Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
- Cranfield University
- Loughborough University
- University of East Anglia
- University of Nottingham
- University of Sheffield
- ;
- ; Coventry University Group
- ; The University of Manchester
- ; University of Exeter
- Abertay University
- Coventry University Group;
- Manchester Metropolitan University;
- Oxford Brookes University
- SINGAPORE INSTITUTE OF TECHNOLOGY (SIT)
- University of Birmingham;
- University of Cambridge
- University of East Anglia;
- University of Exeter
- University of Newcastle
- University of Warwick
- 10 more »
- « less
-
Field
-
memorisation capabilities of deep learning models. Such vulnerabilities expose FL systems to various privacy attacks, making the study of privacy in distributed settings increasingly complex and vital
-
one of the following analysis techniques (multiple preferred): normative modelling, dimensionality reduction techniques, machine learning, deep-learning, state space modelling, advanced statistics
-
learning’ approaches (such as Deep CNN’s) and ‘unsupervised learning’ approaches (such as reinforcement based learning and generative adversarial networks). Some of the main problems with Second Wave AI
-
this issue and we could use obtain data-driven models using machine learning algorithms such as artificial neural networks, reinforcement learning, and deep learning. A typical caveat of data-driven modelling