Login / Signup
Maximizing Malicious Influence in Node Injection Attack.
Xiao Zhang
Peng Bao
Shirui Pan
Published in:
WSDM (2024)
Keyphrases
</>
malicious nodes
malicious users
malicious attacks
wireless sensor networks
detecting malicious
normal traffic
malicious behavior
directed graph
detect malicious
malicious activities
network nodes
sensor networks
neural network
spectrum sensing
malicious code
factors influencing
graph structure
privacy preserving