Login / Signup
On the Effect of Malicious User on D2D Cluster: CSI Forgery and Countermeasures.
Inkyu Bang
Venissa Adzo Sedem Manya
Jonghyun Kim
Taehoon Kim
Published in:
IEEE Access (2023)
Keyphrases
</>
countermeasures
information security
user interface
clustering algorithm
power analysis
digital images
malicious users
databases
data analysis
information technology
end users
pose estimation