Author of the publication

Defending Byzantine attacks in ensemble federated learning: A reputation-based phishing approach.

, , , , , and . Future Gener. Comput. Syst., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CLPNet: Cleft Lip and Palate Surgery Support With Deep Learning., , , , , and . EMBC, page 3666-3672. IEEE, (2019)Fuzzy Expert System for the Competitiveness Evaluation of Shipbuilding Companies., , , and . J. Softw., 9 (3): 663-667 (2014)Application progress of artificial intelligence in traditional Chinese medicine nursing., , and . ISAIMS, page 69-74. ACM, (2021)Dyncast: Use Dynamic Anycast to Facilitate Service Semantics Embedded in IP address., , , , and . HPSR, page 1-8. IEEE, (2021)Deep Density-Aware Count Regressor., , , , , and . ECAI, volume 325 of Frontiers in Artificial Intelligence and Applications, page 2856-2863. IOS Press, (2020)Recurrent RLCN-Guided Attention Network for Single Image Deraining., , and . MVA, page 1-5. IEEE, (2021)FedRFC: Federated Learning with Recursive Fuzzy Clustering for improved non-IID data training., , , , , and . Future Gener. Comput. Syst., (2024)In silico method for systematic analysis of feature importance in microRNA-mRNA interactions., , , , , , and . BMC Bioinform., (2009)autoBioSeqpy: A Deep Learning Tool for the Classification of Biological Sequences., , , , , and . J. Chem. Inf. Model., 60 (8): 3755-3764 (2020)Explaining the Influence of Workarounds on Effective Use - the Case of a supply Chain Management System., , and . ECIS, page 4. (2017)