Login / Signup

Efficient Adversarial Chaff Generation for Challenge-Response Authentication Over Unsecure Networks with an Application to Civilian Radio Networks.

Brendan KittsAndrew Potter
Published in: ISI (2019)
Keyphrases
  • social networks
  • real time
  • network structure
  • complex networks
  • network analysis
  • network design
  • data mining
  • case study
  • multi agent
  • wireless communication
  • heterogeneous networks