Results 191 to 200 of about 196,953 (259)
Some of the next articles are maybe not open access.

Do We Really Need to Design New Byzantine-robust Aggregation Rules?

Network and Distributed System Security Symposium
Federated learning (FL) allows multiple clients to collaboratively train a global machine learning model through a server, without exchanging their private training data.
Minghong Fang   +5 more
semanticscholar   +1 more source

The Byzantine Arts and Byzantine Literature

2021
Abstract This chapter examines the relationships between literary and visual forms in Byzantium. Both in the Early and in the later Byzantine periods there were clear parallels between the ways that literary and visual compositions were structured, whether through the rhetorical techniques of repetition, variation, and acrostic in Early ...
openaire   +1 more source

Resilient Human-in-the-Loop Formation-Tracking of Multi-UAV Systems Against Byzantine Attacks

IEEE Transactions on Automation Science and Engineering
This study addresses resilient human-in-the-loop (HiTL) formation-tracking of multi-UAV systems against f-local Byzantine attacks. In the HiTL settings, a human operator plays a key role in detecting any physical hazard, monitoring the whole UAV swarm ...
Xin Gong   +5 more
semanticscholar   +1 more source

L'Orthodoxie byzantine / Byzantine Orthodoxy

Archives de sciences sociales des religions, 1991
Guillou André. L'Orthodoxie byzantine / Byzantine Orthodoxy. In: Archives de sciences sociales des religions, n°75, 1991. pp. 5-10.
openaire   +2 more sources

Privacy-Preserving and Byzantine-Robust Federated Learning

IEEE Transactions on Dependable and Secure Computing
Federated learning (FL) trains a model over multiple datasets by collecting the local models rather than raw data, which can help facilitate distributed data analysis in many real-world applications.
Caiqin Dong   +6 more
semanticscholar   +1 more source

Bee’s Strategy Against Byzantines Replacing Byzantine Participants

2018
Schemes for the identification and replacement of two-faced Byzantine processes are presented. The detection is based on the comparison of the (blackbox) decision result of a Byzantine consensus on input consisting of the inputs of each of the processes, in a system containing n processes p1, ..., pn. Process pi that received a gossiped message from pj
Shaer A.   +4 more
openaire   +1 more source

On the Byzantine Robustness of Clustered Federated Learning

IEEE International Conference on Acoustics, Speech, and Signal Processing, 2020
Federated Learning (FL) is currently the most widely adopted framework for collaborative training of (deep) machine learning models under privacy constraints.
Felix Sattler   +3 more
semanticscholar   +1 more source

SCEAUX BYZANTINS INÉDITS

Byzantinische Zeitschrift, 1933
Laurent Vitalien. Sceaux byzantins inédits. In: Échos d'Orient, tome 32, n°169, 1933. pp. 34-56.
openaire   +2 more sources

Dumbo-MVBA: Optimal Multi-Valued Validated Asynchronous Byzantine Agreement, Revisited

IACR Cryptology ePrint Archive, 2020
Multi-valued validated asynchronous Byzantine agreement (MVBA), proposed in the elegant work of Cachin et al. (CRYPTO '01), is fundamental for critical fault-tolerant services such as atomic broadcast in the asynchronous network.
Yuan Lu   +3 more
semanticscholar   +1 more source

Redeeming Byzantine Epistolography

Byzantine and Modern Greek Studies, 1996
The Russian scholar V.A. Smetanin, whose work during the 1970s and 1980s dealt exclusively with Byzantine epistolography, would clearly like to think of himself as an ‘epistolologist’, occupied in the specialised field of Byzantine ‘epistolology’. Epistolology is an auxiliary discipline within history, according to Smetanin, which encompasses both ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy