Recognition: no theorem link
Compliance Management for Federated Data Processing
Pith reviewed 2026-05-15 20:02 UTC · model grok-4.3
The pith
Legal and organizational requirements can be collected and translated into machine-actionable policies for federated data processing networks via a prototype framework.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The paper claims that through the implemented prototype, legal and organizational requirements can be collected and translated into machine-actionable policies in FDP networks by integrating policy-as-code, workflow orchestration, and LLM-assisted compliance management.
What carries the argument
The compliance-aware FDP framework, which uses policy-as-code to encode rules, workflow orchestration to manage processes across boundaries, and LLM assistance to translate requirements into enforceable policies.
If this is right
- Collaborative analysis of sensitive data across organizations becomes possible without moving raw datasets.
- Heterogeneous access policies and regulatory requirements can be managed more consistently in FDP networks.
- Long-running workflows gain integrated compliance checks that adapt to organizational boundaries.
- Real-world FDP adoption increases by reducing manual effort in policy creation and enforcement.
Where Pith is reading between the lines
- If the prototype generalizes, similar frameworks could extend to other distributed systems handling regulated data like medical records or financial transactions.
- The method opens a path to automated policy updates when regulations change, reducing lag in compliance for dynamic networks.
- Integration with existing orchestration tools might allow compliance to be verified continuously rather than at workflow start.
Load-bearing premise
LLM-assisted translation of complex legal and organizational requirements produces accurate machine-actionable policies without substantial human correction or errors in real FDP settings.
What would settle it
Testing the prototype on actual multi-organization legal texts and finding frequent inaccuracies or incomplete policies that require major manual fixes would show the translation step does not hold.
read the original abstract
Federated data processing (FDP) offers a promising approach for enabling collaborative analysis of sensitive data without centralizing raw datasets. However, real-world adoption remains limited due to the complexity of managing heterogeneous access policies, regulatory requirements, and long-running workflows across organizational boundaries. In this paper, we present a framework for compliance-aware FDP that integrates policy-as-code, workflow orchestration, and large language model (LLM)-assisted compliance management. Through the implemented prototype, we show how legal and organizational requirements can be collected and translated into machine-actionable policies in FDP networks.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript presents a framework for compliance-aware federated data processing (FDP) that integrates policy-as-code, workflow orchestration, and LLM-assisted compliance management. The central claim is that an implemented prototype demonstrates how legal and organizational requirements can be collected and translated into machine-actionable policies across FDP networks.
Significance. If the LLM-assisted translation component can be shown to produce reliable policies, the framework would address a significant practical barrier to FDP adoption by automating compliance handling for heterogeneous requirements and long-running workflows. This could enable more widespread collaborative analysis of sensitive data without centralization.
major comments (1)
- [Abstract] Abstract: The prototype is presented as evidence that requirements 'can be collected and translated' into machine-actionable policies, yet the description provides no quantitative accuracy metrics, error rates, human-expert validation results, or baseline comparisons for the LLM translation step. Without such evidence, the effectiveness claim for real FDP settings remains unsupported.
Simulated Author's Rebuttal
We thank the referee for the detailed and constructive review. We agree that the current manuscript lacks quantitative evidence for the LLM-assisted translation step and will strengthen the paper with an evaluation section in the revision.
read point-by-point responses
-
Referee: [Abstract] Abstract: The prototype is presented as evidence that requirements 'can be collected and translated' into machine-actionable policies, yet the description provides no quantitative accuracy metrics, error rates, human-expert validation results, or baseline comparisons for the LLM translation step. Without such evidence, the effectiveness claim for real FDP settings remains unsupported.
Authors: We accept this criticism. The prototype demonstrates end-to-end feasibility of collecting requirements and emitting policy-as-code artifacts, but the manuscript does not report accuracy, error rates, or expert validation for the LLM translation component. In the revised manuscript we will add a new evaluation subsection that measures translation accuracy against a ground-truth set of legal requirements, reports error categories, and includes a baseline comparison with rule-based or human-written policies. We will also update the abstract to reflect the scope of the empirical claims more precisely. revision: yes
Circularity Check
No significant circularity detected in derivation chain
full rationale
The paper presents an engineering framework and prototype for compliance management in federated data processing, integrating policy-as-code, orchestration, and LLM assistance. The central claim is that the implemented prototype demonstrates collection and translation of legal/organizational requirements into machine-actionable policies. No equations, first-principles derivations, fitted parameters, or predictions appear in the provided abstract or described content. No self-citations, uniqueness theorems, or ansatzes are invoked in a load-bearing way. The argument rests on prototype implementation rather than any reduction of outputs to inputs by construction. This matches the default expectation for non-circular papers; the reader's score of 1.0 is consistent with the absence of any of the enumerated circularity patterns.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption Legal and organizational requirements can be collected and translated into machine-actionable policies using LLMs and policy-as-code.
Reference graph
Works this paper leans on
-
[1]
Alsayed Kassem J, Allaart C, Amiri S, et al (2024) Building a Digital Health Twin for Personalized Intervention: The EPI Project. In: Haverkort BR, de Jongste A, van Kuilenburg P, et al (eds) Commit2Data, Open Access Series in Informatics (OASIcs), vol 124. Schloss Dagstuhl – Leibniz-Zentrum f¨ ur Informatik, Dagstuhl, Germany, pp 2:1–2:18, https://doi.or...
-
[2]
Altair Engineering (2003) Portable Batch System (PBS). https://www.altair. com/pbs-professional/, accessed: 2025-04-11
work page 2003
-
[3]
arXiv preprint URL https://doi.org/10
Alves S, Igl´ esias J (2021) A graphical framework for the category-based meta- model for access control and obligations. arXiv preprint URL https://doi.org/10. 48550/arXiv.2111.00588
-
[4]
Al-Kharusi Y, Khan A, Rizwan M, et al (2024) Open-Source Artificial Intelligence Privacy and Security: A Review. Computers 13(12):311. https://doi.org/10.3390/ computers13120311
work page 2024
-
[5]
https://airflow.apache.org/, accessed: 2025-04-11
Apache Software Foundation (2015) Apache Airflow. https://airflow.apache.org/, accessed: 2025-04-11
work page 2015
-
[6]
URL https://arxiv.org/abs/2508
Beauchemin D, Albert-Rochette M, Khoury R, et al (2025) Judgebert: Assessing legal meaning preservation between sentences. URL https://arxiv.org/abs/2508. 16870, 2508.16870
-
[7]
Journal of Computer Security 8:309 – 353
Bertino E, Bonatti PA, Ferrari E, et al (2000) Temporal authorization bases: From specification to integration. Journal of Computer Security 8:309 – 353. URL https://api.semanticscholar.org/CorpusID:21118749
work page 2000
-
[8]
International Journal of Science and Research (IJSR) 13:910–913
Bhatkar P (2024) AI in Regulatory Compliance: Revolutionizing Training with Fine - Tuned Language Models for Banking and Payment Systems. International Journal of Science and Research (IJSR) 13:910–913. https://doi.org/10.21275/ SR24812093543
work page 2024
-
[9]
van Binsbergen LT, Liu LC, van Doesburg R, et al (2020) eflint: a domain-specific language for executable norm specifications. In: Proceedings of the 19th ACM 27 SIGPLAN International Conference on Generative Programming: Concepts and Experiences. Association for Computing Machinery, New York, NY, USA, GPCE 2020, p 124–136, https://doi.org/10.1145/3425898.3426958
-
[10]
IEEE Transactions on Software Engineering 34(1):5–20
Breaux T, Ant´ on A (2008) Analyzing regulatory rules for privacy and security requirements. IEEE Transactions on Software Engineering 34(1):5–20. https:// doi.org/10.1109/TSE.2007.70746
-
[11]
International Journal of Medical Informatics 112:59–67
Brisimi TS, Chen R, Mela T, et al (2018) Federated learning of predictive mod- els from federated electronic health records. International Journal of Medical Informatics 112:59–67. https://doi.org/10.1016/j.ijmedinf.2018.01.007
-
[12]
Proceed- ings of the IEEE 106(4):689–712
Calvanese D, et al (2018) Ontology-based data access and integration. Proceed- ings of the IEEE 106(4):689–712. https://doi.org/10.1109/JPROC.2018.2806570
-
[13]
https://doi.org/10.1007/ 978-3-031-78841-3 2, URL https://doi.org/10.1007/978-3-031-78841-3 2
Cremonesi F, Vesin M, Cansiz S, et al (2025) Fed-BioMed: Open, Trans- parent and Trusted Federated Learning for Real-world Healthcare Applica- tions, Springer Nature Switzerland, Cham, pp 19–41. https://doi.org/10.1007/ 978-3-031-78841-3 2, URL https://doi.org/10.1007/978-3-031-78841-3 2
-
[14]
Philosophy Compass 11(10):554–569
d’Almeida LD (2016) Fundamental legal concepts: The Hohfeldian framework. Philosophy Compass 11(10):554–569. https://doi.org/10.1111/phc3.12352
-
[15]
Journal of Neuro- surgery 130(4):1065–1076
Dewan MC, Rattani A, Mekary R, et al (2018) Global hydrocephalus epidemi- ology and incidence: systematic review and meta-analysis. Journal of Neuro- surgery 130(4):1065–1076. https://doi.org/10.3171/2018.1.JNS17281, URL https: //pubmed.ncbi.nlm.nih.gov/29701543/
-
[16]
Nature Biotechnology 35(4):316–319
Di Tommaso P, et al (2017) Nextflow enables reproducible computational work- flows. Nature Biotechnology 35(4):316–319. URL https://pubmed.ncbi.nlm.nih. gov/28398311/
-
[17]
DLA Piper (2025) Data protection laws of the world. https://www. dlapiperdataprotection.com/, accessed: 2026-01-12
work page 2025
-
[18]
Esterhuyse CA, M¨ uller T, van Binsbergen LT (2024) Justact: Actions univer- sally justified by partial dynamic policies. In: Castiglioni V, Francalanza A (eds) Formal Techniques for Distributed Objects, Components, and Systems – 44th IFIP WG 6.1 International Conference, FORTE 2024, Lecture Notes in Computer Science, vol 14678. Springer, pp 60–81, https:...
work page 2024
-
[19]
arXiv preprint arXiv:250200138 URL https://arxiv.org/abs/2502.00138
Esterhuyse CA, M¨ uller T, van Binsbergen LT (2025) Justact+: Justified and accountable actions in policy-regulated, multi-domain data processing. arXiv preprint arXiv:250200138 URL https://arxiv.org/abs/2502.00138
-
[20]
arXiv preprint arXiv:240419744 URL https://arxiv.org/abs/2404.19744
Garza L, Elluri L, Kotal A, et al (2024) PrivComp-KG: Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification. arXiv preprint arXiv:240419744 URL https://arxiv.org/abs/2404.19744
-
[21]
Differentially Private Federated Learning: A Client Level Perspective
Geyer RC, Klein T, Nabi M (2017) Differentially Private Federated Learning: A Client Level Perspective. In: Proceedings of the NIPS Workshop on Machine Learning on the Phone and other Consumer Devices, Long Beach, CA, USA, URL https://arxiv.org/abs/1712.07557
work page internal anchor Pith review Pith/arXiv arXiv 2017
-
[22]
Google Cloud Composer (2018) https://cloud.google.com/composer, accessed: 2025-04-11 28
work page 2018
-
[23]
Gouglidis A, Kagia A, Hu VC (2023) Model Checking Access Control Policies: A Case Study using Google Cloud IAM. arXiv preprint https://doi.org/10.48550/ arXiv.2303.16688, shows formal verification techniques for access control policies via model checking
-
[24]
URL https://arxiv.org/abs/2411
Han Y, Guo Z (2024) Regulator-manufacturer ai agents modeling: Mathemati- cal feedback-driven multi-agent llm framework. URL https://arxiv.org/abs/2411. 15356, 2411.15356
-
[25]
In: Proceedings of the 32nd IEEE International Require- ments Engineering Conference (RE)
Hassani S (2024) Enhancing legal compliance and regulation analysis with large language models. In: Proceedings of the 32nd IEEE International Require- ments Engineering Conference (RE). IEEE, pp 507–511, https://doi.org/10.1109/ re59067.2024.00065, URL https://arxiv.org/abs/2404.17522
-
[26]
URL https://arxiv.org/ abs/2404.14356, 2404.14356
Hassani S, Sabetzadeh M, Amyot D, et al (2024) Rethinking legal compliance automation: Opportunities with large language models. URL https://arxiv.org/ abs/2404.14356, 2404.14356
-
[27]
Hu VC, Ferraiolo D, Kuhn R (2015) Guide to Attribute Based Access Control (ABAC) Definition and Considerations. Tech. Rep. SP 800-162, NIST, URL https: //nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-162.pdf
work page 2015
-
[28]
https://iapp.org/resources/, accessed: 2026-01-12
International Association of Privacy Professionals (2025) IAPP Resources and Tools. https://iapp.org/resources/, accessed: 2026-01-12
work page 2025
-
[29]
International Council for Harmonisation of Technical Requirements for Phar- maceuticals for Human Use (ICH) (2025) ICH Harmonised Guideline: Good Clinical Practice E6(R3). Guideline document, URL https://database.ich.org/ sites/default/files/ICH E6%28R3%29 Step4 FinalGuideline 2025 0106.pdf
work page 2025
-
[30]
Computers & Security 46:154–172
Jha S, Sural S, Vaidya J, et al (2014) Security analysis of temporal RBAC under an administrative model. Computers & Security 46:154–172. URL https://www. sciencedirect.com/science/article/pii/S0167404814001217
work page 2014
-
[31]
Nature Machine Intelligence 2(6):305–311
Kaissis G, Makowski MR, R¨ uckert D, et al (2020) Secure, privacy-preserving and federated machine learning in medical imaging. Nature Machine Intelligence 2(6):305–311. https://doi.org/10.1038/s42256-020-0186-1
-
[32]
URL https://arxiv.org/abs/ 2402.01717, 2402.01717
Kim J, Min M (2024) From RAG to QA-RAG: Integrating Generative AI for Pharmaceutical Regulatory Compliance Process. URL https://arxiv.org/abs/ 2402.01717, 2402.01717
-
[33]
https://github.com/albatros13/policy-reasoner, accessed: 2026-01-12
Kokash N (2024) Policy reasoner: A tool for reasoning about policies (with opa support). https://github.com/albatros13/policy-reasoner, accessed: 2026-01-12
work page 2024
-
[34]
https://github.com/ albatros13/braneHub, accessed 2026-01-19
Kokash N (2026) BraneHub: A proof-of-concept web platform to set up fed- erated data processing projects and create access policies. https://github.com/ albatros13/braneHub, accessed 2026-01-19
work page 2026
-
[35]
arXiv preprint arXiv:2505.20020
Kokash N, Wang L, Gillespie TH, et al (2025) Ontology- and LLM-based data har- monization for federated learning in healthcare. arXiv preprint arXiv:2505.20020. https://doi.org/10.48550/arXiv.2505.20020, arXiv:2505.20020 [cs.LG]
-
[36]
Bioinformatics 28(19):2520–2522
K¨ oster J, Rahmann S (2012) Snakemake—a scalable bioinformatics work- flow engine. Bioinformatics 28(19):2520–2522. URL https://academic.oup.com/ bioinformatics/article/28/19/2520/290322
work page 2012
-
[37]
arXiv preprint 29 arXiv:210709605 URL https://arxiv.org/abs/2107.09605
Kurtz A, Yao Y, Rieke Nea (2021) Federated learning with nvidia clara: Improv- ing breast cancer diagnosis while preserving patient privacy. arXiv preprint 29 arXiv:210709605 URL https://arxiv.org/abs/2107.09605
-
[38]
Lenzerini M (2002) Data Integration: A Theoretical Perspective. In: Proceed- ings of the 21st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), pp 233–246, https://doi.org/10.1145/543613.543644
-
[39]
Li J, Maiti A (2025) Applying Large Language Model Analysis and Backend Web Services in Regulatory Technologies for Continuous Compliance Checks. Future Internet 17(3):100. https://doi.org/10.3390/fi17030100, URL https://doi.org/10. 3390/fi17030100
-
[40]
Cyberpsychology: Journal of Psychosocial Research on Cyberspace 16(4)
Lim S, Shim H (2022) No secrets between the two of us: Privacy concerns over using ai agents. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 16(4). https://doi.org/10.5817/CP2022-4-3
-
[41]
Frontiers of Computer Science 18(1):181336
Liu F, Zheng Z, Shi Y, et al (2024) A Survey on Federated Learning: A Perspec- tive from Multi-Party Computation. Frontiers of Computer Science 18(1):181336. https://doi.org/10.1007/s11704-023-3319-5
-
[42]
L´ opez HA, Debois S, Slaats T, et al (2020) Business process compliance using reference models of law. In: Fundamental Approaches to Software Engineer- ing: 23rd International Conference, FASE 2020, Proceedings, Lecture Notes in Computer Science, vol 12076. Springer, Cham, Cham, Switzerland, p 378–399, https://doi.org/10.1007/978-3-030-45234-6 19
-
[43]
URL https://arxiv.org/abs/2512
Ma Z, Wen C, Su Z, et al (2025) Bridging Natural Language and Formal Specification–Automated Translation of Software Requirements to LTL via Hier- archical Semantics Decomposition Using LLMs. URL https://arxiv.org/abs/2512. 17334, 2512.17334
-
[44]
Matte C, Bielova N, Santos C (2020) Do cookie banners respect my choice? mea- suring legal compliance of banners from IAB Europe’s transparency and consent framework. In: 2020 IEEE Symposium on Security and Privacy (SP), IEEE, pp 791–809, https://doi.org/10.1109/SP40000.2020.00076
-
[45]
https://azure.microsoft.com/ products/logic-apps, accessed: 2025-04-11
Microsoft Azure (2016) Azure Logic Apps. https://azure.microsoft.com/ products/logic-apps, accessed: 2025-04-11
work page 2016
-
[46]
The VLDB Journal 29(5):907–933
Naeem MA, d’Orazio L, Pinet F, et al (2020) Federated query processing in large- scale distributed data management: A survey. The VLDB Journal 29(5):907–933. https://doi.org/10.1007/s00778-020-00616-9
-
[47]
arXiv preprint arXiv:250805192 URL https://arxiv.org/abs/2508.05192, accepted for MODELS’25
Neubauer F, et al (2025) AI-assisted JSON Schema Creation and Mapping. arXiv preprint arXiv:250805192 URL https://arxiv.org/abs/2508.05192, accepted for MODELS’25
-
[48]
https://www.dataguidance.com/, accessed: 2026-01-12
OneTrust DataGuidance (2025) Dataguidance: Global privacy and data protec- tion research platform. https://www.dataguidance.com/, accessed: 2026-01-12
work page 2025
-
[49]
https://play.openpolicyagent.org/, accessed: 2026-01-22
Open Policy Agent (2018) Rego Playground. https://play.openpolicyagent.org/, accessed: 2026-01-22
work page 2018
-
[50]
https://github.com/open-policy-agent/regal, URL https://github.com/ open-policy-agent/regal
Open Policy Agent (2025) Regal: A linter and language server for rego. https://github.com/open-policy-agent/regal, URL https://github.com/ open-policy-agent/regal
work page 2025
-
[51]
OpenAPI Initiative (2025) Arazzo specification v1.0.1. https://www.openapis. org/arazzo-specification, accessed: 2026-01-19 30
work page 2025
-
[52]
Open Policy Agent, URL https: //www.openpolicyagent.org/projects/regal/language-server
Project OPA (2025) Regal Language Server. Open Policy Agent, URL https: //www.openpolicyagent.org/projects/regal/language-server
work page 2025
-
[53]
Journal of the Ameri- can Medical Informatics Association 29(12):2144–2155
Quinn TP, Nguyen D, Huang J, et al (2022) Federated learning in digital health: Systematic review and taxonomy of implementations. Journal of the Ameri- can Medical Informatics Association 29(12):2144–2155. https://doi.org/10.1093/ jamia/ocac166
work page 2022
-
[54]
Ramezani E, Fahland D, van der Aalst WMP (2014) Supporting domain experts to select and configure precise compliance rules. In: Business Process Manage- ment Workshops: BPM 2013 International Workshops, Beijing, China, August 26, 2013, Revised Papers, Lecture Notes in Business Information Processing, vol
work page 2014
-
[55]
Springer, pp 498–512, https://doi.org/10.1007/978-3-319-06257-0 39
-
[56]
Rieke N, Hancox J, Li W, et al (2020) The future of digital health with federated learning. NPJ Digital Medicine 3(1):119. https://doi.org/10.1038/ s41746-020-00323-1
work page 2020
-
[57]
Sandhu RS, Coyne EJ, Feinstein HL, et al (1996) Role-based access control models. IEEE Computer 29(2):38–47. https://doi.org/10.1109/2.485845
-
[58]
In: Daniel F, Facca FM (eds) Cur- rent Trends in Web Engineering
Schumm D, Turetken O, Kokash N, et al (2010) Business process compliance through reusable units of compliant processes. In: Daniel F, Facca FM (eds) Cur- rent Trends in Web Engineering. Springer Berlin Heidelberg, Berlin, Heidelberg, pp 325–337, URL https://doi.org/10.1007/978-3-642-16985-4 29
-
[59]
Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceed- ings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp 1310–1321, https://doi.org/10.1145/2810103.2813687
-
[60]
MIT Computational Law Report, URL https://law.mit.edu/pub/thedawnofaneweraofcompliance/release/1
Sobkowski M, Karapetyan G (2024) The dawn of a new era of compliance: Auto- mated compliance verification and enforcement. MIT Computational Law Report, URL https://law.mit.edu/pub/thedawnofaneweraofcompliance/release/1
work page 2024
-
[61]
https: //github.com/spotify/luigi, accessed: 2025-04-11
Spotify (2015) Luigi: A Python Package for Building Complex Pipelines. https: //github.com/spotify/luigi, accessed: 2025-04-11
work page 2015
-
[62]
In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security (AISec ’19)
Truex S, Baracaldo N, Anwar A, et al (2019) A hybrid approach to privacy- preserving federated learning. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security (AISec ’19). Association for Comput- ing Machinery, New York, NY, USA, pp 1–11, https://doi.org/10.1145/3338501. 3357370
-
[63]
Valkering O, Cushing R, Belloum A (2021) Brane: A framework for programmable orchestration of multi-site applications. In: 2021 IEEE 17th International Confer- ence on eScience (eScience), pp 277–282, https://doi.org/10.1109/eScience51609. 2021.00056
-
[64]
Procedia Computer Science 198:140–147
van Binsbergen LT, Kebede MG, Baugh J, et al (2022) Dynamic gen- eration of access control policies from social policies. Procedia Computer Science 198:140–147. URL https://www.sciencedirect.com/science/article/pii/ S1877050921024601
work page 2022
-
[65]
Medical Principles and Practice 30(1):17–28
Varkey B (2021) Principles of clinical ethics and their application to practice. Medical Principles and Practice 30(1):17–28. https://doi.org/10.1159/000509119
-
[66]
Wouters OJ, McKee M, Luyten J (2020) Estimated research and develop- ment investment needed to bring a new medicine to market, 2009–2018. JAMA 31 323(9):844–853. https://doi.org/10.1001/jama.2020.1166
-
[67]
arXiv https://doi.org/10.48550/arXiv.2509.19218
Xu Y, Ding Y, Sun H, et al (2025) HyKid: An Open MRI Dataset with Expert- Annotated Multi-Structure and Choroid Plexus in Pediatric Hydrocephalus. arXiv https://doi.org/10.48550/arXiv.2509.19218
-
[68]
Job Scheduling Strategies for Parallel Processing pp 44–60
Yoo AB, Jette MA, Grondona M (2003) SLURM: Simple Linux Utility for Resource Management. Job Scheduling Strategies for Parallel Processing pp 44–60. https://doi.org/10.1007/10968987 3
-
[69]
Zasada A, Hashmi M, Fellmann M, et al (2023) Evaluation of Compliance Rule Languages for Modelling Regulatory Compliance Requirements. Software 2(1):71–120. https://doi.org/10.3390/software2010004
-
[70]
IEEE Internet of Things Journal 9(15):13740–13754
Zhuang W, Gan X, Wen Y, et al (2022) EasyFL: A Low-Code Federated Learn- ing Platform for Dummies. IEEE Internet of Things Journal 9(15):13740–13754. https://doi.org/10.1109/JIOT.2022.3143842 32
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.