1 code implementation • 7 May 2024 • Kealan Dunnett, Reza Arablouei, Dimity Miller, Volkan Dedeoglu, Raja Jurdak
In the era of increasing concerns over cybersecurity threats, defending against backdoor attacks is paramount in ensuring the integrity and reliability of machine learning models.
1 code implementation • 15 Aug 2023 • Timothy Tadj, Reza Arablouei, Volkan Dedeoglu
These features can be used to learn ML models for recognizing the trustworthiness of IoT sensor data.