Academic literature on the topic 'Byzantine attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Byzantine attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Byzantine attack"
Yang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (2019): 3436. http://dx.doi.org/10.3390/s19153436.
Full textPashkin, Nikolai G. "Aims of the Byzantine Attack on Gallipoli in 1410." Античная древность и средние века 48 (2020): 156–71. http://dx.doi.org/10.15826/adsv.2020.48.010.
Full textNasir, Muhammad, and Ananda Maiti. "Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things." Machines 12, no. 3 (2024): 205. http://dx.doi.org/10.3390/machines12030205.
Full textLiu, Yuchen, Chen Chen, Lingjuan Lyu, Yaochu Jin, and Gang Chen. "Exploit Gradient Skewness to Circumvent Byzantine Defenses for Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 18 (2025): 19024–32. https://doi.org/10.1609/aaai.v39i18.34094.
Full textWang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long, and Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median." Electronics 12, no. 5 (2023): 1190. http://dx.doi.org/10.3390/electronics12051190.
Full textAmir, Y., B. Coan, J. Kirsch, and J. Lane. "Prime: Byzantine Replication under Attack." IEEE Transactions on Dependable and Secure Computing 8, no. 4 (2011): 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.
Full textMedhi, Jishu K., Rui Liu, Qianlong Wang, and Xuhui Chen. "Robust Multiagent Reinforcement Learning for UAV Systems: Countering Byzantine Attacks." Information 14, no. 11 (2023): 623. http://dx.doi.org/10.3390/info14110623.
Full textWan, Fangyi, Ting Ma, Yi Hua, Bin Liao, and Xinlin Qing. "Secure distributed estimation under Byzantine attack and manipulation attack." Engineering Applications of Artificial Intelligence 116 (November 2022): 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.
Full textWang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–41. https://doi.org/10.1145/3700422.
Full textWang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." ACM SIGMETRICS Performance Evaluation Review 53, no. 1 (2025): 25–27. https://doi.org/10.1145/3744970.3727296.
Full textDissertations / Theses on the topic "Byzantine attack"
Sironen, Erkki. "The late Roman and early Byzantine inscriptions of Athens and Attica : an edition with appendices on scripts, sepulchral formulae and occupations /." Helsinki : Hakapaino Oy, 1997. http://bibpurl.oclc.org/web/25751.
Full textAlam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.
Full textTzavella, Elissavet. "Urban and rural landscape in early and middle Byzantine Attica (4th-12th c. AD)." Thesis, University of Birmingham, 2013. http://etheses.bham.ac.uk//id/eprint/4321/.
Full textWang, Qianlong. "Blockchain-Empowered Secure Machine Learning and Applications." Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1625183576139299.
Full textHan, Kai. "Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy Systems." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/26917.
Full textKALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.
Full textChen, Ho-Chun, and 陳和均. "The Study of Byzantine Attack in Large Scale Wireless Sensor Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/n2y87u.
Full textCheng, Sheng-Hong, and 鄭勝鴻. "Defense and Detection of Sybil Attack Using Byzantine Agreement Algorithm in Mobile Ad Hoc Network." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/24pgmr.
Full text(9154928), Aritra Mitra. "New Approaches to Distributed State Estimation, Inference and Learning with Extensions to Byzantine-Resilience." Thesis, 2020.
Find full textMapunya, Sekgoari Semaka. "The design and the implementation of the byzantine attack mitigation scheme in cognitive radio ad hoc networks." Thesis, 2019. http://hdl.handle.net/10386/3137.
Full textBooks on the topic "Byzantine attack"
Book chapters on the topic "Byzantine attack"
Pooja, A. Saraswathi, Rampa Theresa, Satya Govind, and Anuja Aloy Mary. "Detection of Byzantine Attack in Cognitive Radio Network." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5029-4_37.
Full textHe, Xiaofan, and Huaiyu Dai. "Case Study II: HMM-Based Byzantine Attack Detection." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_5.
Full textHe, Xiaofan, and Huaiyu Dai. "Case Study III: CFC-Based Byzantine Attack Detection." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_6.
Full textZhang, Linyuan, Guoru Ding, and Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_301.
Full textZhang, Linyuan, Guoru Ding, and Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion." In Encyclopedia of Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_301-1.
Full textHu, Chenyu, Yuhan Liu, Mingyue Zhang, and Zheng Yang. "Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning." In Communications in Computer and Information Science. Springer Nature Singapore, 2024. https://doi.org/10.1007/978-981-96-0151-6_7.
Full textBing, Yuchen, Long Wang, and Zesheng Chen. "A Spectrum Sensing Method for UAV Swarms Under Byzantine Attack." In Proceedings of 2021 International Conference on Autonomous Unmanned Systems (ICAUS 2021). Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9492-9_172.
Full textGuo, Lan, Weifeng Chen, Yang Cong, and Xuechun Yan. "A Robust MOR-Based Secure Fusion Strategy Against Byzantine Attack in Cooperative Spectrum Sensing." In Communications in Computer and Information Science. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3581-9_6.
Full textHancock, James F. "Spice trade in the dark ages of Europe." In Spices, scents and silk: catalysts of world trade. CABI, 2021. http://dx.doi.org/10.1079/9781789249743.0012.
Full textFiat, Amos, Jared Saia, and Maxwell Young. "Making Chord Robust to Byzantine Attacks." In Algorithms – ESA 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11561071_71.
Full textConference papers on the topic "Byzantine attack"
Alyahya, Aren, David Tipper, and Amy Babay. "Availability Analysis of Network-Attack-Resilient Byzantine Fault Tolerant Systems." In 2024 43rd International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2024. https://doi.org/10.1109/srds64841.2024.00014.
Full textShen, Gang, Zhiqiang Fu, and Shaohua Liu. "EFLSS: An Efficient Federated Learning Security Scheme in Byzantine Attack Scenarios." In 2024 IEEE Smart World Congress (SWC). IEEE, 2024. https://doi.org/10.1109/swc62898.2024.00148.
Full textDewi, Ayu Oktaviani, Dyonisius Dony Ariananda, and Sigit Basuki Wibowo. "Byzantine Attack Identification using Graph Signal Processing in Cooperative Spectrum Sensing." In 2024 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT). IEEE, 2024. https://doi.org/10.1109/comnetsat63286.2024.10862364.
Full textAlyahya, Aren. "PhD Forum: Challenges of Availability and Cost Assessments for Network-Attack-Resilient Byzantine Systems." In 2024 43rd International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2024. https://doi.org/10.1109/srds64841.2024.00040.
Full textD, Gopinath, N. Karthikeyan, Yashoda M B, and K. K. Savitha. "Machine Learning Based Secured Reliable Routing Protocol to Predict and Prevent Byzantine Attack in MANET." In 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2024. http://dx.doi.org/10.1109/icesc60852.2024.10690060.
Full textJahan Mouri, Israt, Muhammad Ridowant, and Muhammad Abdullah Adnan. "XGDFed: Exposing Vulnerability in Byzantine Robust Federated Binary Classifiers with Novel Aggregation-Agnostic Model Poisoning Attack." In 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2024. http://dx.doi.org/10.1109/compsac61105.2024.00138.
Full textLi, Yunlong, Jun Wu, Zhaoyang Qiu, et al. "Cross-Validation-Based SVM for Cooperative Spectrum Sensing Against Probabilistic Byzantine Attack in Cognitive Wireless Sensor Networks." In 2025 10th International Conference on Computer and Communication System (ICCCS). IEEE, 2025. https://doi.org/10.1109/icccs65393.2025.11069740.
Full textLou, YiFan, Jun Wu, Yunlong Li, Jiabao Yu, Zhiguang Yang, and Ye Jin. "Parameter Selection of Support Vector Machines for Cooperative Spectrum Sensing Against Probabilistic Byzantine Attack in Cognitive Wireless Sensor Networks." In 2025 10th International Conference on Computer and Communication System (ICCCS). IEEE, 2025. https://doi.org/10.1109/icccs65393.2025.11069750.
Full textYuan, Liwei, Hideaki Ishii, and Yaonan Wang. "Robust Average Consensus under Byzantine Attacks." In 2024 IEEE 63rd Conference on Decision and Control (CDC). IEEE, 2024. https://doi.org/10.1109/cdc56724.2024.10886555.
Full textPavloff, Ulysse, Yackolley Amoussou-Guenou, and Sara Tucci-Piergiovanni. "Byzantine Attacks Exploiting Penalties in Ethereum PoS." In 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2024. http://dx.doi.org/10.1109/dsn58291.2024.00020.
Full text