Login / Signup

Secure Combination of Untrusted Time information Based on Optimized Dempster-Shafer Theory.

Yang LiYujie LuoYichen ZhangAo SunWei HuangShuai ZhangTao ZhangChuang ZhouLi MaJie YangMei WuHeng WangYan PanYun ShaoXing ChenZiyang ChenSong YuHong GuoBingjie Xu
Published in: CoRR (2024)
Keyphrases
  • dempster shafer theory
  • combination rule
  • security level