Picture for Safa Otoum

Safa Otoum

ON-DEMAND-FL: A Dynamic and Efficient Multi-Criteria Federated Learning Client Deployment Scheme

Add code
Nov 05, 2022
Figure 1 for ON-DEMAND-FL: A Dynamic and Efficient Multi-Criteria Federated Learning Client Deployment Scheme
Figure 2 for ON-DEMAND-FL: A Dynamic and Efficient Multi-Criteria Federated Learning Client Deployment Scheme
Figure 3 for ON-DEMAND-FL: A Dynamic and Efficient Multi-Criteria Federated Learning Client Deployment Scheme
Figure 4 for ON-DEMAND-FL: A Dynamic and Efficient Multi-Criteria Federated Learning Client Deployment Scheme
Viaarxiv icon

FedMint: Intelligent Bilateral Client Selection in Federated Learning with Newcomer IoT Devices

Add code
Oct 31, 2022
Figure 1 for FedMint: Intelligent Bilateral Client Selection in Federated Learning with Newcomer IoT Devices
Figure 2 for FedMint: Intelligent Bilateral Client Selection in Federated Learning with Newcomer IoT Devices
Figure 3 for FedMint: Intelligent Bilateral Client Selection in Federated Learning with Newcomer IoT Devices
Figure 4 for FedMint: Intelligent Bilateral Client Selection in Federated Learning with Newcomer IoT Devices
Viaarxiv icon

A Federated Learning Scheme for Neuro-developmental Disorders: Multi-Aspect ASD Detection

Add code
Oct 31, 2022
Figure 1 for A Federated Learning Scheme for Neuro-developmental Disorders: Multi-Aspect ASD Detection
Figure 2 for A Federated Learning Scheme for Neuro-developmental Disorders: Multi-Aspect ASD Detection
Figure 3 for A Federated Learning Scheme for Neuro-developmental Disorders: Multi-Aspect ASD Detection
Figure 4 for A Federated Learning Scheme for Neuro-developmental Disorders: Multi-Aspect ASD Detection
Viaarxiv icon

A Comparative Study of AI-based Intrusion Detection Techniques in Critical Infrastructures

Add code
Jul 24, 2020
Figure 1 for A Comparative Study of AI-based Intrusion Detection Techniques in Critical Infrastructures
Figure 2 for A Comparative Study of AI-based Intrusion Detection Techniques in Critical Infrastructures
Figure 3 for A Comparative Study of AI-based Intrusion Detection Techniques in Critical Infrastructures
Figure 4 for A Comparative Study of AI-based Intrusion Detection Techniques in Critical Infrastructures
Viaarxiv icon