no code implementations • 16 Apr 2023 • Nazar Waheed, Ateeq Ur Rehman, Anushka Nehra, Mahnoor Farooq, Nargis Tariq, Mian Ahmad Jan, Fazlullah Khan, Abeer Z. Alalmaie, Priyadarsi Nanda
Traditional approaches need to ensure security and privacy while maintaining computational efficiency, particularly for resource-constrained IoT devices.