Picture for Mao V. Ngo

Mao V. Ngo

Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning

Add code
Aug 14, 2022
Figure 1 for Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning
Figure 2 for Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning
Figure 3 for Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning
Figure 4 for Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning
Viaarxiv icon

Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge Computing: A Contextual-Bandit Approach

Add code
Aug 09, 2021
Figure 1 for Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge Computing: A Contextual-Bandit Approach
Figure 2 for Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge Computing: A Contextual-Bandit Approach
Figure 3 for Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge Computing: A Contextual-Bandit Approach
Figure 4 for Adaptive Anomaly Detection for Internet of Things in Hierarchical Edge Computing: A Contextual-Bandit Approach
Viaarxiv icon

Contextual-Bandit Anomaly Detection for IoT Data in Distributed Hierarchical Edge Computing

Add code
Apr 15, 2020
Figure 1 for Contextual-Bandit Anomaly Detection for IoT Data in Distributed Hierarchical Edge Computing
Figure 2 for Contextual-Bandit Anomaly Detection for IoT Data in Distributed Hierarchical Edge Computing
Figure 3 for Contextual-Bandit Anomaly Detection for IoT Data in Distributed Hierarchical Edge Computing
Figure 4 for Contextual-Bandit Anomaly Detection for IoT Data in Distributed Hierarchical Edge Computing
Viaarxiv icon

Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing

Add code
Jan 10, 2020
Figure 1 for Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing
Figure 2 for Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing
Figure 3 for Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing
Figure 4 for Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing
Viaarxiv icon