Login / Signup
Eavesdropping via pilot relay attack.
Jiejiao Tian
Ying-Chang Liang
Xin Kang
Gang Yang
Published in:
ICCC (2017)
Keyphrases
</>
countermeasures
dos attacks
secret key
key exchange protocol
data sets
neural network
social networks
power analysis
attack detection
malicious users