d37eb50d868361ea729bb4147eb3c1d8-AuthorFeedback.pdf

Neural Information Processing Systems 

We note that the network connectivity is not assumed to be known. The15 results showthat our method isalso resilient toattacks consisting of dropped nodes (Figure 1). In contrast to our method,18 [16] requires a user defined parameterF, which is the maximum number of Byz. To Reviewer #3 Q1: Scope of the paper/Missing related work. There is a large25 body of related work to MTL with different variations.

Similar Docs  Excel Report  more

TitleSimilaritySource
None found