no code implementations • 6 May 2024 • Renaud Gaucher, Hadrien Hendrikx, Aymeric Dieuleveut
Distributed approaches have many computational benefits, but they are vulnerable to attacks from a subset of devices transmitting incorrect information.