no code implementations • 6 May 2024 • Hamid Varmazyari, Yiming Jiang, Jiangfan Zhang
This paper focuses on developing a performance guarantee for the distributed estimation in a BIoT in the presence of malicious attacks which jointly exploits vulnerabilities present in both IoT devices and the employed blockchain within the BIoT.
no code implementations • 9 May 2023 • Yiming Jiang, Jinlan Liu, Dongpo Xu, Danilo P. Mandic
Adam-type algorithms have become a preferred choice for optimisation in the deep learning setting, however, despite success, their convergence is still not well understood.