Search Results for author: Thiemo Voigt

Found 5 papers, 2 papers with code

An Experimental Study of Byzantine-Robust Aggregation Schemes in Federated Learning

no code implementations14 Feb 2023 Shenghui Li, Edith C. -H. Ngai, Thiemo Voigt

In recent years, several robust aggregation schemes have been proposed to defend against malicious updates from Byzantine clients and improve the robustness of federated learning.

Federated Learning

On-device Training: A First Overview on Existing Systems

no code implementations1 Dec 2022 Shuai Zhu, Thiemo Voigt, JeongGil Ko, Fatemeh Rahimian

A majority of the early application systems focused on exploiting the inference capabilities of ML and DL models, where data captured from different mobile and embedded sensing components are processed through these models for application goals such as classification and segmentation.

Privacy Preserving

DeepGANTT: A Scalable Deep Learning Scheduler for Backscatter Networks

no code implementations24 Dec 2021 Daniel F. Perez-Ramirez, Carlos Pérez-Penichet, Nicolas Tsiftes, Thiemo Voigt, Dejan Kostic, Magnus Boman

Without the need to retrain, DeepGANTT generalizes to networks 6x larger in the number of nodes and 10x larger in the number of tags than those used for training, breaking the scalability limitations of the optimal scheduler and reducing carrier utilization by up to 50% compared to the state-of-the-art heuristic.

Combinatorial Optimization Scheduling

Auto-weighted Robust Federated Learning with Corrupted Data Sources

1 code implementation14 Jan 2021 Shenghui Li, Edith Ngai, Fanghua Ye, Thiemo Voigt

In this paper, we address this challenge by proposing Auto-weighted Robust Federated Learning (arfl), a novel approach that jointly learns the global model and the weights of local updates to provide robustness against corrupted data sources.

Federated Learning Privacy Preserving

The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services

1 code implementation16 Sep 2020 Ahmed Mohamed Hussain, Gabriele Oligeri, Thiemo Voigt

We present a new machine learning-based attack that exploits network patterns to detect the presence of smart IoT devices and running services in the WiFi radio spectrum.

Cannot find the paper you are looking for? You can Submit a new open access paper.