{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T04:20:43Z","timestamp":1771302043518,"version":"3.50.1"},"reference-count":34,"publisher":"ASME International","issue":"1","license":[{"start":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T00:00:00Z","timestamp":1730937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.asme.org\/publications-submissions\/publishing-information\/legal-policies"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-23-1-0739"],"award-info":[{"award-number":["FA9550-23-1-0739"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000147","name":"Division of Civil, Mechanical and Manufacturing Innovation","doi-asserted-by":"publisher","award":["1901109"],"award-info":[{"award-number":["1901109"]}],"id":[{"id":"10.13039\/100000147","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["asmedigitalcollection.asme.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The scarcity of measured data for defect identification often challenges the development and certification of additive manufacturing processes. Knowledge transfer and sharing have become emerging solutions to small-data challenges in quality control to improve machine learning with limited data, but this strategy raises concerns regarding privacy protection. Existing zero-shot learning and federated learning methods are insufficient to represent, select, and mask data to share and control privacy loss quantification. This study integrates differential privacy in cybersecurity with federated learning to investigate sharing strategies of manufacturing defect ontology. The method first proposes using multilevel attributes masked by noise in defect ontology as the sharing data structure to characterize manufacturing defects. Information leaks due to sharing ontology branches and data are estimated by epsilon differential privacy (DP). Under federated learning, the proposed method optimizes sharing defect ontology and image data strategies to improve zero-shot defect classification given privacy budget limits. The proposed framework includes (1) developing a sharing strategy based on multilevel attributes in defect ontology with controllable privacy leaks, (2) optimizing joint decisions in differential privacy, zero-shot defect classification, and federated learning, and (3) developing a two-stage algorithm to solve the joint optimization, combining stochastic gradient descent search for classification models and an evolutionary algorithm for exploring data-sharing strategies. A case study on zero-shot learning of additive manufacturing defects demonstrated the effectiveness of the proposed method in data-sharing strategies, such as ontology sharing, defect classification, and cloud information use.<\/jats:p>","DOI":"10.1115\/1.4067086","type":"journal-article","created":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T11:23:45Z","timestamp":1730978625000},"update-policy":"https:\/\/doi.org\/10.1115\/crossmarkpolicy-asme","source":"Crossref","is-referenced-by-count":2,"title":["Ontology-Guided Data Sharing and Federated Quality Control With Differential Privacy in Additive Manufacturing"],"prefix":"10.1115","volume":"25","author":[{"given":"Tsegai O.","family":"Yhdego","sequence":"first","affiliation":[{"id":[{"id":"https:\/\/ror.org\/01v4tq883","id-type":"ROR","asserted-by":"publisher"}],"name":"Florida A&M University - Florida State University College of Engineering Department of Industrial and Manufacturing Engineering, Florida A&M University, , 2525 Pottsdamer St., Tallahassee, FL, 32310"},{"name":"Florida A&M University-Florida State University College of Engineering Department of Industrial and Manufacturing Engineering, Florida A&M University, , 2525 Pottsdamer St., Tallahassee, FL, 32310"}]},{"given":"Hui","family":"Wang","sequence":"additional","affiliation":[{"name":"Florida A&M University-Florida State University College of Engineering Department of Industrial and Manufacturing Engineering, Florida A&M University, , 2525 Pottsdamer St., Tallahassee, FL, 32310"}]},{"given":"Hongmei","family":"Chi","sequence":"additional","affiliation":[{"name":"Florida A&M University Computer and Information Sciences, , 1333 Wahnish Way, Tallahassee, FL, 32307"}]},{"given":"Zhibin","family":"Yu","sequence":"additional","affiliation":[{"name":"Florida A&M University-Florida State University College of Engineering Department of Industrial and Manufacturing Engineering, Florida A&M University, , 2525 Pottsdamer St., Tallahassee, FL, 32310"}]}],"member":"33","published-online":{"date-parts":[[2024,12,6]]},"reference":[{"key":"2025120520020284200_CIT0001","article-title":"Zero-Shot Learning Through Cross-Modal Transfer","author":"Socher","year":"2013"},{"key":"2025120520020284200_CIT0002","first-page":"2584","article-title":"Write a Classifier: Zero-Shot Learning Using Purely Textual Descriptions","author":"Elhoseiny","year":"2013"},{"key":"2025120520020284200_CIT0003","first-page":"1273","article-title":"Communication-Efficient Learning of Deep Networks From Decentralized Data","author":"McMahan","year":"2017"},{"key":"2025120520020284200_CIT0004","article-title":"Adaptive Task Allocation for Asynchronous Federated Mobile Edge Learning","author":"Mohammad","year":"2019"},{"key":"2025120520020284200_CIT0005","article-title":"Federated Optimization in Heterogeneous Networks","author":"Li","year":"2020"},{"key":"2025120520020284200_CIT0006","article-title":"Personalized Federated Learning With Theoretical Guarantees: A Model-Agnostic Meta-Learning Approach","author":"Fallah","year":"2020"},{"key":"2025120520020284200_CIT0007","author":"Li","year":"2019"},{"issue":"1\u20132","key":"2025120520020284200_CIT0008","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000083","article-title":"Advances and Open Problems in Federated Learning","volume":"14","author":"Kairouz","year":"2021","journal-title":"Found. Trends Mach. Learn."},{"key":"2025120520020284200_CIT0009","first-page":"308","article-title":"Deep Learning With Differential Privacy","author":"Abadi","year":"2016"},{"key":"2025120520020284200_CIT0010","author":"Geyer","year":"2017"},{"issue":"6","key":"2025120520020284200_CIT0011","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1109\/JSAC.2019.2904348","article-title":"Adaptive Federated Learning in Resource Constrained Edge Computing Systems","volume":"37","author":"Wang","year":"2019","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"2025120520020284200_CIT0012","first-page":"2512","article-title":"Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning","author":"Wang","year":"2019"},{"issue":"3\u20134","key":"2025120520020284200_CIT0013","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"2025120520020284200_CIT0014","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","article-title":"Federated Learning With Differential Privacy: Algorithms and Performance Analysis","volume":"15","author":"Wei","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"2025120520020284200_CIT0015","first-page":"35","article-title":"Practicing Differential Privacy in Health Care: A Review","volume":"6","author":"Dankar","year":"2013","journal-title":"Trans. Data Priv."},{"key":"2025120520020284200_CIT0016","article-title":"The Discrete Gaussian for Differential Privacy","author":"Canonne","year":"2020"},{"issue":"4","key":"2025120520020284200_CIT0017","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1109\/MNET.001.1900506","article-title":"On Safeguarding Privacy and Security in the Framework of Federated Learning","volume":"34","author":"Ma","year":"2020","journal-title":"IEEE Network"},{"issue":"1","key":"2025120520020284200_CIT0018","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","article-title":"A Firm Foundation for Private Data Analysis","volume":"54","author":"Dwork","year":"2011","journal-title":"Commun. ACM"},{"key":"2025120520020284200_CIT0019","first-page":"51","article-title":"Boosting and Differential Privacy","author":"Dwork","year":"2010"},{"key":"2025120520020284200_CIT0020","article-title":"The Composition Theorem for Differential Privacy","author":"Kairouz","year":"2015"},{"key":"2025120520020284200_CIT0021","article-title":"Composition Theorems for Interactive Differential Privacy","author":"Lyu","year":"2022"},{"issue":"6","key":"2025120520020284200_CIT0022","doi-asserted-by":"publisher","first-page":"4246","DOI":"10.1109\/TPAMI.2024.3355289","article-title":"Federated Gaussian Process: Convergence, Automatic Personalization and Multi-Fidelity Modeling","volume":"46","author":"Yue","year":"2024","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2025120520020284200_CIT0023","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.jmsy.2017.05.007","article-title":"Cyber-Physical Vulnerabilities in Additive Manufacturing Systems: A Case Study Attack on the Stl File With Human Subjects","volume":"44","author":"Sturm","year":"2017","journal-title":"J. Manuf. Syst."},{"issue":"7","key":"2025120520020284200_CIT0024","doi-asserted-by":"publisher","first-page":"071004","DOI":"10.1115\/1.4063859","article-title":"Sensor Data Protection Through Integration of Blockchain and Camouflaged Encryption in Cyber-Physical Manufacturing Systems","volume":"24","author":"Shi","year":"2024","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"4","key":"2025120520020284200_CIT0025","doi-asserted-by":"publisher","first-page":"041007","DOI":"10.1115\/1.4048966","article-title":"A Blockchain-Based G-Code Protection Approach for Cyber-Physical Security in Additive Manufacturing","volume":"21","author":"Shi","year":"2021","journal-title":"ASME J. Comput. Inf. Sci. Eng."},{"issue":"10","key":"2025120520020284200_CIT0026","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1080\/24725854.2023.2263786","article-title":"Ontology-Guided Attribute Learning to Accelerate Certification for Developing New Printing Processes","volume":"56","author":"Yhdego","year":"2023","journal-title":"IISE Trans."},{"key":"2025120520020284200_CIT0027","first-page":"4582","article-title":"Zero-Shot Learning - The Good, the Bad and the Ugly","author":"Xian","year":"2017"},{"key":"2025120520020284200_CIT0028","article-title":"Third Theory of Cryptography Conference","author":"Halevi","year":"2006"},{"key":"2025120520020284200_CIT0029","first-page":"265","article-title":"Calibrating Noise to Sensitivity in Private Data Analysis","author":"Dwork","year":"2006"},{"key":"2025120520020284200_CIT0030","first-page":"263","article-title":"R\u00e9nyi Differential Privacy","author":"Mironov","year":"2017"},{"key":"2025120520020284200_CIT0031","first-page":"394","article-title":"Improving the Gaussian Mechanism for Differential Privacy: Analytical Calibration and Optimal Denoising","author":"Balle","year":"2018"},{"key":"2025120520020284200_CIT0032","author":"Papernot","year":"2018"},{"issue":"2","key":"2025120520020284200_CIT0033","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1021\/acsanm.9b01763","article-title":"3D-Printed Photoactive Semiconducting Nanowire\u2013Polymer Composites for Light Sensors","volume":"3","author":"Shan","year":"2019","journal-title":"ACS Appl. Nano Mater."},{"key":"2025120520020284200_CIT0034","first-page":"248","article-title":"Imagenet: A Large-Scale Hierarchical Image Database","author":"Deng","year":"2009"}],"container-title":["Journal of Computing and Information Science in Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/25\/1\/011006\/7413018\/jcise_25_1_011006.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article-pdf\/25\/1\/011006\/7413018\/jcise_25_1_011006.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T01:02:07Z","timestamp":1764982927000},"score":1,"resource":{"primary":{"URL":"https:\/\/asmedigitalcollection.asme.org\/computingengineering\/article\/25\/1\/011006\/1208542\/Ontology-Guided-Data-Sharing-and-Federated-Quality"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,6]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,1]]}},"URL":"https:\/\/doi.org\/10.1115\/1.4067086","relation":{},"ISSN":["1530-9827","1944-7078"],"issn-type":[{"value":"1530-9827","type":"print"},{"value":"1944-7078","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,6]]},"article-number":"011006"}}