1 code implementation • 1 Jan 2021 • David Enthoven, Zaid Al-Ars
The methodology of using this attack is discussed, and as a proof of viability we show how this attack method can be used to great effect for densely connected networks and convolutional neural networks.
no code implementations • 1 Apr 2020 • David Enthoven, Zaid Al-Ars
Additionally, we provide a literature study of the most recent defensive strategies and algorithms for FL aimed to overcome these attacks.