Secure Federated Training: Detecting Compromised Nodes and Identifying the Type of Attacks.
Pretom Roy OviAryya GangopadhyayRobert F. ErbacherCarl E. BusartPublished in: ICMLA (2022)
Keyphrases
- secure routing
- security protocols
- countermeasures
- security mechanisms
- cryptographic protocols
- digital libraries
- security flaws
- cryptographic algorithms
- chosen plaintext
- stream cipher
- unauthorized access
- security measures
- training process
- directed graph
- data sources
- training set
- security management
- malicious nodes
- routing protocol
- network intrusion detection systems
- wireless sensor networks