JOURNAL ARTICLE

Privacy-Preserving Anomaly Detection in Cloud Manufacturing Via Federated Transformer

Shiyao MaJiangtian NieJiawen KangLingjuan LyuRyan Wen LiuRuihui ZhaoZiyao LiuDusit Niyato

Year: 2022 Journal:   IEEE Transactions on Industrial Informatics Vol: 18 (12)Pages: 8977-8987   Publisher: Institute of Electrical and Electronics Engineers

Abstract

With the rapid development of cloud manufacturing, industrial production with edge computing as the core architecture has been greatly developed. However, edge devices often suffer from abnormalities and failures in industrial production. Therefore, detecting these abnormal situations timely and accurately is crucial for cloud manufacturing. As such, a straightforward solution is that the edge device uploads the data to the cloud for anomaly detection. However, Industry 4.0 puts forward higher requirements for data privacy and security so that it is unrealistic to upload data from edge devices directly to the cloud. Considering the abovementioned severe challenges, this article customizes a weakly supervised edge computing anomaly detection framework, i.e., federated learning-based transformer framework (FedAnomaly), to deal with the anomaly detection problem in cloud manufacturing. Specifically, we introduce federated learning (FL) framework that allows edge devices to train an anomaly detection model in collaboration with the cloud without compromising privacy. To boost the privacy performance of the framework, we add differential privacy noise to the uploaded features. To further improve the ability of edge devices to extract abnormal features, we use the transformer to extract the feature representation of abnormal data. In this context, we design a novel collaborative learning protocol to promote efficient collaboration between FL and transformer. Furthermore, extensive case studies on four benchmark datasets verify the effectiveness of the proposed framework. To the best of our knowledge, this is the first time integrating FL and transformer to deal with anomaly detection problems in cloud manufacturing.

Keywords:
Cloud computing Upload Computer science Anomaly detection Encryption Differential privacy Information privacy Transformer Data mining Artificial intelligence Computer security Engineering Operating system

Metrics

28
Cited By
5.48
FWCI (Field Weighted Citation Impact)
32
Refs
0.94
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Privacy-Preserving Technologies in Data
Physical Sciences →  Computer Science →  Artificial Intelligence
Blockchain Technology Applications and Security
Physical Sciences →  Computer Science →  Information Systems
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
© 2026 ScienceGate Book Chapters — All rights reserved.