Guaranteeing Information Transfer Integrity Through Two Non-Colluding Malicious Nodes Against i.i.d. Attacks.
Xiaofeng ZhengRuohan CaoHui GaoYueming LuPublished in: IEEE Trans. Veh. Technol. (2020)
Keyphrases
- malicious nodes
- information transfer
- wireless sensor networks
- malicious behavior
- network nodes
- information processing
- information flow
- end users
- spectrum sensing
- sensor networks
- human learning
- brain computer interface
- artificial intelligence
- mobile computing
- distributed databases
- supply chain
- decision making
- ad hoc networks
- sensor nodes
- social network analysis
- mobile ad hoc networks
- learning strategies
- information systems
- social networks
- machine learning