The Proposed Two-Stages of Zero-Knowledge-Proof-Based Anomaly Detection
2024-1-3 05:30:3 Author: hackernoon.com(查看原文) 阅读量:8 收藏

Hackernoon logo

The Proposed Two-Stages of Zero-Knowledge-Proof-Based Anomaly Detection by@quantification

Too Long; Didn't Read

Cross-Round Check: The algorithm initializes with reference models, detecting potential attacks in Federated Learning rounds. It skips the check if no reference models exist. Cross-Client Anomaly Detection: Utilizing the three sigma rule, this stage assesses potentially malicious clients. L2 scores guide model removal, and an approximate average model is computed for subsequent rounds, ensuring robust security in Federated Learning.

featured image - The Proposed Two-Stages of Zero-Knowledge-Proof-Based Anomaly Detection

Quantification Theory Research Publication HackerNoon profile picture


@quantification

Quantification Theory Research Publication


The publication about the quantity of something. The theory about why that quantity is what is. And research!


Receive Stories from @quantification

react to story with heart

RELATED STORIES

Article Thumbnail

Article Thumbnail

Article Thumbnail

Article Thumbnail

Article Thumbnail

L O A D I N G
. . . comments & more!


文章来源: https://hackernoon.com/the-proposed-two-stages-of-zero-knowledge-proof-based-anomaly-detection?source=rss
如有侵权请联系:admin#unsafe.sh