Login / Signup
Detecting and Tracing i.i.d. Attacks in Networks With Any Number of Relays.
Ruohan Cao
Shanguo Huang
Yueming Lu
Published in:
IEEE Access (2016)
Keyphrases
</>
small number
cooperative
maximum number
data sets
social networks
network analysis
data corruption