<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://murtaza-hatim.com/tags/decentralized-learning/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/evidential-deep-learning/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/publications/murmura/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/model-personalization/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/publications/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/trust-aware-personalization/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/differential-privacy/</loc><lastmod>2025-12-11T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/publications/secure-ml-for-healthcare/</loc><lastmod>2025-12-11T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/healthcare-iot/</loc><lastmod>2025-12-11T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/secure-machine-learning/</loc><lastmod>2025-12-11T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/byzantine-robustness/</loc><lastmod>2025-10-09T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/dimensionality-reduction/</loc><lastmod>2025-10-09T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/scalable-machine-learning/</loc><lastmod>2025-10-09T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/publications/sketchguard/</loc><lastmod>2025-10-09T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/publications/blockchain-enabled-federated-learning/</loc><lastmod>2025-08-08T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/blockchains/</loc><lastmod>2025-08-08T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/consensus-mechanisms/</loc><lastmod>2025-08-08T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/distributed-systems/</loc><lastmod>2025-08-08T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/federated-learning/</loc><lastmod>2025-08-08T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/communication-patterns/</loc><lastmod>2025-06-25T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/data-distribution-inference/</loc><lastmod>2025-06-25T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/publications/network-structures-as-an-attack-surface/</loc><lastmod>2025-06-25T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/network-topology/</loc><lastmod>2025-06-25T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/privacy-attacks/</loc><lastmod>2025-06-25T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/decentralized-applications/</loc><lastmod>2025-04-30T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/edge-computing/</loc><lastmod>2025-04-30T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/internet-of-things/</loc><lastmod>2025-04-30T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/tags/trusted-computing/</loc><lastmod>2025-04-30T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/publications/trustmesh/</loc><lastmod>2025-04-30T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/location/</loc><lastmod>2024-05-08T00:00:00+00:00</lastmod></url><url><loc>https://murtaza-hatim.com/archive/</loc></url></urlset>