Picture for Ihab Mohammed

Ihab Mohammed

Exploration and Exploitation in Federated Learning to Exclude Clients with Poisoned Data

Add code
Apr 29, 2022
Figure 1 for Exploration and Exploitation in Federated Learning to Exclude Clients with Poisoned Data
Figure 2 for Exploration and Exploitation in Federated Learning to Exclude Clients with Poisoned Data
Figure 3 for Exploration and Exploitation in Federated Learning to Exclude Clients with Poisoned Data
Figure 4 for Exploration and Exploitation in Federated Learning to Exclude Clients with Poisoned Data
Viaarxiv icon

Budgeted Online Selection of Candidate IoT Clients to Participate in Federated Learning

Add code
Nov 16, 2020
Figure 1 for Budgeted Online Selection of Candidate IoT Clients to Participate in Federated Learning
Figure 2 for Budgeted Online Selection of Candidate IoT Clients to Participate in Federated Learning
Figure 3 for Budgeted Online Selection of Candidate IoT Clients to Participate in Federated Learning
Figure 4 for Budgeted Online Selection of Candidate IoT Clients to Participate in Federated Learning
Viaarxiv icon

Trust-Based Cloud Machine Learning Model Selection For Industrial IoT and Smart City Services

Add code
Aug 11, 2020
Viaarxiv icon