Page 75 - ITU Journal, ICT Discoveries, Volume 3, No. 1, June 2020 Special issue: The future of video and immersive media
P. 75

ITU Journal: ICT Discoveries, Vol. 3(1), June 2020






                                     TRENDS AND ADVANCEMENTS IN
                              DEEP NEURAL NETWORK COMMUNICATION

                                                1
                                     Felix Sattler , Thomas Wiegand 1,2 , Wojciech Samek 1
               1 Department of Video Coding & Analytics, Fraunhofer Heinrich Hertz Institute, 10587 Berlin, Germany,
          2 Department of Electrical Engineering & Computer Science, Technische Universität Berlin, 10587 Berlin, Germany




          Abstract – Due to their great performance and scalability properties neural networks have become ubiquitous building
          blocks of many applications. With the rise of mobile and IoT, these models now are also being increasingly applied
          in distributed settings, where the owners of the data are separated by limited communication channels and privacy
          constraints. To address the challenges of these distributed environments, a wide range of training and evaluation
          schemes have been developed, which require the communication of neural network parametrizations. These novel
          approaches, which bring the “intelligence to the data” have many advantages over traditional cloud solutions such as
          privacy preservation, increased security and device autonomy, communication efficiency and a greater training speed.
          This paper gives an overview on the recent advancements and challenges in this new field of research at the intersection
          of machine learning and communications.
          Keywords  –  Distributed  training,  federated  learning,  model  compression,  neural  networks,  on-device  inference.


          1.  INTRODUCTION                                     all the workload for processing the data to the com-
                                                               putationally potent server, it also has multiple severe
          Neural networks have achieved impressive successes in
          a wide variety of areas of computational intelligence  drawbacks and limitations, which all arise from the
                                                               fact that user data is processed at a centralized location:
          such as computer vision [30][83][41], natural language
          processing [6][42][65] and speech recognition [26] among  Privacy: Data collected by mobile or IoT devices is
          many others and, as a result, have become a core build-  often of private nature and thus bound to the local de-
          ing block of many applications.                      vice. Medical data, text messages, private pictures or
          As mobile and Internet of things (IoT) devices become  footage from surveillance cameras are examples of data
          ubiquitous parts of our daily lives, neural networks are  which cannot be processed in the cloud. New data pro-
          also being applied in more and more distributed settings.  tection legislations like the European GDPR [73] or the
          These distributed devices are getting equipped with ever  Cyber Security Law of the People’s Republic of China
          more potent sensors and storage capacities and collect  [20] enforce strong regulations on data privacy.
          vast amounts of personalized data, which is highly valu-  Ownership: Attributing and claiming ownership is a
          able for processing in machine learning pipelines.   difficult task if personal data is transfered to a central
          When it comes to the processing of data from distributed  location. Cloud ML leaves users in the dark about what
          sources, the ”Cloud ML” paradigm [33] has reigned    happens with their data or requires cumbersome rights
          supreme in the previous decade. In Cloud ML, local   management from the cloud service provider.
          user data is communicated from the often hardware con-  Security: With all data being stored at one central lo-
          strained mobile or IoT devices to a computationally po-  cation, Cloud ML exposes a single point of failure. Mul-
          tent centralized server where it is then processed in a  tiple cases of data leakage in recent times have demon-
                                                                                                   1
          machine learning pipeline (e.g. a prediction is made  strated that the centralized processing of data comes
          using an existing model or the data is used to train a  with an unpredictable security risk for the users.
          new model). The result of the processing operation may  Efficiency: Transferring large records of data to a cen-
          then be sent back to the local device. From a communi-  tral compute node often is more expensive in terms of
          cation perspective, methods which follow the Cloud ML  time and energy than the actual processing of the data.
          paradigm make use of centralized intelligence and
                                                               For instance, single records of medical image data can
                     ”Bring the data to the model.”            already be hundreds of Megabytes in size [71]. If the
                                                               local data is large and/or the communication channels
          While the Cloud ML paradigm is convenient for the    are limited, moving data to the cloud might thus become
          clients from a computational perspective, as it moves  inefficient or unfeasible.
                                                               Autonomy: Many distributed devices need to act fully
          This work was partly supported by the German Ministry for Edu-
          cation and Research as BIFOLD - Berlin Institute for the Founda-  1 A comprehensive list of documented breaches can be found at
          tions of Learning and Data (ref. 01IS18025A and ref 01IS18037A).  https://en.wikipedia.org/wiki/List_of_data_breaches .





                                             © International Telecommunication Union, 2020                    53
   70   71   72   73   74   75   76   77   78   79   80