Login / Signup
Defending Data Poisoning Attack via Trusted Platform Module and Blockchain Oracle.
Mingyuan Huang
Sheng Cao
Xiong Li
Ke Huang
Xiaosong Zhang
Published in:
ICC (2022)
Keyphrases
</>
database
data processing
data analysis
data mining techniques
databases
data sources
computer systems
intrusion detection