Login / Signup
VCG under Sybil (False-Name) Attacks - A Bayesian Analysis.
Yotam Gafni
Ron Lavi
Moshe Tennenholtz
Published in:
AAAI (2020)
Keyphrases
</>
bayesian analysis
malicious users
computationally feasible
multiagent systems
malicious attacks
statistically sound
watermarking scheme
countermeasures
personalized ranking
mechanism design
security threats
security mechanisms
malicious nodes
security protocols
auction mechanisms
detection mechanism