Login / Signup
Fooling Edge Computation Offloading via Stealthy Interference Attack.
Letian Zhang
Jie Xu
Published in:
SEC (2020)
Keyphrases
</>
edge detection
database
genetic algorithm
data mining
information systems
color images
weighted graph
multipath
dos attacks
disjoint paths