Results 191 to 200 of about 196,953 (259)
Some of the next articles are maybe not open access.
Do We Really Need to Design New Byzantine-robust Aggregation Rules?
Network and Distributed System Security SymposiumFederated learning (FL) allows multiple clients to collaboratively train a global machine learning model through a server, without exchanging their private training data.
Minghong Fang +5 more
semanticscholar +1 more source
The Byzantine Arts and Byzantine Literature
2021Abstract This chapter examines the relationships between literary and visual forms in Byzantium. Both in the Early and in the later Byzantine periods there were clear parallels between the ways that literary and visual compositions were structured, whether through the rhetorical techniques of repetition, variation, and acrostic in Early ...
openaire +1 more source
Resilient Human-in-the-Loop Formation-Tracking of Multi-UAV Systems Against Byzantine Attacks
IEEE Transactions on Automation Science and EngineeringThis study addresses resilient human-in-the-loop (HiTL) formation-tracking of multi-UAV systems against f-local Byzantine attacks. In the HiTL settings, a human operator plays a key role in detecting any physical hazard, monitoring the whole UAV swarm ...
Xin Gong +5 more
semanticscholar +1 more source
L'Orthodoxie byzantine / Byzantine Orthodoxy
Archives de sciences sociales des religions, 1991Guillou André. L'Orthodoxie byzantine / Byzantine Orthodoxy. In: Archives de sciences sociales des religions, n°75, 1991. pp. 5-10.
openaire +2 more sources
Privacy-Preserving and Byzantine-Robust Federated Learning
IEEE Transactions on Dependable and Secure ComputingFederated learning (FL) trains a model over multiple datasets by collecting the local models rather than raw data, which can help facilitate distributed data analysis in many real-world applications.
Caiqin Dong +6 more
semanticscholar +1 more source
Bee’s Strategy Against Byzantines Replacing Byzantine Participants
2018Schemes for the identification and replacement of two-faced Byzantine processes are presented. The detection is based on the comparison of the (blackbox) decision result of a Byzantine consensus on input consisting of the inputs of each of the processes, in a system containing n processes p1, ..., pn. Process pi that received a gossiped message from pj
Shaer A. +4 more
openaire +1 more source
On the Byzantine Robustness of Clustered Federated Learning
IEEE International Conference on Acoustics, Speech, and Signal Processing, 2020Federated Learning (FL) is currently the most widely adopted framework for collaborative training of (deep) machine learning models under privacy constraints.
Felix Sattler +3 more
semanticscholar +1 more source
Byzantinische Zeitschrift, 1933
Laurent Vitalien. Sceaux byzantins inédits. In: Échos d'Orient, tome 32, n°169, 1933. pp. 34-56.
openaire +2 more sources
Laurent Vitalien. Sceaux byzantins inédits. In: Échos d'Orient, tome 32, n°169, 1933. pp. 34-56.
openaire +2 more sources
Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited
IACR Cryptology ePrint Archive, 2020Multi-valued validated asynchronous Byzantine agreement (MVBA), proposed in the elegant work of Cachin et al. (CRYPTO '01), is fundamental for critical fault-tolerant services such as atomic broadcast in the asynchronous network.
Yuan Lu +3 more
semanticscholar +1 more source
Redeeming Byzantine Epistolography
Byzantine and Modern Greek Studies, 1996The Russian scholar V.A. Smetanin, whose work during the 1970s and 1980s dealt exclusively with Byzantine epistolography, would clearly like to think of himself as an ‘epistolologist’, occupied in the specialised field of Byzantine ‘epistolology’. Epistolology is an auxiliary discipline within history, according to Smetanin, which encompasses both ...
openaire +2 more sources

