Results 31 to 40 of about 196,953 (259)

SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning

open access: yesIEEE Transactions on Dependable and Secure Computing, 2022
Federated learning facilitates the collaborative training of a global model among distributed clients without sharing their training data. Secure aggregation, a new security primitive for federated learning, aims to preserve the confidentiality of both ...
Lingchen Zhao   +5 more
semanticscholar   +1 more source

Byzantine-Resilient Decentralized Stochastic Optimization With Robust Aggregation Rules [PDF]

open access: yesIEEE Transactions on Signal Processing, 2022
This article focuses on decentralized stochastic optimization in the presence of Byzantine attacks. During the optimization process, an unknown number of malfunctioning or malicious workers, termed as Byzantine workers, disobey the algorithmic protocol ...
Zhaoxian Wu, Tianyi Chen, Qing Ling
semanticscholar   +1 more source

Byzantine-Resilient Secure Federated Learning [PDF]

open access: yesIEEE Journal on Selected Areas in Communications, 2020
Secure federated learning is a privacy-preserving framework to improve machine learning models by training over large volumes of data collected by mobile users. This is achieved through an iterative process where, at each iteration, users update a global
Jinhyun So, Basak Guler, A. Avestimehr
semanticscholar   +1 more source

Motifs with Sacred and Apotropaic Meanings on the Wall Paintings of Cappadocia Region

open access: yesArt-Sanat, 2021
In early Christian society, the continuation of pagan beliefs and apotropaic elements derived from the Roman culture can be observed in the reflections of artistic production.
Metin Kaya
doaj   +1 more source

Byzantine disk paxos: optimal resilience with byzantine shared memory [PDF]

open access: yesDistributed Computing, 2004
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Abraham, Ittai   +3 more
openaire   +2 more sources

The Byzantine Generals Problem

open access: yesACM Transactions on Programming Languages and Systems, 1982
Reliable computer systems must handle malfunctioning components that give conflicting information to different parts of the system. This situation can be expressed abstractly in terms of a group of generals of the Byzantine army camped with their troops ...
L. Lamport, R. Shostak, M. Pease
semanticscholar   +1 more source

DisBezant: Secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS

open access: yesIEEE transactions on intelligent transportation systems (Print), 2023
With the intelligentization of Maritime Transportation System (MTS), Internet of Thing (IoT) and machine learning technologies have been widely used to achieve the intelligent control and routing planning for ships.
Xindi Ma   +5 more
semanticscholar   +1 more source

‘Urban’ and ‘Rural’ in Byzantium: The Gulf of Mandalya (Güllük Körfezi) in light of Archaeological Evidence

open access: yesArt-Sanat, 2023
This paper, focusing on the results of a long-term and interdisciplinary archaeological research project conducted in theGulf of Mandalya, investigates the transformation of rural settlements and the countryside in coastal Caria from Late Antiquity to ...
Ufuk Serin
doaj   +1 more source

Bounding the Impact of Unbounded Attacks in Stabilization [PDF]

open access: yes, 2010
Self-stabilization is a versatile approach to fault-tolerance since it permits a distributed system to recover from any transient fault that arbitrarily corrupts the contents of all memories in the system.
Dubois, Swan   +2 more
core   +7 more sources

Byzantine Machine Learning: A Primer

open access: yesACM Computing Surveys, 2023
The problem of Byzantine resilience in distributed machine learning, a.k.a. Byzantine machine learning, consists of designing distributed algorithms that can train an accurate model despite the presence of Byzantine nodes—that is, nodes with corrupt data
R. Guerraoui   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy