Adaptive Trust Management for Data Poisoning Attacks in Mec-Based Fl Infrastructures

AuthID
P-017-R7T
6
Author(s)
Hathout, B
·
Shepherd, P
·
Dagiuklas, T
·
Nagaty, K
·
Hamdy, A
·
1
Group Author(s)
Special Issue Trustworthy AI Enabled Edge Computing Next Generation
Tipo de Documento
Article
Year published
2025
Publicado
in IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, ISSN: 2644-125X
Volume: 6, Páginas: 3140-3160 (21)
Indexing
Publication Identifiers
DBLP: journals/ojcs/HathoutSDNHR25
SCOPUS: 2-s2.0-85213691311
Wos: WOS:001473125300019
Source Identifiers
ISSN: 2644-125X
Export Publication Metadata
Citações
Oops! It looks like you don't have access to this content.

This section is restricted to uses with b-on access.



CORE Conference
No information about CORE Rank

During the preprocessing phase, only publications of type 'Proceedings Paper' or 'Proceedings' are automatically processed to identify their CORE Rank.

TIP: If your publication's CORE Rank is missing, you can contact with your institutional manager to have the correct ranking manually added to the record.

Journal Factors
Oops! It looks like you don't have access to this content.

This section is restricted to uses with b-on access.

Info
At this moment we don't have any links to full text documens.