Login / Signup
Secure distributed estimation against false data injection attack.
Yi Hua
Feng Chen
Shuwei Deng
Shukai Duan
Lidan Wang
Published in:
Inf. Sci. (2020)
Keyphrases
</>
data sets
image data
data collection
distributed data
database
data sources
end users
data mining techniques
input data
data mining
data structure
data analysis
heterogeneous data
data transfer