SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
Privacy-preserving blockchain-based federated
learning for traffic
flow prediction
Research background
Research ideas
Research contents
Contributions
1
2
3
4
Future plans & References
5
Contents
1.Research background
Research background
Background:
As accurate and timely traffic flow information is extremely important for traffic management,
traffic flow prediction has become a vital component of intelligent transportation systems. However,
existing traffic flow prediction methods based on centralized machine learning need to gather raw
data for model training, which involves serious privacy exposure risks.
2.Research ideas
- - -
- - -
The process of proposing ideas
3.Research Contents
1. Fedrate Learning
The specific implementation of ideas
The goal of this paper is to achieve accurate and
timely TFP through a lightweight federated learning
scheme. Using GRU neural network as a lightweight
technology to predict future traffic flow and
implementing the application of FL in TFP systems.
Establish a dedicated consortium
blockchain and implement a decentralized
TFP system using FL. For the convenience of
system functionality, we first select a certain
number of RSUs as authorized miners. To this
end, upgrade the hardware configuration of
these RSUs to have powerful computing,
storage, and communication capabilities to
verify local model updates submitted by
distributed vehicles and identify low accuracy
and unreliable updates. Through carefully
designed consensus algorithms, they
generate a new block containing qualified
local model update records.
2. Distributed TFP Systems and Federated Learning
The specific implementation of ideas
Use a consensus algorithm called dBFT to execute the consensus process among miners; Only
qualified local model updates are aggregated to generate the latest global model.In this consensus
process, false or low-quality local model updates are not integrated into the global model training,
which improves the FL performance and reduces poisoning attacks. Therefore, the proposed
consortium blockchain with a dBFT-based consensus algorithm ensures the secure, reliable, and
privacy-preserving characteristics of the FL-based TFP method for ITS.
The specific implementation of ideas
3. Design of consortium blockchain
step 1:
Initialization
Step 2:
Leader Selection
Step 3:
Local model training
Step 4:
Model update verification
The specific implementation steps of consensus algorithm
Step 5:
Candidate block
verification
Step 6:
Global model
training
The specific implementation of ideas
4.Local Differential Privacy Technology for Protecting Vehicle Communication Privacy in TFP
Definition 1: Participants should add random perturbations to the data. In order to protect the privacy of
vehicle location information in TFP tasks, a Gaussian mechanism is used to add carefully designed noise to
interfere with the location information. Firstly, define the Gaussian mechanism as defined in Definition 2:
Definition 2:Gaussian mechanism
Definition 3:Vehicle information after disturbance
Experiment
Performance comparison of MAE, MSE, and RMSE, For federated
learning-based GRU model, LSTM model, SAE model, And SVM
model.
Experiment
4. Contributions
Introduced a federated learning framework to protect the privacy of
vehicle data.
Applying GRU model to FL framework to obtain accurate TFP.
In order to prevent malicious attackers from damaging the urban traffic
flow management system, a decentralized FL framework has been
implemented using blockchain to defend against poisoning attacks.
Contrib
utions
Contribution of the paper
Using local differential privacy technology to protect privacy in vehicle
location sharing.
5. Future plans &
References
Conduct experiments and improve ideas, with a preliminary logic.
The second semester of the first year of graduate school
Complete your own experiment and prepare the preliminary draft of the paper.
The first semester of the second year of graduate school
Successfully issued the paper.
The second semester of the second year of graduate school
Successfully graduated.
Third year of graduate school
My own graduate plan
References
[1] Y. Lv, Y. Duan, W. Kang, Z. Li, F.Y. Wang, Traffic flow prediction with big data: a deep learning approach, IEEE
Trans. Intell. Transp. Syst. 16 (2014) 865–873.
[2] R. Vinayakumar, M. Alazab, S. Srinivasan, Q. Pham, S.K. Padannayil, K. Simran, A visualized botnet detection
system based deep learning for the internet of things networks of smart cities, IEEE Trans. Ind. Appl. 56 (2020)
4436–4456.
[3] X. Yang, et al., Deep relative attributes, IEEE Trans. Multimed. 18 (2016) 1832–1842.
[4] M.S. Hossain, M. Al-Hammadi, G. Muhammad, Automatic fruit classification using deep learning for
industrial applications, IEEE Trans. Ind. Inf. 15 (2019) 1027–1034.
[5] L. Lyu, J. Yu, K. Nandakumar, Y. Li, X. Ma, J. Jin, H. Yu, K.S. Ng, Towards fair and privacy-preserving federated
deep models, IEEE Trans. Parallel Distrib. Syst. 31 (2020) 2524–2541.
[6] K. Cho, B. Van Merriënboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, Y. Bengio, Learning phrase
representations using rnn encoder– decoder for statistical machine translation, 2014, arXiv preprint arXiv:
1406.1078.
TH
A
N
KS
2 0 2 4 年 03月
T h a n k y o u f o r w a t c h i n g

Contenu connexe

Similaire à Privacy-preserving blockchain-based federated learning for traffic flow prediction

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a survey
eSAT Publishing House
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Ijcem Journal
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Ijcem Journal
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
Dr. Amarjeet Singh
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
Dr. Amarjeet Singh
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
Editor IJARCET
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
Editor IJARCET
 

Similaire à Privacy-preserving blockchain-based federated learning for traffic flow prediction (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a survey
 
SECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBAC
SECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBACSECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBAC
SECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBAC
 
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLESIEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
IEEE 2010 JAVA, .NET & EMBEDDED SYSTEM TITLES
 
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...Algorithm 1 User-Level Distributed Matrix Factorization Init   Server Initial...
Algorithm 1 User-Level Distributed Matrix Factorization Init Server Initial...
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
 
C0848062312
C0848062312C0848062312
C0848062312
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
Real-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance SystemReal-Time WebRTC based Mobile Surveillance System
Real-Time WebRTC based Mobile Surveillance System
 
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
AN EFFICIENT ROUTING PROTOCOL FOR MOBILE AD HOC NETWORK FOR SECURED COMMUNICA...
 
Classification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceClassification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of Service
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
 
Security Analysis and Delay Evaluation for SIP - Based Mobile Mass Examinatio...
Security Analysis and Delay Evaluation for SIP - Based Mobile Mass Examinatio...Security Analysis and Delay Evaluation for SIP - Based Mobile Mass Examinatio...
Security Analysis and Delay Evaluation for SIP - Based Mobile Mass Examinatio...
 

Dernier

Quantifying Artificial Intelligence and What Comes Next!
Quantifying Artificial Intelligence and What Comes Next!Quantifying Artificial Intelligence and What Comes Next!
Quantifying Artificial Intelligence and What Comes Next!
University of Hertfordshire
 
Tuberculosis (TB)-Notes.pdf microbiology notes
Tuberculosis (TB)-Notes.pdf microbiology notesTuberculosis (TB)-Notes.pdf microbiology notes
Tuberculosis (TB)-Notes.pdf microbiology notes
jyothisaisri
 
Continuum emission from within the plunging region of black hole discs
Continuum emission from within the plunging region of black hole discsContinuum emission from within the plunging region of black hole discs
Continuum emission from within the plunging region of black hole discs
Sérgio Sacani
 
Exomoons & Exorings with the Habitable Worlds Observatory I: On the Detection...
Exomoons & Exorings with the Habitable Worlds Observatory I: On the Detection...Exomoons & Exorings with the Habitable Worlds Observatory I: On the Detection...
Exomoons & Exorings with the Habitable Worlds Observatory I: On the Detection...
Sérgio Sacani
 
Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...
Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...
Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...
US Environmental Protection Agency (EPA), Center for Computational Toxicology and Exposure
 

Dernier (20)

Quantifying Artificial Intelligence and What Comes Next!
Quantifying Artificial Intelligence and What Comes Next!Quantifying Artificial Intelligence and What Comes Next!
Quantifying Artificial Intelligence and What Comes Next!
 
Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...
Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...
Molecular and Cellular Mechanism of Action of Hormones such as Growth Hormone...
 
Tuberculosis (TB)-Notes.pdf microbiology notes
Tuberculosis (TB)-Notes.pdf microbiology notesTuberculosis (TB)-Notes.pdf microbiology notes
Tuberculosis (TB)-Notes.pdf microbiology notes
 
Alternative method of dissolution in-vitro in-vivo correlation and dissolutio...
Alternative method of dissolution in-vitro in-vivo correlation and dissolutio...Alternative method of dissolution in-vitro in-vivo correlation and dissolutio...
Alternative method of dissolution in-vitro in-vivo correlation and dissolutio...
 
ERTHROPOIESIS: Dr. E. Muralinath & R. Gnana Lahari
ERTHROPOIESIS: Dr. E. Muralinath & R. Gnana LahariERTHROPOIESIS: Dr. E. Muralinath & R. Gnana Lahari
ERTHROPOIESIS: Dr. E. Muralinath & R. Gnana Lahari
 
Plasma proteins_ Dr.Muralinath_Dr.c. kalyan
Plasma proteins_ Dr.Muralinath_Dr.c. kalyanPlasma proteins_ Dr.Muralinath_Dr.c. kalyan
Plasma proteins_ Dr.Muralinath_Dr.c. kalyan
 
Continuum emission from within the plunging region of black hole discs
Continuum emission from within the plunging region of black hole discsContinuum emission from within the plunging region of black hole discs
Continuum emission from within the plunging region of black hole discs
 
FORENSIC CHEMISTRY ARSON INVESTIGATION.pdf
FORENSIC CHEMISTRY ARSON INVESTIGATION.pdfFORENSIC CHEMISTRY ARSON INVESTIGATION.pdf
FORENSIC CHEMISTRY ARSON INVESTIGATION.pdf
 
The Scientific names of some important families of Industrial plants .pdf
The Scientific names of some important families of Industrial plants .pdfThe Scientific names of some important families of Industrial plants .pdf
The Scientific names of some important families of Industrial plants .pdf
 
family therapy psychotherapy types .pdf
family therapy psychotherapy types  .pdffamily therapy psychotherapy types  .pdf
family therapy psychotherapy types .pdf
 
Manganese‐RichSandstonesasanIndicatorofAncientOxic LakeWaterConditionsinGale...
Manganese‐RichSandstonesasanIndicatorofAncientOxic  LakeWaterConditionsinGale...Manganese‐RichSandstonesasanIndicatorofAncientOxic  LakeWaterConditionsinGale...
Manganese‐RichSandstonesasanIndicatorofAncientOxic LakeWaterConditionsinGale...
 
Exomoons & Exorings with the Habitable Worlds Observatory I: On the Detection...
Exomoons & Exorings with the Habitable Worlds Observatory I: On the Detection...Exomoons & Exorings with the Habitable Worlds Observatory I: On the Detection...
Exomoons & Exorings with the Habitable Worlds Observatory I: On the Detection...
 
Film Coated Tablet and Film Coating raw materials.pdf
Film Coated Tablet and Film Coating raw materials.pdfFilm Coated Tablet and Film Coating raw materials.pdf
Film Coated Tablet and Film Coating raw materials.pdf
 
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptxSaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
SaffronCrocusGenomicsThessalonikiOnlineMay2024TalkOnline.pptx
 
MSCII_ FCT UNIT 5 TOXICOLOGY.pdf
MSCII_              FCT UNIT 5 TOXICOLOGY.pdfMSCII_              FCT UNIT 5 TOXICOLOGY.pdf
MSCII_ FCT UNIT 5 TOXICOLOGY.pdf
 
Triploidy ...............................pptx
Triploidy ...............................pptxTriploidy ...............................pptx
Triploidy ...............................pptx
 
VILLAGE ATTACHMENT For rural agriculture PPT.pptx
VILLAGE ATTACHMENT For rural agriculture  PPT.pptxVILLAGE ATTACHMENT For rural agriculture  PPT.pptx
VILLAGE ATTACHMENT For rural agriculture PPT.pptx
 
Lubrication System in forced feed system
Lubrication System in forced feed systemLubrication System in forced feed system
Lubrication System in forced feed system
 
Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...
Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...
Chemistry Data Delivery from the US-EPA Center for Computational Toxicology a...
 
RACEMIzATION AND ISOMERISATION completed.pptx
RACEMIzATION AND ISOMERISATION completed.pptxRACEMIzATION AND ISOMERISATION completed.pptx
RACEMIzATION AND ISOMERISATION completed.pptx
 

Privacy-preserving blockchain-based federated learning for traffic flow prediction

  • 2. Research background Research ideas Research contents Contributions 1 2 3 4 Future plans & References 5 Contents
  • 4. Research background Background: As accurate and timely traffic flow information is extremely important for traffic management, traffic flow prediction has become a vital component of intelligent transportation systems. However, existing traffic flow prediction methods based on centralized machine learning need to gather raw data for model training, which involves serious privacy exposure risks.
  • 6. - - - - - - The process of proposing ideas
  • 8. 1. Fedrate Learning The specific implementation of ideas The goal of this paper is to achieve accurate and timely TFP through a lightweight federated learning scheme. Using GRU neural network as a lightweight technology to predict future traffic flow and implementing the application of FL in TFP systems.
  • 9. Establish a dedicated consortium blockchain and implement a decentralized TFP system using FL. For the convenience of system functionality, we first select a certain number of RSUs as authorized miners. To this end, upgrade the hardware configuration of these RSUs to have powerful computing, storage, and communication capabilities to verify local model updates submitted by distributed vehicles and identify low accuracy and unreliable updates. Through carefully designed consensus algorithms, they generate a new block containing qualified local model update records. 2. Distributed TFP Systems and Federated Learning The specific implementation of ideas
  • 10. Use a consensus algorithm called dBFT to execute the consensus process among miners; Only qualified local model updates are aggregated to generate the latest global model.In this consensus process, false or low-quality local model updates are not integrated into the global model training, which improves the FL performance and reduces poisoning attacks. Therefore, the proposed consortium blockchain with a dBFT-based consensus algorithm ensures the secure, reliable, and privacy-preserving characteristics of the FL-based TFP method for ITS. The specific implementation of ideas 3. Design of consortium blockchain
  • 11.
  • 12. step 1: Initialization Step 2: Leader Selection Step 3: Local model training Step 4: Model update verification The specific implementation steps of consensus algorithm Step 5: Candidate block verification Step 6: Global model training
  • 13. The specific implementation of ideas 4.Local Differential Privacy Technology for Protecting Vehicle Communication Privacy in TFP Definition 1: Participants should add random perturbations to the data. In order to protect the privacy of vehicle location information in TFP tasks, a Gaussian mechanism is used to add carefully designed noise to interfere with the location information. Firstly, define the Gaussian mechanism as defined in Definition 2: Definition 2:Gaussian mechanism Definition 3:Vehicle information after disturbance
  • 14. Experiment Performance comparison of MAE, MSE, and RMSE, For federated learning-based GRU model, LSTM model, SAE model, And SVM model.
  • 17. Introduced a federated learning framework to protect the privacy of vehicle data. Applying GRU model to FL framework to obtain accurate TFP. In order to prevent malicious attackers from damaging the urban traffic flow management system, a decentralized FL framework has been implemented using blockchain to defend against poisoning attacks. Contrib utions Contribution of the paper Using local differential privacy technology to protect privacy in vehicle location sharing.
  • 18. 5. Future plans & References
  • 19. Conduct experiments and improve ideas, with a preliminary logic. The second semester of the first year of graduate school Complete your own experiment and prepare the preliminary draft of the paper. The first semester of the second year of graduate school Successfully issued the paper. The second semester of the second year of graduate school Successfully graduated. Third year of graduate school My own graduate plan
  • 20. References [1] Y. Lv, Y. Duan, W. Kang, Z. Li, F.Y. Wang, Traffic flow prediction with big data: a deep learning approach, IEEE Trans. Intell. Transp. Syst. 16 (2014) 865–873. [2] R. Vinayakumar, M. Alazab, S. Srinivasan, Q. Pham, S.K. Padannayil, K. Simran, A visualized botnet detection system based deep learning for the internet of things networks of smart cities, IEEE Trans. Ind. Appl. 56 (2020) 4436–4456. [3] X. Yang, et al., Deep relative attributes, IEEE Trans. Multimed. 18 (2016) 1832–1842. [4] M.S. Hossain, M. Al-Hammadi, G. Muhammad, Automatic fruit classification using deep learning for industrial applications, IEEE Trans. Ind. Inf. 15 (2019) 1027–1034. [5] L. Lyu, J. Yu, K. Nandakumar, Y. Li, X. Ma, J. Jin, H. Yu, K.S. Ng, Towards fair and privacy-preserving federated deep models, IEEE Trans. Parallel Distrib. Syst. 31 (2020) 2524–2541. [6] K. Cho, B. Van Merriënboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, Y. Bengio, Learning phrase representations using rnn encoder– decoder for statistical machine translation, 2014, arXiv preprint arXiv: 1406.1078.
  • 21. TH A N KS 2 0 2 4 年 03月 T h a n k y o u f o r w a t c h i n g