Login / Signup
Node Injection Link Stealing Attack.
Oualid Zari
Javier Parra-Arnau
Ayse Ünsal
Melek Önen
Published in:
CoRR (2023)
Keyphrases
</>
destination node
malicious nodes
garbage collection
tree structure
graph structure
countermeasures
attack detection
data mining
directed graph
dos attacks
encryption algorithm
neighboring nodes
diesel engine
malicious users