Table of contents
A systematic literature review of authorization and access control requirements and current state of the art for different database models
Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer, Josef KüngData protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…
A review of in-memory computing for machine learning: architectures, options
Vaclav Snasel, Tran Khanh Dang, Josef Kueng, Lingping KongThis paper aims to review in-memory computing (IMC) for machine learning (ML) applications from history, architectures and options aspects. In this review, the authors investigate…
ImageNet classification with Raspberry Pis: federated learning algorithms of local classifiers
Thanh-Nghi Do, Minh-Thu Tran-NguyenThis study aims to propose novel edge device-tailored federated learning algorithms of local classifiers (stochastic gradient descent, support vector machines), namely, FL-lSGD…
DoS attack detection using Aquila deer hunting optimization enabled deep belief network
Merly Thomas, Meshram B.B.Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously…
FedACQ: adaptive clustering quantization of model parameters in federated learning
Tingting Tian, Hongjian Shi, Ruhui Ma, Yuan LiuFor privacy protection, federated learning based on data separation allows machine learning models to be trained on remote devices or in isolated data devices. However, due to the…
ISSN:
1744-0084e-ISSN:
1744-0092ISSN-L:
1744-0084Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditors:
- Prof. Honghao Gao
- Prof. Li Kuang