Sort by
Refine Your Search
-
learning in resource-limited IoT networks. It utilizes symmetric key encryption and hash functions to protect local models of resource-constrained IoT devices in federated learning from security attacks
Searches related to network
Enter an email to receive alerts for network positions