{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T10:09:12Z","timestamp":1779098952414,"version":"3.51.4"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T00:00:00Z","timestamp":1696896000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,10]]},"DOI":"10.1109\/icnp59255.2023.10355606","type":"proceedings-article","created":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T19:18:50Z","timestamp":1703099930000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Towards Trust-Based Data Weighting in Machine Learning"],"prefix":"10.1109","author":[{"given":"Se\u00e1n \u00d3g","family":"Murphy","sequence":"first","affiliation":[{"name":"School of Computer Science &#x0026; Information Technology, University College Cork,Cork,Ireland"}]},{"given":"Utz","family":"Roedig","sequence":"additional","affiliation":[{"name":"School of Computer Science &#x0026; Information Technology, University College Cork,Cork,Ireland"}]},{"given":"Cormac J.","family":"Sreenan","sequence":"additional","affiliation":[{"name":"School of Computer Science &#x0026; Information Technology, University College Cork,Cork,Ireland"}]},{"given":"Ahmed","family":"Khalid","sequence":"additional","affiliation":[{"name":"Dell Technologies,Dell Research,Cork,Ireland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936094"},{"key":"ref2","article-title":"Zero trust archi-tecture","author":"Rose","year":"2020","journal-title":"National Institute of Standards and Technology, Tech. Rep."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3343440"},{"key":"ref5","first-page":"9","article-title":"The swirlds hashgraph consensus algorithm: Fair, fast, byzan-tine fault tolerance","volume":"34","author":"Baird","year":"2016","journal-title":"Swirlds Tech Reports SWIRLDS-TR-2016\u201301, Tech. Rep"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3157996"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3013279"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3176385"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1093\/heapol\/czz163"},{"issue":"4","key":"ref10","doi-asserted-by":"crossref","first-page":"347","DOI":"10.69554\/CCMF2668","article-title":"Protecting patient confidentiality in the internet of medical things through confidential computing","volume":"5","author":"Searle","year":"2023","journal-title":"Journal of Data Protection & Privacy"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM52596.2021.9652916"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6509982"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9122083"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s23135993"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FNWF55208.2022.00111"},{"key":"ref16","first-page":"2825","article-title":"Scikit-learn: Machine learning in Python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"Journal of Machine Learning Research"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/SERIES1345"},{"key":"ref18","volume-title":"Primer of applied regression & analysis of variance, ed","volume":"654","author":"Glantz","year":"2001"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Machine learning"},{"key":"ref20","volume-title":"Hands-on machine learning with Scikit-Learn, Keras, and TensorFlow","author":"Geron","year":"2022"},{"key":"ref21","volume-title":"California housing prices","author":"Nugent","year":"2017"},{"key":"ref22","author":"Moro","year":"2011","journal-title":"Using data mining for bank direct marketing: An application of the crisp-dm methodology"},{"key":"ref23","volume-title":"CLEVER Project"}],"event":{"name":"2023 IEEE 31st International Conference on Network Protocols (ICNP)","location":"Reykjavik, Iceland","start":{"date-parts":[[2023,10,10]]},"end":{"date-parts":[[2023,10,13]]}},"container-title":["2023 IEEE 31st International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10355566\/10355569\/10355606.pdf?arnumber=10355606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T13:57:30Z","timestamp":1730901450000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10355606\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icnp59255.2023.10355606","relation":{},"subject":[],"published":{"date-parts":[[2023,10,10]]}}}