Abstract: The great use of Quick Response (QR) codes has created new cybersecurity risks, particularly phishing attacks carried out using dangerous URLs hidden within supposedly real codes. This paper ...
Abstract: Federated tree-based models are popular in many real-world applications owing to their high accuracy and good interpretability. However, the classical synchronous method causes inefficient ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results