no code implementations • 16 Apr 2021 • Bo Zhao, Peng Sun, Liming Fang, Tao Wang, Keyu Jiang
The results demonstrate its effectiveness and superior performance compared to the state-of-the-art Byzantine-robust schemes in defending against typical data poisoning and model poisoning attacks under practical Non-IID data distributions.