Login / Signup

On the Effect of Malicious User on D2D Cluster: CSI Forgery and Countermeasures.

Inkyu BangVenissa Adzo Sedem ManyaJonghyun KimTaehoon Kim
Published in: IEEE Access (2023)
Keyphrases
  • countermeasures
  • information security
  • user interface
  • clustering algorithm
  • power analysis
  • digital images
  • malicious users
  • databases
  • data analysis
  • information technology
  • end users
  • pose estimation