Login / Signup

Resilient Participant Selection Under Vulnerability Induced Colluding Attacks for Crowdsourcing.

Guanghui WangYifan XuJianping HeJianping PanFang ZuoXin He
Published in: IEEE Trans. Veh. Technol. (2022)
Keyphrases
  • security risks
  • security vulnerabilities
  • traffic analysis
  • malicious attacks
  • buffer overflow
  • countermeasures
  • security threats
  • data sets
  • watermarking scheme
  • selection criteria