Login / Signup
More Tolerant Reconstructed Networks by Self-Healing against Attacks in Saving Resource.
Yukio Hayashi
Atsushi Tanaka
Jun Matsukubo
Published in:
CoRR (2021)
Keyphrases
</>
watermarking scheme
computing systems
resource constraints
countermeasures
privacy preserving
resource allocation
information resources
watermarking algorithm
network resources
malicious users