Academic literature on the topic 'Byzantine attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Byzantine attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Byzantine attack"

1

Yang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (2019): 3436. http://dx.doi.org/10.3390/s19153436.

Full text
Abstract:
Herein, the problem of target tracking in wireless sensor networks (WSNs) is investigated in the presence of Byzantine attacks. More specifically, we analyze the impact of Byzantine attacks on the performance of a tracking system. First, under the condition of jointly estimating the target state and the attack parameters, the posterior Cramer–Rao lower bound (PCRLB) is calculated. Then, from the perspective of attackers, we define the optimal Byzantine attack and theoretically find a way to achieve such an attack with minimal cost. When the attacked nodes are correctly identified by the fusion
APA, Harvard, Vancouver, ISO, and other styles
2

Pashkin, Nikolai G. "Aims of the Byzantine Attack on Gallipoli in 1410." Античная древность и средние века 48 (2020): 156–71. http://dx.doi.org/10.15826/adsv.2020.48.010.

Full text
Abstract:
This research suggests an interpretation of the reasons behind the Byzantine attack on the Turkish fort of Gallipoli in spring 1410. The citadel that controlled Dardanelles was attacked by a squadron of eight ships. This operation is considered not successful. However, there are reasons to consider that initially Greeks did not plan to take the town. The search for the proofs should be in the sphere of international relations. In the period in question, the Byzantine policy was influenced by contradictions between Venice and Hungarian king Sigismund of Luxembourg concerning Dalmatia. Their int
APA, Harvard, Vancouver, ISO, and other styles
3

Nasir, Muhammad, and Ananda Maiti. "Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things." Machines 12, no. 3 (2024): 205. http://dx.doi.org/10.3390/machines12030205.

Full text
Abstract:
In this paper, an adaptive and resilient consensus control mechanism for multi-robot systems under Byzantine attack, based on sliding mode control, is proposed. The primary aim of the article is to develop a finite-time consensus control strategy even in the presence of a Byzantine attack. In the start, a finite-time consensus control mechanism is proposed to identify the essential conditions required for ensuring consensus accuracy in multi-robot systems, even when faced with Byzantine attacks using Lyapunov theory. Subsequently, a sliding mode control is combined with an adaptive technique f
APA, Harvard, Vancouver, ISO, and other styles
4

Liu, Yuchen, Chen Chen, Lingjuan Lyu, Yaochu Jin, and Gang Chen. "Exploit Gradient Skewness to Circumvent Byzantine Defenses for Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 18 (2025): 19024–32. https://doi.org/10.1609/aaai.v39i18.34094.

Full text
Abstract:
Federated Learning (FL) is notorious for its vulnerability to Byzantine attacks. Most current Byzantine defenses share a common inductive bias: among all the gradients, the densely distributed ones are more likely to be honest. However, such a bias is a poison to Byzantine robustness due to a newly discovered phenomenon in this paper -- gradient skew. We discover that a group of densely distributed honest gradients skew away from the optimal gradient (the average of honest gradients) due to heterogeneous data. This gradient skew phenomenon allows Byzantine gradients to hide within the densely
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long, and Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median." Electronics 12, no. 5 (2023): 1190. http://dx.doi.org/10.3390/electronics12051190.

Full text
Abstract:
Federated learning techniques accomplish federated modeling and share global models without sharing data. Federated learning offers a good answer to complex data and privacy security issues. Although there are many ways to target federated learning, Byzantine attacks are the ones we concentrate on. Byzantine attacks primarily impede learning by tampering with the local model parameters provided by a client to the master node throughout the federation learning process, leading to a final global model that diverges from the optimal solution. To address this problem, we combine aggregation rules
APA, Harvard, Vancouver, ISO, and other styles
6

Amir, Y., B. Coan, J. Kirsch, and J. Lane. "Prime: Byzantine Replication under Attack." IEEE Transactions on Dependable and Secure Computing 8, no. 4 (2011): 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Medhi, Jishu K., Rui Liu, Qianlong Wang, and Xuhui Chen. "Robust Multiagent Reinforcement Learning for UAV Systems: Countering Byzantine Attacks." Information 14, no. 11 (2023): 623. http://dx.doi.org/10.3390/info14110623.

Full text
Abstract:
Multiple unmanned aerial vehicle (multi-UAV) systems have gained significant attention in applications, such as aerial surveillance and search and rescue missions. With the recent development of state-of-the-art multiagent reinforcement learning (MARL) algorithms, it is possible to train multi-UAV systems in collaborative and competitive environments. However, the inherent vulnerabilities of multiagent systems pose significant privacy and security risks when deploying general and conventional MARL algorithms. The presence of even a single Byzantine adversary within the system can severely degr
APA, Harvard, Vancouver, ISO, and other styles
8

Wan, Fangyi, Ting Ma, Yi Hua, Bin Liao, and Xinlin Qing. "Secure distributed estimation under Byzantine attack and manipulation attack." Engineering Applications of Artificial Intelligence 116 (November 2022): 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–41. https://doi.org/10.1145/3700422.

Full text
Abstract:
Byzantine-robust Federated Learning (FL) aims to counter malicious clients and train an accurate global model while maintaining an extremely low attack success rate. Most existing systems, however, are only robust when most of the clients are honest. FLTrust (NDSS '21) and Zeno++ (ICML '20) do not make such an honest majority assumption but can only be applied to scenarios where the server is provided with an auxiliary dataset used to filter malicious updates. FLAME (USENIX '22) and EIFFeL (CCS '22) maintain the semi-honest majority assumption to guarantee robustness and the confidentiality of
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." ACM SIGMETRICS Performance Evaluation Review 53, no. 1 (2025): 25–27. https://doi.org/10.1145/3744970.3727296.

Full text
Abstract:
Byzantine-robust Federated Learning (FL) aims to counter malicious clients and train an accurate global model while maintaining an extremely low attack success rate. Most existing systems, however, are only robust when most of the clients are honest. FLTrust (NDSS '21) and Zeno++ (ICML '20) do not make such an honest majority assumption but can only be applied to scenarios where the server is provided with an auxiliary dataset used to filter malicious updates. FLAME (USENIX '22) and EIFFeL (CCS '22) maintain the semi-honest majority assumption to guarantee robustness and the confidentiality of
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Byzantine attack"

1

Sironen, Erkki. "The late Roman and early Byzantine inscriptions of Athens and Attica : an edition with appendices on scripts, sepulchral formulae and occupations /." Helsinki : Hakapaino Oy, 1997. http://bibpurl.oclc.org/web/25751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.

Full text
Abstract:
The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these recent progresses have also introduced new security vulnerabilities. Since the wireless shared medium is completely exposed to outsiders, it is susceptible to attacks that could target any of the OSI layers in the network stack. For example, jamming of the physical layer, disruption of the medium access control (MAC) layer coordination packets, attacks against the routing infrastructure, targeted attacks o
APA, Harvard, Vancouver, ISO, and other styles
3

Tzavella, Elissavet. "Urban and rural landscape in early and middle Byzantine Attica (4th-12th c. AD)." Thesis, University of Birmingham, 2013. http://etheses.bham.ac.uk//id/eprint/4321/.

Full text
Abstract:
The present study synthesiszes archaeological and historical evidence concerning Attica (Greece), the hinterland of Athens, in the Early and Middle Byzantine periods (4th-12th c.). Although the Byzantine monuments of Attica have been thoroughly studied, no coherent picture of how these relate to broader patterns of occupation and land usage has thus far been presented. In the main, the period under discussion is generally interpreted in three ways: Regarding Late Antiquity, research has often focused on the transition from paganism to Christianity, and to the characterisation of Attica as a ‘s
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Qianlong. "Blockchain-Empowered Secure Machine Learning and Applications." Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1625183576139299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Han, Kai. "Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy Systems." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/26917.

Full text
Abstract:
In this dissertation, we consider scheduling distributed soft real-time tasks in unreliable (e.g., those with arbitrary node and network failures) and untrustworthy systems (e.g., those with Byzantine node behaviors). We present a distributed real-time scheduling algorithm called Gamma. Gamma considers a distributed (i.e., multi-node) task model where tasks are subject to Time/Utility Function (or TUF) end-to-end time constraints, and the scheduling optimality criterion of maximizing the total accrued utility. The algorithm makes three novel contributions. First, Gamma uses gossip for reliably
APA, Harvard, Vancouver, ISO, and other styles
6

KALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.

Full text
Abstract:
Every day we share our personal information through digital systems which are constantly exposed to threats. For this reason, security-oriented disciplines of signal processing have received increasing attention in the last decades: multimedia forensics, digital watermarking, biometrics, network monitoring, steganography and steganalysis are just a few examples. Even though each of these fields has its own peculiarities, they all have to deal with a common problem: the presence of one or more adversaries aiming at making the system fail. Adversarial Signal Processing lays the basis of a genera
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Ho-Chun, and 陳和均. "The Study of Byzantine Attack in Large Scale Wireless Sensor Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/n2y87u.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電信工程學研究所<br>106<br>In this thesis, we study the problem of Byzantine attacks in large scale wireless sensor networks (WSNs). WSN is a critical technology in the future Internet of Things era, supporting various applications such as smart home, environmental monitoring, Internet of vehicles, etc. A WSN generally consists of some sensors and a fusion center (FC). Each sensor makes an observation about a phenomenon of interest, and transmits local message to the FC, who then makes a final decision based on those messages. Due to the exposed nature of the sensors and the characteri
APA, Harvard, Vancouver, ISO, and other styles
8

Cheng, Sheng-Hong, and 鄭勝鴻. "Defense and Detection of Sybil Attack Using Byzantine Agreement Algorithm in Mobile Ad Hoc Network." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/24pgmr.

Full text
Abstract:
碩士<br>淡江大學<br>資訊工程學系碩士班<br>106<br>The topology of mobile ad hoc networks (MANET) is dynamic, can be quickly configured, and lacks features such as wireless APs and adapters. Due to these benefits, a MANET system is able to be applied to specific situations, such as search and rescue operations, military use or emergency operations. Based on the routing protocol, node connections provide information to each other and can jointly establish a complete transmission path independently. But security is a major issue in MANET systems. Because MANET system are open and perform on a non-centralized inf
APA, Harvard, Vancouver, ISO, and other styles
9

(9154928), Aritra Mitra. "New Approaches to Distributed State Estimation, Inference and Learning with Extensions to Byzantine-Resilience." Thesis, 2020.

Find full text
Abstract:
<div>In this thesis, we focus on the problem of estimating an unknown quantity of interest, when the information required to do so is dispersed over a network of agents. In particular, each agent in the network receives sequential observations generated by the unknown quantity, and the collective goal of the network is to eventually learn this quantity by means of appropriately crafted information diffusion rules. The abstraction described above can be used to model a variety of problems ranging from environmental monitoring of a dynamical process using autonomous robot teams, to statistical
APA, Harvard, Vancouver, ISO, and other styles
10

Mapunya, Sekgoari Semaka. "The design and the implementation of the byzantine attack mitigation scheme in cognitive radio ad hoc networks." Thesis, 2019. http://hdl.handle.net/10386/3137.

Full text
Abstract:
Thesis ( M.Sc. (Computer Science)) -- University of Limpopo, 2019<br>Cognitive radio network, which enables dynamic spectrum access, addresses the shortage of radio spectrum caused by ever-increasing wireless technology. This allows efficient utilisation of underutilised licenced spectrum by allowing cognitive radios to opportunistically make use of available licenced spectrum. Cognitive radios (CR), also known as secondary users, must constantly sense the spectrum band to avoid interfering with the transmission of the licenced users, known as primary users. Cognitive radios must cooperate in
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Byzantine attack"

1

Yarbro, Chelsea Quinn. A flame in Byzantium. Tor, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yarbro, Chelsea Quinn. A Flame in Byzantium. Tom Doherty Assoc Llc, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Los dorismos del Corpus Bucolicorum. A.M. Hakkert, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Byzantine attack"

1

Pooja, A. Saraswathi, Rampa Theresa, Satya Govind, and Anuja Aloy Mary. "Detection of Byzantine Attack in Cognitive Radio Network." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5029-4_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

He, Xiaofan, and Huaiyu Dai. "Case Study II: HMM-Based Byzantine Attack Detection." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

He, Xiaofan, and Huaiyu Dai. "Case Study III: CFC-Based Byzantine Attack Detection." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Linyuan, Guoru Ding, and Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Linyuan, Guoru Ding, and Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion." In Encyclopedia of Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_301-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hu, Chenyu, Yuhan Liu, Mingyue Zhang, and Zheng Yang. "Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning." In Communications in Computer and Information Science. Springer Nature Singapore, 2024. https://doi.org/10.1007/978-981-96-0151-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bing, Yuchen, Long Wang, and Zesheng Chen. "A Spectrum Sensing Method for UAV Swarms Under Byzantine Attack." In Proceedings of 2021 International Conference on Autonomous Unmanned Systems (ICAUS 2021). Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9492-9_172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guo, Lan, Weifeng Chen, Yang Cong, and Xuechun Yan. "A Robust MOR-Based Secure Fusion Strategy Against Byzantine Attack in Cooperative Spectrum Sensing." In Communications in Computer and Information Science. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3581-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hancock, James F. "Spice trade in the dark ages of Europe." In Spices, scents and silk: catalysts of world trade. CABI, 2021. http://dx.doi.org/10.1079/9781789249743.0012.

Full text
Abstract:
Abstract This chapter narrates the state of world trade during the fall of the Western Roman Empire under waves of Germanic tribe movements during the 'Völkerwanderung' or Migration Period. It contains nine subchapters that are about the collapse of the Western Roman Empire, spice use in Europe during the dark ages, the level of western trade in the early medieval age, Mediterranean trade in the early medieval period, early medieval trade in Europe, the Radhanites: medieval tycoons, the rise of the Gotlanders, Rus' trade with the Muslims and Byzantines through Khazaria, and lastly, Rus' attack
APA, Harvard, Vancouver, ISO, and other styles
10

Fiat, Amos, Jared Saia, and Maxwell Young. "Making Chord Robust to Byzantine Attacks." In Algorithms – ESA 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11561071_71.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Byzantine attack"

1

Alyahya, Aren, David Tipper, and Amy Babay. "Availability Analysis of Network-Attack-Resilient Byzantine Fault Tolerant Systems." In 2024 43rd International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2024. https://doi.org/10.1109/srds64841.2024.00014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shen, Gang, Zhiqiang Fu, and Shaohua Liu. "EFLSS: An Efficient Federated Learning Security Scheme in Byzantine Attack Scenarios." In 2024 IEEE Smart World Congress (SWC). IEEE, 2024. https://doi.org/10.1109/swc62898.2024.00148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dewi, Ayu Oktaviani, Dyonisius Dony Ariananda, and Sigit Basuki Wibowo. "Byzantine Attack Identification using Graph Signal Processing in Cooperative Spectrum Sensing." In 2024 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT). IEEE, 2024. https://doi.org/10.1109/comnetsat63286.2024.10862364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alyahya, Aren. "PhD Forum: Challenges of Availability and Cost Assessments for Network-Attack-Resilient Byzantine Systems." In 2024 43rd International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2024. https://doi.org/10.1109/srds64841.2024.00040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

D, Gopinath, N. Karthikeyan, Yashoda M B, and K. K. Savitha. "Machine Learning Based Secured Reliable Routing Protocol to Predict and Prevent Byzantine Attack in MANET." In 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2024. http://dx.doi.org/10.1109/icesc60852.2024.10690060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jahan Mouri, Israt, Muhammad Ridowant, and Muhammad Abdullah Adnan. "XGDFed: Exposing Vulnerability in Byzantine Robust Federated Binary Classifiers with Novel Aggregation-Agnostic Model Poisoning Attack." In 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2024. http://dx.doi.org/10.1109/compsac61105.2024.00138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Yunlong, Jun Wu, Zhaoyang Qiu, et al. "Cross-Validation-Based SVM for Cooperative Spectrum Sensing Against Probabilistic Byzantine Attack in Cognitive Wireless Sensor Networks." In 2025 10th International Conference on Computer and Communication System (ICCCS). IEEE, 2025. https://doi.org/10.1109/icccs65393.2025.11069740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lou, YiFan, Jun Wu, Yunlong Li, Jiabao Yu, Zhiguang Yang, and Ye Jin. "Parameter Selection of Support Vector Machines for Cooperative Spectrum Sensing Against Probabilistic Byzantine Attack in Cognitive Wireless Sensor Networks." In 2025 10th International Conference on Computer and Communication System (ICCCS). IEEE, 2025. https://doi.org/10.1109/icccs65393.2025.11069750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yuan, Liwei, Hideaki Ishii, and Yaonan Wang. "Robust Average Consensus under Byzantine Attacks." In 2024 IEEE 63rd Conference on Decision and Control (CDC). IEEE, 2024. https://doi.org/10.1109/cdc56724.2024.10886555.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pavloff, Ulysse, Yackolley Amoussou-Guenou, and Sara Tucci-Piergiovanni. "Byzantine Attacks Exploiting Penalties in Ethereum PoS." In 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2024. http://dx.doi.org/10.1109/dsn58291.2024.00020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!