D2.1 Existing AI Algorithms and their Accountability and Resilience Features within the Context of Applications to IoT, 5G, and Cybersecurity
D2.1 Existing AI Algorithms and their Accountability and Resilience Features…
D1.2 SECURITY THREAT MODELING FOR AI BASED SYSTEM ARCHITECTURE
D1.2 SECURITY THREAT MODELING FOR AI-BASED SYSTEM ARCHITECTURE The security of…
FLAME: Taming Backdoors in Federated Learning
Authors: Thien Duc Nguyen; Phillip Rieger; Huili Chen; Hossein Yalame; Helen…
A Survey on Privacy for B5G/6G: New Privacy Challenges, and Research Directions
Authors: Chamara Sandeepa; Bartlomiej Siniarski; Nicolas Kourtellis; Shen Wang;…
Socially-aware Federated Learning: Challenges and Opportunities in Collaborative Data Training
Authors: Ottun, Abdul-Rasheed; Pramod C. Mane; Zhigang Yin; Souvik Paul; Mohan…
Towards Trustworthy Edge Intelligence: Insights from Voice-activated Services
Authors: Wiebke Toussaint Hutiri; Aaron Yi Ding Abstract: In an age of…
Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks
Authors: Suwani Jayasinghe; Yushan Siriwardhana; Pawani Porambage; Madhusanka…
Robust and Resilient Federated Learning for Securing Future Networks
Authors: Yushan Siriwardhana; Pawani Porambage; Madhusanka Liyanage; Mika…
Trustworthy and Sustainable Edge AI: A Research Agenda
Authors: Aaron Yi Ding; Marijn Janssen; Jon Crowcroft Abstract: As a fast…
The Many Faces of Edge Intelligence
Authors: Ella Peltonen; Ijaz Ahmad; Atakan Aral; Michele Capobianco; Aaron…


