Adaptive Trust Management for Data Poisoning Attacks in Mec-Based Fl Infrastructures

AuthID
P-017-R7T
6
Author(s)
Hathout, B
·
Shepherd, P
·
Dagiuklas, T
·
Nagaty, K
·
Hamdy, A
·
1
Group Author(s)
Special Issue Trustworthy AI Enabled Edge Computing Next Generation
Document Type
Article
Year published
2025
Published
in IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, ISSN: 2644-125X
Volume: 6, Pages: 3140-3160 (21)
Indexing
Publication Identifiers
Dblp: journals/ojcs/HathoutSDNHR25
Scopus: 2-s2.0-85213691311
Wos: WOS:001473125300019
Source Identifiers
ISSN: 2644-125X
Export Publication Metadata
Marked List
Citations
Oops! It looks like you don't have access to this content.

This section is restricted to uses with b-on access.



CORE Conference
No information about CORE Rank

During the preprocessing phase, only publications of type 'Proceedings Paper' or 'Proceedings' are automatically processed to identify their CORE Rank.

TIP: If your publication's CORE Rank is missing, you can contact with your institutional manager to have the correct ranking manually added to the record.

Journal Factors
Oops! It looks like you don't have access to this content.

This section is restricted to uses with b-on access.

Info
At this moment we don't have any links to full text documens.