Abstract: The great use of Quick Response (QR) codes has created new cybersecurity risks, particularly phishing attacks carried out using dangerous URLs hidden within supposedly real codes. This paper ...
Abstract: Federated tree-based models are popular in many real-world applications owing to their high accuracy and good interpretability. However, the classical synchronous method causes inefficient ...