Journal articles on the topic 'Byzantine attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Byzantine attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (2019): 3436. http://dx.doi.org/10.3390/s19153436.
Full textPashkin, Nikolai G. "Aims of the Byzantine Attack on Gallipoli in 1410." Античная древность и средние века 48 (2020): 156–71. http://dx.doi.org/10.15826/adsv.2020.48.010.
Full textNasir, Muhammad, and Ananda Maiti. "Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things." Machines 12, no. 3 (2024): 205. http://dx.doi.org/10.3390/machines12030205.
Full textLiu, Yuchen, Chen Chen, Lingjuan Lyu, Yaochu Jin, and Gang Chen. "Exploit Gradient Skewness to Circumvent Byzantine Defenses for Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 18 (2025): 19024–32. https://doi.org/10.1609/aaai.v39i18.34094.
Full textWang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long, and Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median." Electronics 12, no. 5 (2023): 1190. http://dx.doi.org/10.3390/electronics12051190.
Full textAmir, Y., B. Coan, J. Kirsch, and J. Lane. "Prime: Byzantine Replication under Attack." IEEE Transactions on Dependable and Secure Computing 8, no. 4 (2011): 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.
Full textMedhi, Jishu K., Rui Liu, Qianlong Wang, and Xuhui Chen. "Robust Multiagent Reinforcement Learning for UAV Systems: Countering Byzantine Attacks." Information 14, no. 11 (2023): 623. http://dx.doi.org/10.3390/info14110623.
Full textWan, Fangyi, Ting Ma, Yi Hua, Bin Liao, and Xinlin Qing. "Secure distributed estimation under Byzantine attack and manipulation attack." Engineering Applications of Artificial Intelligence 116 (November 2022): 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.
Full textWang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–41. https://doi.org/10.1145/3700422.
Full textWang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." ACM SIGMETRICS Performance Evaluation Review 53, no. 1 (2025): 25–27. https://doi.org/10.1145/3744970.3727296.
Full textSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Full textMuhamet Qerimi. "Durres During The First Norman Attack 1081-1085." Journal of Namibian Studies : History Politics Culture 36 (October 3, 2023): 721–35. http://dx.doi.org/10.59670/jns.v36i.4997.
Full textAvzhi, Zhasim. "Relatıons wıth Byzantıne Empıre Durıng The Prophet’s Tıme (Pbuh)." Iasaýı ýnıversıtetіnіń habarshysy 127, no. 1 (2023): 494–506. http://dx.doi.org/10.47526/2023-1/2664-0686.38.
Full textZhang, Zhongjian, Mengmei Zhang, Xiao Wang, et al. "Rethinking Byzantine Robustness in Federated Recommendation from Sparse Aggregation Perspective." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 12 (2025): 13331–38. https://doi.org/10.1609/aaai.v39i12.33455.
Full textABORISADE, D. O., A. S. SODIYA, A. A. ODUMOSU, O. Y. ALOWOSILE, and A. A. ADEDEJI. "A SURVIVABLE DISTRIBUTED DATABASE AGAINST BYZANTINE FAILURE." Journal of Natural Sciences Engineering and Technology 15, no. 2 (2017): 61–72. http://dx.doi.org/10.51406/jnset.v15i2.1684.
Full textKim, Woocheol, and Hyuk Lim. "FedCC: Federated Learning with Consensus Confirmation for Byzantine Attack Resistance (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 11 (2022): 12981–82. http://dx.doi.org/10.1609/aaai.v36i11.21627.
Full textWang, Jingyao, Xingming Deng, Jinghua Guo, and Zeqin Zeng. "Resilient Consensus Control for Multi-Agent Systems: A Comparative Survey." Sensors 23, no. 6 (2023): 2904. http://dx.doi.org/10.3390/s23062904.
Full textPejušković, Vojislav. "Constantinople in imperial ideology of Stefan Dušan." Zbornik radova Filozofskog fakulteta u Pristini 52, no. 2 (2022): 163–75. http://dx.doi.org/10.5937/zrffp52-36444.
Full textWang, Huijian, Xiao Liu, and Jining Chen. "RVR Blockchain Consensus: A Verifiable, Weighted-Random, Byzantine-Tolerant Framework for Smart Grid Energy Trading." Computers 14, no. 6 (2025): 232. https://doi.org/10.3390/computers14060232.
Full textPrabhakar, Anjana, and Tricha Anjali. "Gray Hole Attack as a Byzantine Attack in a Wireless Multi-Hop Network." Journal of Applied Security Research 15, no. 1 (2019): 116–45. http://dx.doi.org/10.1080/19361610.2019.1669988.
Full textMenelaou, Iakovos. "Byzantine Satire: The Background in the Timarion." Hiperboreea 4, no. 2 (2017): 53–66. http://dx.doi.org/10.5325/hiperboreea.4.2.0053.
Full textB.Dhakde, Apeksha, and Sonali U. Nimbhorkar Sonali.U.Nimbhorkar. "Distributed Detection Methods for Byzantine Attack in Tree Topology." International Journal of Computer Applications 90, no. 18 (2014): 1–4. http://dx.doi.org/10.5120/15817-4238.
Full textAgrawal, Neha, Krishna Kumar, and Neelam Joshi. "Performance Evaluation of Byzantine Rushing Attack in ADHOC Network." International Journal of Computer Applications 123, no. 6 (2015): 1–4. http://dx.doi.org/10.5120/ijca2015905339.
Full textWu, Jun, Pei Li, Yang Chen, et al. "Analysis of Byzantine Attack Strategy for Cooperative Spectrum Sensing." IEEE Communications Letters 24, no. 8 (2020): 1631–35. http://dx.doi.org/10.1109/lcomm.2020.2990869.
Full textWu, Jun, Tianle Liu, and Rui Zhao. "Beta Distribution Function for Cooperative Spectrum Sensing against Byzantine Attack in Cognitive Wireless Sensor Networks." Electronics 13, no. 17 (2024): 3386. http://dx.doi.org/10.3390/electronics13173386.
Full textAgrawal, Neha, Krishna Kumar, and Neelam Joshi. "Implemented and Evaluated the Byzantine Attack with the Aid of Rushing Attack in Manet." International Journal of Computer Applications 130, no. 6 (2015): 6–11. http://dx.doi.org/10.5120/ijca2015906621.
Full textHanrahan-Shirley, Jack. "Tractus Errores Graecorum: Polemics of the Latin Patriarchate of Constantinople against the Greeks." Athens Journal of History 10, no. 2 (2024): 113–32. http://dx.doi.org/10.30958/ajhis.10-2-3.
Full textCheng, Chien-Fu, Jerry Chun-Wei Lin, Gautam Srivastava, and Chu-Chiao Hsu. "Reaching Consensus with Byzantine Faulty Controllers in Software-Defined Networks." Wireless Communications and Mobile Computing 2021 (April 12, 2021): 1–9. http://dx.doi.org/10.1155/2021/6662175.
Full textPlatt, Moritz, and Peter McBurney. "Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance." Algorithms 16, no. 1 (2023): 34. http://dx.doi.org/10.3390/a16010034.
Full textKrishnamohan, Theviyanthan. "IMPROVING BYZANTINE FAULT TOLERANCE IN SWARM ROBOTICS COLLECTIVE DECISION-MAKING SCENARIO VIA A NEW BLOCKCHAIN CONSENSUS ALGORITHM." ICTACT Journal on Soft Computing 13, no. 4 (2023): 3027–33. http://dx.doi.org/10.21917/ijsc.2023.0426.
Full textWu, Jun, Yue Yu, Hancheng Zhu, Tiecheng Song, and Jing Hu. "Cost-Benefit Tradeoff of Byzantine Attack in Cooperative Spectrum Sensing." IEEE Systems Journal 14, no. 2 (2020): 2532–43. http://dx.doi.org/10.1109/jsyst.2019.2952395.
Full textSarmah, Rupam, Amar Taggu, and Ningrinla Marchang. "Detecting Byzantine attack in cognitive radio networks using machine learning." Wireless Networks 26, no. 8 (2020): 5939–50. http://dx.doi.org/10.1007/s11276-020-02398-w.
Full textZhang, Linyuan, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, and Jinlong Wang. "Byzantine Attack and Defense in Cognitive Radio Networks: A Survey." IEEE Communications Surveys & Tutorials 17, no. 3 (2015): 1342–63. http://dx.doi.org/10.1109/comst.2015.2422735.
Full textMakani, Ruchi, and Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.
Full textYang, Caiyi, and Javad Ghaderi. "Byzantine-Robust Decentralized Learning via Remove-then-Clip Aggregation." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 19 (2024): 21735–43. http://dx.doi.org/10.1609/aaai.v38i19.30173.
Full textFoss, Clive. "Byzantine Malagina and the Lower Sangarius." Anatolian Studies 40 (December 1990): 161–83. http://dx.doi.org/10.2307/3642800.
Full textBöhm, Marcin. "Constantine X Doukas (1059–1067) versus Uzes – about the Nomads on Boats on the Danube in 1064." Studia Ceranea 11 (December 30, 2021): 39–49. http://dx.doi.org/10.18778/2084-140x.11.02.
Full textTomaszek, Michał Piotr. "Lombard, Bulgarians and Greeks. Prejudice and Communication in Liudprand of Cremona’s Story about his Legation to Constantinople in 968." Res Historica 57 (October 22, 2024): 141–73. https://doi.org/10.17951/rh.2024.57.141-173.
Full textHong, Sangwoo, Heecheol Yang, and Jungwoo Lee. "Hierarchical Group Testing for Byzantine Attack Identification in Distributed Matrix Multiplication." IEEE Journal on Selected Areas in Communications 40, no. 3 (2022): 1013–29. http://dx.doi.org/10.1109/jsac.2022.3142364.
Full textXu, Chentao, Qingshan Liu, and Tingwen Huang. "Resilient Penalty Function Method for Distributed Constrained Optimization under Byzantine Attack." Information Sciences 596 (June 2022): 362–79. http://dx.doi.org/10.1016/j.ins.2022.02.055.
Full textGupta, Chitvan, Laxman Singh, and Rajdev Tiwari. "Wormhole attack detection techniques in ad-hoc network: A systematic review." Open Computer Science 12, no. 1 (2022): 260–88. http://dx.doi.org/10.1515/comp-2022-0245.
Full textHoward-Johnston, James. "Rus and Khazars." Studia Ceranea 13 (December 30, 2023): 381–418. http://dx.doi.org/10.18778/2084-140x.13.45.
Full textChen, Huifang, Lei Xie, and Congqi Shen. "Optimal Byzantine attack strategy for distributed localisation with M ‐ary quantised data." Electronics Letters 51, no. 25 (2015): 2158–60. http://dx.doi.org/10.1049/el.2015.2172.
Full textFu, Yuanhua, and Zhiming He. "Entropy-Based Weighted Decision Combining for Collaborative Spectrum Sensing Over Byzantine Attack." IEEE Wireless Communications Letters 8, no. 6 (2019): 1528–32. http://dx.doi.org/10.1109/lwc.2019.2926087.
Full textHe, Xiaofan, Huaiyu Dai, and Peng Ning. "A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check." IEEE Transactions on Wireless Communications 12, no. 5 (2013): 2512–23. http://dx.doi.org/10.1109/twc.2013.031313.121551.
Full textNazário Coelho, Vitor, Rodolfo Pereira Araújo, Haroldo Gambini Santos, Wang Yong Qiang, and Igor Machado Coelho. "A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus." Future Internet 12, no. 11 (2020): 185. http://dx.doi.org/10.3390/fi12110185.
Full textLuo, Xujiang, and Bin Tang. "Byzantine Fault-Tolerant Federated Learning Based on Trustworthy Data and Historical Information." Electronics 13, no. 8 (2024): 1540. http://dx.doi.org/10.3390/electronics13081540.
Full textKislinger, Ewald. "Erster und zweiter Sieger. Zum Byzantinisch-Karolingischen bündnis bezüglich Bari 870-871." Zbornik radova Vizantoloskog instituta, no. 50-1 (2013): 245–58. http://dx.doi.org/10.2298/zrvi1350245k.
Full textWu, Jun, and Zehao Chen. "Secure and efficient cooperative spectrum sensing under byzantine attack and imperfect reporting channel." Wireless Networks 28, no. 1 (2022): 367–80. http://dx.doi.org/10.1007/s11276-021-02853-2.
Full textZhang, Linyuan, Guoru Ding, Qihui Wu, and Fei Song. "Defending Against Byzantine Attack in Cooperative Spectrum Sensing: Defense Reference and Performance Analysis." IEEE Access 4 (2016): 4011–24. http://dx.doi.org/10.1109/access.2016.2593952.
Full text