Login / Signup
Method for countering strategic attacks in zero-boundary trusted networks.
Wei Liu
Published in:
J. Comput. Methods Sci. Eng. (2024)
Keyphrases
</>
detection method
computational cost
cost function
experimental evaluation
high accuracy
synthetic data
high precision
decision making
significant improvement
support vector machine
support vector machine svm
classification method
data sets
genetic algorithm
preprocessing
segmentation algorithm