pith. machine review for the scientific record. sign in

arxiv: 2604.05077 · v1 · submitted 2026-04-06 · 💻 cs.LG · cs.AI· cs.CR

Recognition: 2 theorem links

· Lean Theorem

Feature-Aware Anisotropic Local Differential Privacy for Utility-Preserving Graph Representation Learning in Metal Additive Manufacturing

Authors on Pith no claims yet

Pith reviewed 2026-05-10 18:44 UTC · model grok-4.3

classification 💻 cs.LG cs.AIcs.CR
keywords local differential privacyanisotropic noisegraph attention networksadditive manufacturingdefect detectionfeature importancedirected energy deposition
0
0 comments X

The pith

A feature-importance prior lets anisotropic noise in local differential privacy recover most of the utility of a hierarchical graph attention network for additive manufacturing defect detection.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper introduces FI-LDP-HGAT, which models melt-pool sensor data as a layered graph to capture spatial and thermal couplings across scan tracks and deposited layers. It pairs this with an anisotropic Gaussian mechanism that derives feature importance from an encoder and then reallocates the privacy budget so that task-critical thermal signatures receive less noise while redundant dimensions receive more. This redistribution is shown to maintain formal local differential privacy guarantees while restoring 81.5 percent utility at epsilon equals 4 and 0.762 defect recall at epsilon equals 2 on a DED porosity dataset, outperforming uniform-noise LDP and DP-SGD baselines.

Core claim

By deriving a feature importance prior from an encoder and using it to scale the variance of an anisotropic Gaussian mechanism, the privacy budget can be redistributed across embedding dimensions without violating local differential privacy; on a Directed Energy Deposition porosity dataset the resulting FI-LDP-HGAT model recovers 81.5 percent utility at a moderate privacy budget and sustains 0.762 defect recall under stricter privacy, with a strong negative correlation between feature importance and added noise magnitude.

What carries the argument

The feature-importance-aware anisotropic Gaussian mechanism (FI-LDP), which assigns per-dimension noise magnitudes inversely proportional to an encoder-derived importance prior while preserving the formal local differential privacy guarantee.

If this is right

  • Collaborative training of quality-assurance models becomes feasible without exposing proprietary melt-pool signatures.
  • Defect recall remains usable even when the privacy budget is tightened to epsilon equals 2.
  • The same anisotropic allocation principle can be applied to any encoder-plus-graph pipeline whose features have heterogeneous task relevance.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The approach may extend to other sensor-rich manufacturing processes that exhibit layered spatial structure, such as powder-bed fusion or wire-arc additive manufacturing.
  • If the importance prior can be obtained from public auxiliary data rather than the private encoder, the method could be made fully non-interactive from the outset.

Load-bearing premise

The encoder-derived feature importance scores correctly identify which dimensions carry task-critical information and do not themselves leak private information or introduce systematic bias.

What would settle it

Run the same downstream defect-detection task after deliberately randomizing or inverting the feature-importance prior before noise allocation; if utility and recall collapse to the level of isotropic LDP, the central claim is falsified.

Figures

Figures reproduced from arXiv: 2604.05077 by Mahathir Mohammad Bappy, Md Arifuzzaman, MD Shafikul Islam, Saifur Rahman Tushar.

Figure 1
Figure 1. Figure 1: Framework for utility-preserving private feature release. Structured multimodal records are encoded, privatized via [PITH_FULL_IMAGE:figures/full_fig_p002_1.png] view at source ↗
Figure 2
Figure 2. Figure 2: High-level overview of the utility-preserving private graph learning framework for in-situ porosity prediction. The pipeline in [PITH_FULL_IMAGE:figures/full_fig_p005_2.png] view at source ↗
Figure 3
Figure 3. Figure 3: Porous-targeted augmentation operators used during training. The four transformations (A1)–(A4) are applied only to minority-class (porous) thermal frames to increase defect-signal diversity under severe class imbalance. The operators emulate sensor noise, intensity drift, mild registration errors, and interpolated defect signatures; validation and test splits remain unaugmented. V corresponds to a localiz… view at source ↗
Figure 4
Figure 4. Figure 4: Multimodal feature extraction and fusion for node representation. Each node feature xi concatenates an image-derived embedding z (img) i = fθ(Ii) (thermal fingerprints) with a context embedding z (ctx) i = gϕ(si , gi) capturing process￾state and geometric descriptors. This fused representation is used for warmup importance estimation and as the input to FI-LDP privatization in subsequent stages. 3.2 Porous… view at source ↗
Figure 5
Figure 5. Figure 5: Graph construction pipeline for FI-LDP-HGAT. (a) Porous-targeted augmentation applies transformation operators F(·) to minority-class thermal patches to increase defect-signal diversity during training (Sec. 3.2). (b) Node and edge formation for the layer-stratified hybrid kNN graph: each node aggregates an image embedding from the thermal patch and a context vector of process/geometric features (Sec. 3.3)… view at source ↗
Figure 6
Figure 6. Figure 6: HGAT message passing with attention. Edge priors bias attention toward spatially/thermally consistent neighbors, while learned coefficients adaptively weight neighborhood contributions for node-level porosity inference [PITH_FULL_IMAGE:figures/full_fig_p011_6.png] view at source ↗
Figure 7
Figure 7. Figure 7: Effect of isotropic vs. importance-guided local privatization on graph features. (a) Uniform-LDP (isotropic Gaussian noise). A single privacy budget is enforced by injecting the same noise scale into every feature coordinate, perturbing task-critical “thermal fingerprint” dimensions and redundant dimensions equally. This uniform corruption distorts the relative geometry of node embeddings and can weaken at… view at source ↗
Figure 8
Figure 8. Figure 8: Mechanism insight for FI-LDP at ϵ = 2.0: importance-guided anisotropic perturbation. (a) Normalized importance scores (sorted) show that predictive utility is concentrated in a small subset of embedding coordinates. (b) Allocated Gaussian noise scale σj per coordinate: Uniform-LDP applies a constant σ, whereas FI-LDP assigns smaller σj to high-importance coordinates and larger σj to low-importance ones und… view at source ↗
Figure 9
Figure 9. Figure 9: Privacy–utility frontier for FI-LDP and Uniform-LDP. Metrics are reported across ϵ ∈ [0.5, 8.0] under a fixed protocol (same split; seed-averaged runs). (a) AUC and (b) AUPR summarize threshold-free ranking quality. (c) Precision@0.5, (d) Recall@0.5, and (e) F1@0.5 are computed at the default decision threshold t = 0.5. (f) F1 ∗ is evaluated at a validation-optimised threshold t ∗ , representing the best c… view at source ↗
read the original abstract

Metal additive manufacturing (AM) enables the fabrication of safety-critical components, but reliable quality assurance depends on high-fidelity sensor streams containing proprietary process information, limiting collaborative data sharing. Existing defect-detection models typically treat melt-pool observations as independent samples, ignoring layer-wise physical couplings. Moreover, conventional privacy-preserving techniques, particularly Local Differential Privacy (LDP), lead to severe utility degradation because they inject uniform noise across all feature dimensions. To address these interrelated challenges, we propose FI-LDP-HGAT. This computational framework combines two methodological components: a stratified Hierarchical Graph Attention Network (HGAT) that captures spatial and thermal dependencies across scan tracks and deposited layers, and a feature-importance-aware anisotropic Gaussian mechanism (FI-LDP) for non-interactive feature privatization. Unlike isotropic LDP, FI-LDP redistributes the privacy budget across embedding coordinates using an encoder-derived importance prior, assigning lower noise to task-critical thermal signatures and higher noise to redundant dimensions while maintaining formal LDP guarantees. Experiments on a Directed Energy Deposition (DED) porosity dataset demonstrate that FI-LDP-HGAT achieves 81.5% utility recovery at a moderate privacy budget (epsilon = 4) and maintains defect recall of 0.762 under strict privacy (epsilon = 2), while outperforming classical ML, standard GNNs, and alternative privacy mechanisms, including DP-SGD across all evaluated metrics. Mechanistic analysis confirms a strong negative correlation (Spearman = -0.81) between feature importance and noise magnitude, providing interpretable evidence that the privacy-utility gains are driven by principled anisotropic allocation.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The manuscript proposes FI-LDP-HGAT, a framework combining a Hierarchical Graph Attention Network (HGAT) to model spatial-thermal dependencies across scan tracks and layers in Directed Energy Deposition (DED) sensor streams with a feature-importance-aware anisotropic Gaussian mechanism (FI-LDP). The latter redistributes the privacy budget using an encoder-derived importance prior to apply lower noise to task-critical dimensions while claiming to preserve formal local differential privacy. On a porosity dataset, it reports 81.5% utility recovery at ε=4, 0.762 defect recall at ε=2, outperformance versus classical ML, standard GNNs and DP-SGD, and a Spearman correlation of -0.81 between importance and noise magnitude.

Significance. If the privacy guarantees and empirical gains are rigorously supported, the work addresses a concrete barrier to collaborative quality assurance in safety-critical additive manufacturing by mitigating utility loss from uniform noise. The graph modeling of physical couplings and the mechanistic correlation analysis are positive elements that could inform privacy-utility design in other sensor-driven industrial settings.

major comments (2)
  1. [Methods (FI-LDP definition and privacy analysis)] The FI-LDP mechanism (described in the methods section on the anisotropic Gaussian mechanism): the claim that redistributing the privacy budget via an encoder-derived importance prior preserves formal ε-LDP for the full feature vector is load-bearing for all utility results. Standard calibration of the Gaussian mechanism sets per-coordinate σ from global sensitivity and ε; lowering σ on high-importance coordinates increases the privacy loss in those directions, so the vector mechanism's worst-case ε is determined by the minimum-σ coordinate. No explicit composition, max-loss, or post-processing argument is supplied to show the overall guarantee remains ε when the prior is computed from the same data (even non-interactively). This directly affects whether the reported 81.5% recovery at ε=4 and 0.762 recall at ε=2 reflect the stated privacy level.
  2. [Experiments and results] Experimental results (Section 5 and associated tables/figures): performance numbers are presented without error bars, number of random seeds, or statistical tests. Baseline implementations (including DP-SGD) are not described with matching privacy budgets, model sizes, or hyperparameter search details. It is also unclear whether the encoder used to derive the importance prior was trained on the evaluation folds or held-out data, which bears on both the utility numbers and the independence assumption required for the privacy claim.
minor comments (2)
  1. [Abstract and Section 3] The abstract and introduction refer to a 'stratified' HGAT; the precise difference from a standard hierarchical GAT (e.g., any additional stratification step or layer-wise masking) should be stated explicitly with a diagram or pseudocode.
  2. [Methods] Notation for the importance prior and the diagonal covariance matrix of the anisotropic mechanism should be introduced once and used consistently; currently the mapping from importance scores to per-coordinate variances is described only in prose.

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the constructive and detailed comments, which have helped us improve the rigor and clarity of the manuscript. We address each major comment point by point below and have revised the paper to incorporate the suggested enhancements.

read point-by-point responses
  1. Referee: [Methods (FI-LDP definition and privacy analysis)] The FI-LDP mechanism (described in the methods section on the anisotropic Gaussian mechanism): the claim that redistributing the privacy budget via an encoder-derived importance prior preserves formal ε-LDP for the full feature vector is load-bearing for all utility results. Standard calibration of the Gaussian mechanism sets per-coordinate σ from global sensitivity and ε; lowering σ on high-importance coordinates increases the privacy loss in those directions, so the vector mechanism's worst-case ε is determined by the minimum-σ coordinate. No explicit composition, max-loss, or post-processing argument is supplied to show the overall guarantee remains ε when the prior is computed from the same data (even non-interactively). This directly affects whether the reported 81.5% recovery at ε=4 and 0.762 recall at ε=2 reflect the stated隐私水平.

    Authors: We appreciate the referee's precise identification of the privacy analysis gap. The FI-LDP mechanism derives the importance prior non-interactively from the encoder and then calibrates the per-coordinate Gaussian noise such that the coordinate with the smallest σ (highest importance, lowest noise) is set to achieve exactly the target ε privacy loss; all other coordinates receive strictly larger σ and thus strictly smaller privacy loss. Consequently, the worst-case privacy loss over the entire vector is bounded by ε, satisfying the formal definition of ε-LDP. While the original submission stated the guarantee, it did not include the explicit bounding argument. In the revised manuscript we have added a new subsection (Section 3.3) that supplies the full proof: we bound the log-likelihood ratio for any neighboring pair using the properties of the multivariate Gaussian and the fixed prior, confirming that the reported utility figures (81.5 % at ε=4, 0.762 recall at ε=2) correspond to the claimed privacy level. revision: yes

  2. Referee: [Experiments and results] Experimental results (Section 5 and associated tables/figures): performance numbers are presented without error bars, number of random seeds, or statistical tests. Baseline implementations (including DP-SGD) are not described with matching privacy budgets, model sizes, or hyperparameter search details. It is also unclear whether the encoder used to derive the importance prior was trained on the evaluation folds or held-out data, which bears on both the utility numbers and the independence assumption required for the privacy claim.

    Authors: We agree that these omissions reduce reproducibility and statistical confidence. In the revised manuscript we have expanded Section 5 and the supplementary material to report all metrics with error bars computed over five independent random seeds, added Wilcoxon signed-rank tests for pairwise comparisons against baselines, and provided exhaustive implementation details: exact privacy-budget allocations, model parameter counts, optimizer settings, and the full hyperparameter grid search procedure for every baseline (including DP-SGD). We have also clarified that the importance encoder was trained on a held-out subset of the training data that is completely disjoint from the cross-validation folds used for final evaluation; this partitioning is now illustrated in a new data-flow diagram (Figure 2) and explicitly stated in the experimental protocol, thereby preserving the non-interactivity assumption required for the privacy analysis. revision: yes

Circularity Check

0 steps flagged

No significant circularity; empirical results on external dataset with independent privacy claim

full rationale

The paper proposes FI-LDP-HGAT as a combined framework: HGAT for graph modeling of AM layers plus FI-LDP anisotropic noise allocation via an encoder-derived importance prior. Central claims consist of measured utility/recall numbers on a DED porosity dataset (81.5% recovery at ε=4, 0.762 recall at ε=2) rather than any closed-form derivation or prediction that reduces to fitted inputs. No equations or sections exhibit self-definitional loops, fitted parameters renamed as predictions, or load-bearing self-citations. The privacy guarantee is asserted as formal LDP for the vector mechanism despite anisotropic variances; while the skeptic correctly flags that data-dependent importance could affect the actual privacy loss, this is an unproven assumption rather than a circular reduction inside the paper's own chain. The derivation chain is therefore self-contained and externally falsifiable via the reported experiments.

Axiom & Free-Parameter Ledger

0 free parameters · 1 axioms · 1 invented entities

Only the abstract is available, so the ledger is necessarily incomplete. The claim rests on the validity of the anisotropic allocation preserving LDP and on the HGAT correctly modeling layer-wise couplings; no explicit free parameters or invented entities beyond the named mechanism are detailed.

axioms (1)
  • domain assumption The encoder-derived importance prior accurately ranks feature relevance for the downstream defect task
    Invoked to justify non-uniform noise allocation while claiming formal LDP.
invented entities (1)
  • FI-LDP anisotropic Gaussian mechanism no independent evidence
    purpose: Redistributes privacy budget across embedding dimensions according to feature importance
    New mechanism introduced to achieve utility preservation under LDP constraints

pith-pipeline@v0.9.0 · 5615 in / 1437 out tokens · 38587 ms · 2026-05-10T18:44:51.436038+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Lean theorems connected to this paper

Citations machine-checked in the Pith Canon. Every link opens the source theorem in the public Lean library.

What do these tags mean?
matches
The paper's claim is directly supported by a theorem in the formal canon.
supports
The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
extends
The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
uses
The paper appears to rely on the theorem as machinery.
contradicts
The paper's claim conflicts with a theorem or certificate in the canon.
unclear
Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.

Reference graph

Works this paper leans on

54 extracted references · 5 canonical work pages · 2 internal anchors

  1. [1]

    Deep learning-based data fusion method for in situ porosity detection in laser-based additive manufacturing,

    Tian, Q., Guo, S., Melder, E., Bian, L., and Guo, W. G., 2021, “Deep learning-based data fusion method for in situ porosity detection in laser-based additive manufacturing,”Journal of Manufacturing Science and Engineering,143(4), p. 041011

  2. [2]

    In-situ process monitoring and adaptive quality en- hancement in laser additive manufacturing: a criti- cal review,

    Chen, L., Bi, G., Yao, X., Su, J., Tan, C., Feng, W., Benakis, M., Chew, Y ., and Moon, S. K., 2024, “In-situ process monitoring and adaptive quality en- hancement in laser additive manufacturing: a criti- cal review,”Journal of Manufacturing Systems,74, pp. 527–574

  3. [3]

    In- process monitoring of porosity during laser additive manufacturing process,

    Zhang, B., Liu, S., and Shin, Y . C., 2019, “In- process monitoring of porosity during laser additive manufacturing process,”Additive Manufacturing, 28, pp. 497–505

  4. [4]

    Morphological dynamics-based anomaly de- tection towards in situ layer-wise certification for directed energy deposition processes,

    Bappy, M. M., Liu, C., Bian, L., and Tian, W., 2022, “Morphological dynamics-based anomaly de- tection towards in situ layer-wise certification for directed energy deposition processes,”Journal of Manufacturing Science and Engineering,144(11), p. 111007

  5. [5]

    Machine learning-aided real-time detection of keyhole pore generation in laser powder bed fusion,

    Ren, Z., Gao, L., Clark, S. J., Fezzaa, K., Shevchenko, P., Choi, A., Everhart, W., Rollett, A. D., Chen, L., and Sun, T., 2023, “Machine learning-aided real-time detection of keyhole pore generation in laser powder bed fusion,”Science, 379(6627), pp. 89–94

  6. [6]

    A convolutional neural net- work (cnn) classification to identify the presence of pores in powder bed fusion images,

    Ansari, M. A., Crampton, A., Garrard, R., Cai, B., and Attallah, M., 2022, “A convolutional neural net- work (cnn) classification to identify the presence of pores in powder bed fusion images,”The Interna- tional Journal of Advanced Manufacturing Technol- ogy,120(7), pp. 5133–5150

  7. [7]

    In-situ layer-wise certification for di- rect laser deposition processes based on thermal im- age series analysis,

    Esfahani, M. N., Bappy, M. M., Bian, L., and Tian, W., 2022, “In-situ layer-wise certification for di- rect laser deposition processes based on thermal im- age series analysis,”Journal of Manufacturing Pro- cesses,75, pp. 895–902

  8. [8]

    Dlam: Deep learning based real-time poros- ity prediction for additive manufacturing using ther- mal images of the melt pool,

    Ho, S., Zhang, W., Young, W., Buchholz, M., Al Ju- fout, S., Dajani, K., Bian, L., and Mozumdar, M., 2021, “Dlam: Deep learning based real-time poros- ity prediction for additive manufacturing using ther- mal images of the melt pool,”IEEE Access,9, pp. 115100–115114

  9. [9]

    Predicting de- fects in laser powder bed fusion using in-situ ther- mal imaging data and machine learning,

    Estalaki, S. M., Lough, C. S., Landers, R. G., Kinzel, E. C., and Luo, T., 2022, “Predicting de- fects in laser powder bed fusion using in-situ ther- mal imaging data and machine learning,”Additive Manufacturing,58, p. 103008

  10. [10]

    A deep learning frame- work for layer-wise porosity prediction in metal powder bed fusion using thermal signatures,

    Mao, Y ., Lin, H., Yu, C. X., Frye, R., Beckett, D., Anderson, K., Jacquemetton, L., Carter, F., Gao, Z., Liao, W.-k., et al., 2023, “A deep learning frame- work for layer-wise porosity prediction in metal powder bed fusion using thermal signatures,”Jour- nal of Intelligent Manufacturing,34(1), pp. 315– 329

  11. [11]

    Defects in metal additive manufacturing: formation, process parameters, postprocessing, challenges, economic aspects, and future research directions,

    Haribaskar, R., and Kumar, T. S., 2024, “Defects in metal additive manufacturing: formation, process parameters, postprocessing, challenges, economic aspects, and future research directions,”3D Printing and Additive Manufacturing,11(4), pp. 1629–1655

  12. [12]

    Effect of heat accumulation-induced embrit- tlement on the mechanical behavior of laser pow- der bed fusion ti-6al-4v microstructure,

    Rottler, J., Tetzlaff, T. K., Lion, A., and Johlitz, M., 2025, “Effect of heat accumulation-induced embrit- tlement on the mechanical behavior of laser pow- der bed fusion ti-6al-4v microstructure,”Progress in Additive Manufacturing, pp. 1–9

  13. [13]

    A review on in-situ process sens- ing and monitoring systems for fusion-based ad- ditive manufacturing,

    Ozel, T., 2023, “A review on in-situ process sens- ing and monitoring systems for fusion-based ad- ditive manufacturing,”International Journal of Mechatronics and Manufacturing Systems,16(2-3), pp. 115–154

  14. [14]

    A comprehensive survey on graph neural networks,

    Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., and Yu, P. S., 2020, “A comprehensive survey on graph neural networks,”IEEE transactions on neural net- works and learning systems,32(1), pp. 4–24

  15. [15]

    Graph neural networks in supply chain analytics and optimization: Concepts, per- spectives, dataset and benchmarks,

    Wasi, A. T., Islam, M., Akib, A. R., and Bappy, M. M., 2024, “Graph neural networks in supply chain analytics and optimization: Concepts, per- spectives, dataset and benchmarks,”arXiv preprint arXiv:2411.08550

  16. [16]

    Graph Attention Networks

    Veli ˇckovi´c, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., and Bengio, Y ., 2017, “Graph attention networks,”arXiv preprint arXiv:1710.10903

  17. [17]

    Geometry-agnostic data-driven ther- mal modeling of additive manufacturing processes using graph neural networks,

    Mozaffar, M., Liao, S., Lin, H., Ehmann, K., and Cao, J., 2021, “Geometry-agnostic data-driven ther- mal modeling of additive manufacturing processes using graph neural networks,”Additive Manufac- turing,48, p. 102449

  18. [18]

    Knowledge graph network-driven pro- cess reasoning for laser metal additive manufactur- ing based on relation mining,

    Xiong, C., Xiao, J., Li, Z., Zhao, G., and Xiao, W., 2024, “Knowledge graph network-driven pro- cess reasoning for laser metal additive manufactur- ing based on relation mining,”Applied Intelligence, 54(22), pp. 11472–11483

  19. [19]

    Spatially-informed online prediction of milling surface deformation using multiphysics- infused graph neural network for digital twinning,

    Zhou, Q., Zhang, Y ., Kim, J., Imani, F., and Tang, J., 2025, “Spatially-informed online prediction of milling surface deformation using multiphysics- infused graph neural network for digital twinning,” Journal of Manufacturing Science and Engineering, 147(12), p. 121003

  20. [20]

    Big data driven edge-cloud col- laboration architecture for cloud manufacturing: a software defined perspective,

    Yang, C., Lan, S., Wang, L., Shen, W., and Huang, G. G., 2020, “Big data driven edge-cloud col- laboration architecture for cloud manufacturing: a software defined perspective,”IEEE access,8, pp. 45938–45950

  21. [21]

    M., 2024,Toward privacy-preserving component certification for metal additive manufac- turingMississippi State University

    Bappy, M. M., 2024,Toward privacy-preserving component certification for metal additive manufac- turingMississippi State University

  22. [22]

    Privacy- preserving and utility-aware data sharing strategy for process-defect modeling in metal-based additive manufacturing,

    Bappy, M., Bian, L., and Tian, W., 2023, “Privacy- preserving and utility-aware data sharing strategy for process-defect modeling in metal-based additive manufacturing,” In IISE Annual Conference and Expo, IISE

  23. [23]

    Adaptive thermal history de- identification for privacy-preserving data sharing of directed energy deposition processes,

    Bappy, M. M., Fullington, D., Bian, L., and Tian, W., 2025, “Adaptive thermal history de- identification for privacy-preserving data sharing of directed energy deposition processes,”Journal of Computing and Information Science in Engineering, 25(3), p. 031006

  24. [24]

    Privacy- preserving neural networks for smart manufactur- ing,

    Lee, H., Finke, D., and Yang, H., 2024, “Privacy- preserving neural networks for smart manufactur- ing,”Journal of Computing and Information Sci- ence in Engineering,24(7), p. 071002

  25. [25]

    Sensor data protection through integra- tion of blockchain and camouflaged encryption in cyber-physical manufacturing systems,

    Shi, Z., Oskolkov, B., Tian, W., Kan, C., and Liu, C., 2024, “Sensor data protection through integra- tion of blockchain and camouflaged encryption in cyber-physical manufacturing systems,”Journal of Computing and Information Science in Engineering, 24(7), p. 071004

  26. [26]

    Incremental machine learning- integrated blockchain for real-time security protec- tion in cyber-enabled manufacturing systems,

    Oskolkov, B., Kan, C., Tian, W., Law, A. C. C., and Liu, C., 2025, “Incremental machine learning- integrated blockchain for real-time security protec- tion in cyber-enabled manufacturing systems,”Jour- nal of Computing and Information Science in Engi- neering,25(4), p. 041004

  27. [27]

    Taxonomy-driven graph- theoretic framework for manufacturing cybersecu- rity risk modeling and assessment,

    Rahman, M. H., Hamedani, E. Y ., Son, Y .-J., and Shafae, M., 2024, “Taxonomy-driven graph- theoretic framework for manufacturing cybersecu- rity risk modeling and assessment,”Journal of Computing and Information Science in Engineering, 24(7), p. 071003

  28. [28]

    Layered secu- rity guidance for data asset management in additive manufacturing,

    Ali Milaat, F., and Lubell, J., 2024, “Layered secu- rity guidance for data asset management in additive manufacturing,”Journal of computing and informa- tion science in engineering,24(7), p. 071001

  29. [29]

    A comprehensive survey on local differential pri- vacy toward data statistics and analysis,

    Wang, T., Zhang, X., Feng, J., and Yang, X., 2020, “A comprehensive survey on local differential pri- vacy toward data statistics and analysis,”Sensors, 20(24), p. 7030

  30. [30]

    Local privacy and statistical minimax rates,

    Duchi, J. C., Jordan, M. I., and Wainwright, M. J., 2013, “Local privacy and statistical minimax rates,” In 2013 IEEE 54th annual symposium on founda- tions of computer science, IEEE, pp. 429–438

  31. [31]

    {Utility- optimized}local differential privacy mechanisms for distribution estimation,

    Murakami, T., and Kawamoto, Y ., 2019, “{Utility- optimized}local differential privacy mechanisms for distribution estimation,” In 28th USENIX Secu- rity Symposium (USENIX Security 19), pp. 1877– 1894

  32. [32]

    Context aware local differential privacy,

    Acharya, J., Bonawitz, K., Kairouz, P., Ramage, D., and Sun, Z., 2020, “Context aware local differential privacy,” In International Conference on Machine Learning, PMLR, pp. 52–62

  33. [33]

    Enhancing dp-sgd through non-monotonous adaptive scaling gradient weight,

    Huang, T., Huang, Q., Shi, X., Meng, J., Zheng, G., Yang, X., and Yi, X., 2024, “Enhancing dp-sgd through non-monotonous adaptive scaling gradient weight,”arXiv preprint arXiv:2411.03059

  34. [34]

    Survey: feder- ated learning data security and privacy-preserving in edge-internet of things,

    Li, H., Ge, L., and Tian, L., 2024, “Survey: feder- ated learning data security and privacy-preserving in edge-internet of things,”Artificial Intelligence Re- view,57(5), p. 130

  35. [35]

    In-situ sur- face porosity prediction in ded (directed energy de- position) printed ss316l parts using multimodal sen- sor fusion,

    Karthikeyan, A., Balhara, H., Hanchate, A., Lianos, A. K., and Bukkapatnam, S. T., 2023, “In-situ sur- face porosity prediction in ded (directed energy de- position) printed ss316l parts using multimodal sen- sor fusion,”arXiv preprint arXiv:2304.08658

  36. [36]

    In-situ monitoring of melt pool images for porosity prediction in directed energy deposition processes,

    Khanzadeh, M., Chowdhury, S., Tschopp, M. A., Doude, H. R., Marufuzzaman, M., and Bian, L., 2019, “In-situ monitoring of melt pool images for porosity prediction in directed energy deposition processes,”Iise Transactions,51(5), pp. 437–455

  37. [37]

    Stochastic defect localization for coopera- tive additive manufacturing using gaussian mixture maps,

    Rescsanski, S., Shah, V ., Tang, J., and Imani, F., 2024, “Stochastic defect localization for coopera- tive additive manufacturing using gaussian mixture maps,”Journal of Computing and Information Sci- ence in Engineering,24(11), p. 111006

  38. [38]

    A privacy-enhancing fed- erated learning framework for cross-manufacturer lpbf powder bed defect identification,

    Wang, Y ., Tang, J., Zhao, Z., Wang, C., Zhang, X., and Chen, X., 2026, “A privacy-enhancing fed- erated learning framework for cross-manufacturer lpbf powder bed defect identification,”Journal of Intelligent Manufacturing, pp. 1–25

  39. [39]

    Privacy-preserving process-defect modelling for metal-based additive manufacturing processes: A federated learning- based case study,

    Zhou, S., and Tian, W., 2025, “Privacy-preserving process-defect modelling for metal-based additive manufacturing processes: A federated learning- based case study,”Manufacturing Letters,44, pp. 1016–1025

  40. [40]

    Protecting additive manufac- turing information when encryption is insufficient,

    Lubell, J., 2022, “Protecting additive manufac- turing information when encryption is insufficient,” In ASTM International Conference on Additive Manufacturing (ICAM 2021), ASTM International, pp. 177–191

  41. [41]

    An overview of trustworthy ai: advances in ip protection, privacy-preserving feder- ated learning, security verification, and gai safety alignment,

    Zheng, Y ., Chang, C.-H., Huang, S.-H., Chen, P.-Y ., and Picek, S., 2024, “An overview of trustworthy ai: advances in ip protection, privacy-preserving feder- ated learning, security verification, and gai safety alignment,”IEEE Journal on Emerging and Se- lected Topics in Circuits and Systems

  42. [42]

    Lo- cally private graph neural networks,

    Sajadmanesh, S., and Gatica-Perez, D., 2021, “Lo- cally private graph neural networks,” In Proceedings of the 2021 ACM SIGSAC conference on computer and communications security, pp. 2130–2145

  43. [43]

    {GAP}: Differentially pri- vate graph neural networks with aggregation per- turbation,

    Sajadmanesh, S., Shamsabadi, A. S., Bellet, A., and Gatica-Perez, D., 2023, “{GAP}: Differentially pri- vate graph neural networks with aggregation per- turbation,” In 32nd USENIX Security Symposium (USENIX Security 23), pp. 3223–3240

  44. [44]

    C., 2009,Digital image processing Pearson education india

    Gonzalez, R. C., 2009,Digital image processing Pearson education india

  45. [45]

    A sur- vey on image data augmentation for deep learning,

    Shorten, C., and Khoshgoftaar, T. M., 2019, “A sur- vey on image data augmentation for deep learning,” Journal of big data,6(1), pp. 1–48

  46. [46]

    Process monitoring and inspection sys- tems in metal additive manufacturing: Status and applications,

    Chua, Z. Y ., Ahn, I. H., and Moon, S. K., 2017, “Process monitoring and inspection sys- tems in metal additive manufacturing: Status and applications,”International Journal of Precision Engineering and Manufacturing-Green Technology, 4(2), pp. 235–245

  47. [47]

    mixup: Beyond Empirical Risk Minimization

    Zhang, H., Cisse, M., Dauphin, Y . N., and Lopez- Paz, D., 2017, “mixup: Beyond empirical risk min- imization,”arXiv preprint arXiv:1710.09412

  48. [48]

    Deep residual learning for image recognition,

    He, K., Zhang, X., Ren, S., and Sun, J., 2016, “Deep residual learning for image recognition,” In Pro- ceedings of the IEEE conference on computer vision and pattern recognition, pp. 770–778

  49. [49]

    Rethinking the inception ar- chitecture for computer vision,

    Szegedy, C., Vanhoucke, V ., Ioffe, S., Shlens, J., and Wojna, Z., 2016, “Rethinking the inception ar- chitecture for computer vision,” In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 2818–2826

  50. [50]

    Dynamic graph cnn for learning on point clouds,

    Wang, Y ., Sun, Y ., Liu, Z., Sarma, S. E., Bronstein, M. M., and Solomon, J. M., 2019, “Dynamic graph cnn for learning on point clouds,”ACM Transac- tions on Graphics (tog),38(5), pp. 1–12

  51. [51]

    Focal loss for dense object de- tection,

    Lin, T.-Y ., Goyal, P., Girshick, R., He, K., and Doll´ar, P., 2017, “Focal loss for dense object de- tection,” In Proceedings of the IEEE international conference on computer vision, pp. 2980–2988

  52. [52]

    Thermal-porosity characterization data of additively manufactured ti-6al-4v thin-walled struc- ture via laser engineered net shaping,

    Zamiela, C., Tian, W., Guo, S., and Bian, L., 2023, “Thermal-porosity characterization data of additively manufactured ti-6al-4v thin-walled struc- ture via laser engineered net shaping,”Data in Brief, 51, p. 109722

  53. [53]

    Differential pri- vacy configurations in the real world: A compar- ative analysis,

    Khavkin, M., and Toch, E., 2025, “Differential pri- vacy configurations in the real world: A compar- ative analysis,”IEEE Transactions on Knowledge and Data Engineering

  54. [54]

    Advancing machine learning ap- plications for in-situ monitoring and control in laser- based metal additive manufacturing: a state-of-the- art review,

    Zhang, J., Yin, C., Farbiz, F., Jafary-Zadeh, M., and Sing, S. L., 2025, “Advancing machine learning ap- plications for in-situ monitoring and control in laser- based metal additive manufacturing: a state-of-the- art review,”Virtual and Physical Prototyping,20(1), p. e2592732