Login / Signup
Exploring Targeted and Stealthy False Data Injection Attacks via Adversarial Machine Learning.
Jiwei Tian
Buhong Wang
Jing Li
Zhen Wang
Bowen Ma
Mete Ozay
Published in:
IEEE Internet Things J. (2022)
Keyphrases
</>
machine learning
data collection
database
knowledge discovery
data mining
data mining techniques
web data
rfid tags