Author of the publication

On the Practicality of Differential Privacy in Federated Learning by Tuning Iteration Times.

, , , , , and . CoRR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Distributed Gateway Selection Algorithm for UAV Networks., , , , , , and . IEEE Trans. Emerg. Top. Comput., 3 (1): 22-33 (2015)Efficient Video Privacy Protection Against Malicious Face Recognition Models., , , and . IEEE Open J. Comput. Soc., (2022)On the Stress Function-Based OWA Determination Method With Optimization Criteria., and . IEEE Trans. Syst. Man Cybern. Part B, 42 (1): 246-257 (2012)Minimizing Financial Cost of DDoS Attack Defense in Clouds With Fine-Grained Resource Management., , , , , , , and . IEEE Trans. Netw. Sci. Eng., 7 (4): 2541-2554 (2020)Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks., , , , and . IEEE Trans. Netw. Sci. Eng., 8 (1): 269-281 (2021)Special Issue on networking aspects in Big Data.. Int. J. Parallel Emergent Distributed Syst., 30 (1): 3-4 (2015)A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment., , , , , , and . IEEE Trans. Parallel Distributed Syst., 28 (4): 919-933 (2017)DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication., , , , and . Soft Comput., 25 (11): 7325-7339 (2021)Reliability-aware virtual network function placement in carrier networks., , , , and . J. Netw. Comput. Appl., (2020)Detecting false data attacks using machine learning techniques in smart grid: A survey., , , , and . J. Netw. Comput. Appl., (2020)