this article provides a distributed storage and management method for hypertext files and metadata based on consortium chains. By receiving storage requests from storage users, including files to be stored, request in...
详细信息
this paper presents a systematic study of distributed Acyclic Graph (DAG) and Blockchain technologies, which are two growing technologies that can be implemented with IoMT (Internet of Medical things) and EHRs (Electr...
详细信息
Neuromorphic sensors using piezoelectric MEMS resonators developed by adapting physical reservoir computing (PRC) algorithm. the device has two resonators with a resonant frequency of about 1 kHz, which is in the audi...
详细信息
sensor fusion technology is a critical component of autonomous vehicles, enabling them to perceive and respond to their environment with greater accuracy and speed. this technology integrates data from multiple sensor...
详细信息
In recent years, the 'whole chain' development level of China's intellectual property creation, protection and application has been greatly improved. At the same time, cloud computing technology is booming...
详细信息
Association patterns generated from association rule mining (ARM) process may contain sensitive data and revealing it will cause potential privacy threats. this problem evolves even poorer if ARM is performed on distr...
详细信息
In recent years, extensive research has been conducted on the risk of false data injection (FDI) attacks, which has led to major concerns about the potential consequences of these attacks in real-world situations. Fal...
详细信息
Facing the development trend of future distributed cloud operations, intelligent operations, and the technical requirements of multi-machine collaborative operations in the aviation field, this paper further studies t...
详细信息
Federated Learning (FL) holds great promise for collaborative model training across distributed devices. However, it faces a significant threat: model poisoning attacks. In particular, Byzantine attacks can severely c...
详细信息
ISBN:
(纸本)9798350375367
Federated Learning (FL) holds great promise for collaborative model training across distributed devices. However, it faces a significant threat: model poisoning attacks. In particular, Byzantine attacks can severely compromise the accuracy of FL systems. through experimental analysis, we demonstrate a significant degradation in network accuracy as the percentage of malicious participants increases, underscoring the critical need for robust defense mechanisms. Our proposed detection strategy, based on clustering algorithms, exhibits promising results in identifying outliers and potential attackers, offering a proactive approach to safeguarding FL systems against adversarial manipulation. this work underscores the critical necessity of implementing robust detection and mitigation strategies to improve the resilience of Federated Learning against increasingly sophisticated and pervasive attacks.
In the field of nuclear energy, the Loss of Coolant Accident (LOCA) is recognized as one of the most severe types of nuclear reactor accidents, characterized by its complex physical processes and potentially catastrop...
详细信息
暂无评论