共 15 条
[3]
Biewald L., 2020, Experiment tracking with weights and biases
[4]
Caldas S., 2018, arXiv
[5]
Krizhevsky A, 2014, The cifar-10 dataset, P55
[6]
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning
[J].
2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN),
2017,
:297-308
[7]
Li Deng, 2012, IEEE Signal Processing Magazine, V29, P141, DOI [DOI 10.1109/MSP.2012.2211477, 10.1109/MSP.2012.2211477]
[8]
McMahan HB, 2017, PR MACH LEARN RES, V54, P1273
[9]
Towards a Peer-to-Peer Federated Machine Learning Environment for Continuous Authentication
[J].
26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021),
2021,
[10]
Oza P, 2021, Arxiv, DOI arXiv:2104.07158