Login / Signup

Eavesdropping via pilot relay attack.

Jiejiao TianYing-Chang LiangXin KangGang Yang
Published in: ICCC (2017)
Keyphrases
  • countermeasures
  • dos attacks
  • secret key
  • key exchange protocol
  • data sets
  • neural network
  • social networks
  • power analysis
  • attack detection
  • malicious users