Sign in

Localization of Data Injection Attacks on Distributed M-Estimation.

Or Ohev ShalomAmir LeshemAnna Scaglione
Published in: DSW (2019)
Keyphrases
  • data collection
  • database
  • end users
  • injection attacks
  • knowledge discovery
  • website
  • data sources
  • data mining techniques
  • privacy preserving
  • original data