus, we further reform (8) as
tioned dependency relations, we formulate the state transition
as P U τ (s) = R s, Atu , Atad + Pr s
s, Ats , Atad P U τ (
s) .
s
Pr S t
S t−1 , At−1 t−1
u , Aad (9)
We assume the aggregator and the adversary are two rational
players who always follow their best strategies. We use τu∗ to
= Pr GUt
GUt−1 Pr ARt
ARt−1 , At−1 u , Aad
t−1
∗
represent the optimal strategies of the aggregator and τad to
= Pr GUt
GUt−1 Pr ARt
At−1 t−1
u , Aad . (6) denote the adversary, respectively. At a specific stage, an optimal
strategy pair is defined a τ ∗ = {τu∗ + τad
∗
}, to denote the optimal
The second equality is reached as the output of the poisoning strategies at this stage. This optimal strategy pair is regarded to
attack ARt at stage t is exclusively determined by the actions of be equivalent to the Nash equilibrium of the dynamic zero-sum
the aggregator and the adversary at stage t − 1. In other words, game, which is shown as
the output of poisoning attack ARt−1 has no impact on ARt . Lemma 1 (Nash equilibrium): Let s ∈ S be the state in a
dynamic zero-sum game, the Nash equilibrium is the optimal
C. Payoff Function of MDP strategy pair τ ∗ = {τu∗ + τad∗
}, which is
We introduce the payoff function of MDP in this section. ∗
P U τ (s) ≥ P U τad (s)
The payoff function is based on the actions and states of the (10)
∗
aggregator and the adversary in MDP, which are the aggregator P U τ (s) ≤ P U τu (s)
and the adversary in this context. The multistage game is played
for finite times. There is a payoff value rt (S t , Atu , Atad ) for each where τad = {τu , τad ∗ }, τu = {τu ∗ , τad }, for all τad and τu .
stage deriving from the actions of the aggregator and current In Section IV-C, we have concluded that this is a zero-sum
state S at stage t. The aggregator Au aims at maximizing the game where the aggregator aims at maximizing τ u∗ while the
∗
payoff from a long-term perspective while the adversary hopes adversary will try the best to minimize τ ad . Based on (9),
to minimize it in an opposite way. In this case, the model could we formulate the derivation of Nash equilibrium as a min–max
be defined as a dynamic zero-sum game built upon the given problem as
Authorized licensed use limited to: Central Mechanical Engineering Research Institute. Downloaded on March 21,2023 at 12:18:42 UTC from IEEE Xplore. Restrictions apply.
2970 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 4, APRIL 2021
TABLE I
GLOBAL ACCURACY USING CIFAR-10
Authorized licensed use limited to: Central Mechanical Engineering Research Institute. Downloaded on March 21,2023 at 12:18:42 UTC from IEEE Xplore. Restrictions apply.
QU et al.: BLOCKCHAINED FEDERATED LEARNING FRAMEWORK FOR COGNITIVE COMPUTING IN INDUSTRY 4.0 NETWORKS 2971
Fig. 5. Poisoning attackresistance performance: the impact of hash Fig. 7. Block generation rate: the convergence latency versus the
rate on the turbulence of data and minimum hash rate requirements block generation rate and the optimal block generation rate are pre-
of successful poisoning attacks are presented. (a) Hash rate versus sented. (a) λ (b) λ∗ .
turbulence of data (b) Minimum requirements of successful poisoning
attacks.
the constrains in this big data era, especially for Industry 4.0
scenarios.
Authorized licensed use limited to: Central Mechanical Engineering Research Institute. Downloaded on March 21,2023 at 12:18:42 UTC from IEEE Xplore. Restrictions apply.
2972 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 17, NO. 4, APRIL 2021
(1.8% on average) than the theoretically calculated values, which [12] Y. Qu, S. Yu, W. Zhou, S. Peng, G. Wang, and K. Xiao, “Privacy
shows the effectiveness of D2C. of things: Emerging challenges and opportunities in wireless inter-
net of things,” IEEE Wireless Commun., vol. 25, no. 6, pp. 91–97,
We assume the blockchain is tamper-proof, which has an Dec. 2018.
abundantly large network to defeat the untrusted parties. In the [13] F. Sattler, S. Wiedemann, K.-R. Müller, and W. Samek, “Ro-
proposed model, only the Industry 4.0 devices have full control bust and communication-efficient federated learning from non-
IID data,” IEEE Trans. Neural Netw. Learn. Syst., 2019, doi:
over their own data. It is nearly impossible for an adversary 10.1109/TNNLS.2019.2944481.
to compromise the network due to decentralization. Besides, [14] S. R. Pokhrel and J. Choi, “Improving TCP performance over WiFi for
model updates are protected by digital signatures. Even if the internet of vehicles: A federated learning approach,” IEEE Trans. Veh.
Technol., vol. 69, no. 6, pp. 6798–6802, Jun. 2020.
adversary can access the data of specific Industry 4.0 device, the [15] Y. Qu et al., “Decentralized privacy using blockchain-enabled federated
on-chain data is the pointer instead of the raw data, which makes learning in fog computing,” IEEE Internet Things J., vol. 7, no. 6,
it even hard to launch poisoning attacks. In the worst case, an pp. 5171–5183, Jun. 2020.
[16] L. Ma, Q. Pei, Y. Qu, K. Fan, and X. Lai, “Decentralized privacy-preserving
adversary compromises several Industry 4.0 device with its local reputation management for mobile crowdsensing,” in Proc. Int. Conf.
data, there are sufficiently distributed local copies, which will Secur. Privacy Commun. Syst., 2019, pp. 532–548.
overwrite the compromised ones. [17] Y. Lu, X. Huang, Y. Dai, S. Maharjan, and Y. Zhang, “Blockchain
and federated learning for privacy-preserved data sharing in indus-
trial IoT,” IEEE Trans. Ind. Informat., vol. 16, no. 6, pp. 4177–4186,
VI. CONCLUDING REMARKS Jun. 2020.
[18] S. R. Pokhrel and J. Choi, “Federated learning with blockchain for au-
In this article, we developed a novel D2C platform through tonomous vehicles: Analysis and design challenges,” IEEE Trans. Com-
the combined use of federated learning and blockchain for smart mun., 2020, doi: 10.1109/TCOMM.2020.2990686.
[19] S. Liu, H. Zhu, R. Du, C. Chen, and X. Guan, “Location privacy preserving
manufacturing in Industry 4.0. Our federated learning idea ad- dynamic spectrum auction in cognitive radio network,” in Proc. IEEE 33rd
dresses issues of privacy and efficiency while blockchain facili- Int. Conf. Distrib. Comput. Syst., 2013, pp. 256–265.
tates federated learning for poisoning-attack-proof functionality [20] J. Wu, M. Dong, K. Ota, J. Li, W. Yang, and M. Wang, “Fog-computing-
enabled cognitive network function virtualization for an information-
by adopting advanced selection method. The D2C paradigm centric future internet,” IEEE Commun. Mag., vol. 57, no. 7, pp. 48–54,
significantly increased computational processing efficiency for Jul. 2019.
intelligent manufacturing. Extensive assessment findings de- [21] Y. Liu, A. Liu, T. Wang, X. Liu, and N. N. Xiong, “An intelligent incentive
mechanism for coverage of data collection in cognitive internet of things,”
rived from the real-world datasets confirms D2C dominance. In Future Gener. Comput. Syst., vol. 100, pp. 701–714, 2019.
our future research, we are planning to find the optimal tradeoff [22] J. Konečnỳ, H. B. McMahan, F. X. Yu, P. Richtárik, A. T. Suresh, and
among several performance indexes and develop a customized D. Bacon, “Federated learning: Strategies for improving communication
efficiency,” 2016 arXiv:1610.05492.
reward system to promote public devices to participate in the [23] Y. Xiao, N. Zhang, W. Lou, and Y. T. Hou, “A survey of distributed
high-performing industry. consensus protocols for blockchain networks,” IEEE Commun. Surv. Tut.,
vol. 22, no. 2, pp. 1432–1465, 2020.
[24] S. R. Pokhrel, “Towards efficient and reliable federated learning using
REFERENCES blockchain for autonomous vehicles,” Comput. Netw., 2020.
[25] H. Kim, J. Park, M. Bennis, and S.-L. Kim, “Blockchained on-device
[1] S. R. Pokhrel and S. Singh, “Compound-TCP performance for industry federated learning,” IEEE Commun. Lett., vol. 24, no. 6, pp. 1279–1283,
4.0 WiFi: A cognitive federated learning approach,” IEEE Trans. Ind. 2019.
Informat., 2020, doi: 10.1109/TII.2020.2985033. [26] S. R. Pokhrel and J. Choi, “A decentralized federated learning approach
[2] S. R. Pokhrel and S. Garg, “Multipath communication with deep Q- for connected autonomous vehicles,” in Proc. IEEE Wireless Commun.
Network for industry 4.0 automation and orchestration,” IEEE Trans. Ind. Netw. Conf. Workshops, 2020, pp. 1–6.
Informat., 2020, doi: 10.1109/TII.2020.3000502. [27] B. Wang, Y. Wu, K. Liu, and T. Clancy, “An anti-jamming stochastic game
[3] D. S. Modha, R. Ananthanarayanan, S. K. Esser, A. Ndirango, A. J. for cognitive radio networks,” IEEE J. Sel. Areas Commun., vol. 29, no. 4,
Sherbondy, and R. Singh, “Cognitive computing,” Commun. ACM, vol. 54, pp. 877–889, Apr. 2011.
no. 8, pp. 62–71, 2011.
[4] N. Kriegeskorte and P. K. Douglas, “Cognitive computational neuro-
science,” Nature Neurosci., vol. 21, no. 9, pp. 1148–1160, 2018.
[5] K. Hwang and M. Chen, Big-data Analytics for Cloud, IoT and Cognitive
Computing. Hoboken, NJ, USA: Wiley, 2017.
[6] S. Gupta, A. K. Kar, A. Baabdullah, and W. A. Al-Khowaiter, “Big data
with cognitive computing: A review for the future,” Int. J. Inf. Manage.,
vol. 42, pp. 78–89, 2018.
[7] B. S. Gu, L. Gao, X. Wang, Y. Qu, J. Jin, and S. Yu, “Privacy
on the edge: Customizable privacy-preserving context sharing in hi- Youyang Qu (Member, IEEE) received the B.S.
erarchical edge computing,” IEEE Trans. Netw. Sci. Eng., 2019, doi: degree in mechanical automation and M.S. de-
10.1109/TNSE.2019.2933639. gree in software engineering from the Beijing
[8] Y. Zhu and V. J. Reddi, “Cognitive computing safety: The new horizon for Institute of Technology, Beijing, China, in 2002
reliability,” IEEE Micro, vol. 37, pp. 15–21, Jan./Feb. 2017. and 2015, respectively, and the Ph.D. degree
[9] J. Wang et al., “Improved Kalman filter based differentially private stream- in informaiton technology from the School of
ing data release in cognitive computing,” Future Gener. Comput. Syst., Information Technology, Deakin University, Mel-
vol. 98, pp. 541–549, 2019. bourne, VIC, Australia, in 2019.
[10] M. Grissa, A. A. Yavuz, and B. Hamdaoui, “Location privacy preservation He is a Postdoctoral Research Fellow with
in database-driven wireless cognitive networks through encrypted proba- Deakin University. His current research interests
bilistic data structures,” IEEE Trans. Cogn. Commun. Netw., vol. 3, no. 2, focus on dealing with security and personalized
pp. 255–266, Jun. 2017. privacy issues in blockchain, social networks, machine learning, and IoT.
[11] S. R. Pokhrel, Y. Qu, and L. Gao, “QoS-aware personalized privacy with Dr Qu is active in communication society and has served as a TPC
multipath TCP for industrial IoT: Analysis and design,” IEEE Internet Member for IEEE flagship conferences including IEEE International
Things J., vol. 7, no. 6, pp. 4849–4861, Jun. 2020. Conference on Communications (ICC) and IEEE Globecom.
Authorized licensed use limited to: Central Mechanical Engineering Research Institute. Downloaded on March 21,2023 at 12:18:42 UTC from IEEE Xplore. Restrictions apply.
QU et al.: BLOCKCHAINED FEDERATED LEARNING FRAMEWORK FOR COGNITIVE COMPUTING IN INDUSTRY 4.0 NETWORKS 2973
Shiva Raj Pokhrel (Member, IEEE) received Longxiang Gao (Senior Member, IEEE) re-
the B.E. and M.E. degrees from Pokhara Univer- ceived the Ph.D. degree in computer science
sity, Pokhara, Nepal, in 2007 and 2013, respec- from Deakin University, Burwood, VIC, Australia,
tively, and the Ph.D. degree from the Swinburne in 2013.
University of Technology, Melbourne, VIC, Aus- He was a Postdoctoral Research Fellow
tralia, in 2017, all in ICT engineering. with IBM Research and Development Aus-
He is a Lecturer of Mobile Computing with tralia, Southbank. He is currently a Senior
Deakin University, Geelong, VIC, Australia. He Lecturer with the School of Information Tech-
was a Research Fellow with the University of nology, Deakin University. He has more than
Melbourne (2017–2018) and a Network En- 70 publications, including patent, monograph,
gineer with Nepal Telecom (2007–2014). His book chapter, journal, and conference papers.
current research interests include federated learning, Industry 4.0, Some of his publications have been published in the top venue,
blockchain modeling, optimization, recommender systems, beyond 5G, such as the IEEE TRANSACTIONS ON MOBILE COMPUTING, the IEEE
cloud computing, dynamics control, Internet of Things and cyber– INTERNET OF THINGS JOURNAL, the IEEE TRANSACTIONS ON DEPEND-
physical systems as well as their applications in smart manufacturing ABLE AND SECURE COMPUTING, and the IEEE TRANSACTIONS ON VE-
and autonomous vehicles and cities. HICULAR TECHNOLOGY. His current research interests include data
Dr. Pokhrel serves/served as the Workshop Chair/Publicity Co-Chair processing, mobile social networks, fog computing, and network
for several IEEE/ACM conferences including IEEE Conference on Com- security.
puter Communications, IEEE GLOBECOM, IEEE ICC, ACM Interna- Dr. Gao is active in the IEEE Communication Society. He has served
tional Conference on Mobile Computing and Networking, and more. as the TPC Co-Chair, the Publicity Co-Chair, the Organization Chair,
He was the recipient of the prestigious Marie Skłodowska–Curie grant and a TPC member for many international conferences.
Fellowship in 2017.
Authorized licensed use limited to: Central Mechanical Engineering Research Institute. Downloaded on March 21,2023 at 12:18:42 UTC from IEEE Xplore. Restrictions apply.