Sign in

Guaranteeing Information Transfer Integrity Through Two Non-Colluding Malicious Nodes Against i.i.d. Attacks.

Xiaofeng ZhengRuohan CaoHui GaoYueming Lu
Published in: IEEE Trans. Veh. Technol. (2020)
Keyphrases