To see the other types of publications on this topic, follow the link: Byzantines Attack.

Journal articles on the topic 'Byzantines Attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Byzantines Attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Böhm, Marcin. "Constantine X Doukas (1059–1067) versus Uzes – about the Nomads on Boats on the Danube in 1064." Studia Ceranea 11 (December 30, 2021): 39–49. http://dx.doi.org/10.18778/2084-140x.11.02.

Full text
Abstract:
The reign of the Doukas dynasty in 1059–1078 was a time when new threats to the Byzantine Empire emerge in Europe and Asia. One of them was the increased activity of Turkmen who were penetrating the lands belonging to the Byzantines. A manifestation of these threats was visible during the rule of Constantine X Doukas (1059–1067) in 1064. We have there an invasion of the tribe of Uzes, who crossed the Danube. They ventured so far, as the vicinity of Thessalonica and the province of Hellas, plundering everything in their path. Their actions surprised the defense of the Byzantines. This attack on
APA, Harvard, Vancouver, ISO, and other styles
2

Avzhi, Zhasim. "Relatıons wıth Byzantıne Empıre Durıng The Prophet’s Tıme (Pbuh)." Iasaýı ýnıversıtetіnіń habarshysy 127, no. 1 (2023): 494–506. http://dx.doi.org/10.47526/2023-1/2664-0686.38.

Full text
Abstract:
The period of Muhammad [pbuh] is the most important time period of whole 15-century Islamic history. It is because his sayings and habits had become a source of influence for later periods. As being the head of state of Islam based in Madina, his relations with the two super power states of the world at that time, Sasanids and Byzantines are substantial examples. The north side of the Arabian peninsula, at the time Muhammad [pbuh] was preaching Islam to the people of Macca, were hosting a power struggle between Sasanids and Byzantines. In this time, the polytheist heathen people of Macca were
APA, Harvard, Vancouver, ISO, and other styles
3

Hanrahan-Shirley, Jack. "Tractus Errores Graecorum: Polemics of the Latin Patriarchate of Constantinople against the Greeks." Athens Journal of History 10, no. 2 (2024): 113–32. http://dx.doi.org/10.30958/ajhis.10-2-3.

Full text
Abstract:
This paper examines the Latin text entitled Tractus Errores Graecorum: De Processione Spiritus Sancti. De Animabus Defunctorum. De Azymis Et Fermentato, De Obedientia Romanae Ecclesiae, most probably written and published in 1252 in Constantinople, attributed to the deacon Pantaleone. Attention will be specifically given to the argumentation utilized by Pantaleone to attack the theological and liturgical positions advocated for and defended by his Byzantine opponents. This paper is the first examination of the text by modern English-language scholarship. The analysis of the Tractus Errores Gra
APA, Harvard, Vancouver, ISO, and other styles
4

Veselinović, Ivana. "The role of the despotess Irene Kantakouzene in the political life of the Serbian Despotate." Zbornik radova Filozofskog fakulteta u Pristini 52, no. 2 (2022): 177–90. http://dx.doi.org/10.5937/zrffp52-36443.

Full text
Abstract:
Despotess Irene was considered the second person of the Serbian despotate in Serbian historiography. Owing to Serbian and Byzantine sources that mention her actions, this paper attempts to answer the question of her joint rule with despot Đurađ Branković in Serbian state, as an independent political factor. The first example of this is Efsigmen Charter from 1429, which the despot issued together with his wife. In addition, the miniature on Irene's charter shows her with a sceptre in her hand, a royal sign, although her and Đurađ's son had already been nominated for the heir to the throne, as i
APA, Harvard, Vancouver, ISO, and other styles
5

Howard-Johnston, James. "Rus and Khazars." Studia Ceranea 13 (December 30, 2023): 381–418. http://dx.doi.org/10.18778/2084-140x.13.45.

Full text
Abstract:
The southern thrust of the Rus in the ninth–tenth centuries is to be explained not only by Viking hunger for wealth and glory, but also by the large, rapidly growing market for furs in the Caliphate. In order to reach that market, the Rus had to cross the Khazars’ sphere of influence in the steppes and wooded steppes of the Volga and Don regions. The khaganate was a great power, which presided over many client peoples. It was perhaps awareness of the potential threat posed by the Rus which prompted the Khazars to improve their northern defences in the 830s. There is clear evidence that they th
APA, Harvard, Vancouver, ISO, and other styles
6

С., В. Фіннік. "ЕТНОГЕНЕЗ БУЛГАР І ПЕРЕСЕЛЕННЯ КОЧОВИХ ПЛЕМЕН У СХІДНУ ЄВРОПУ В V СТОЛІТТІ Н.Е." Bulgars, Onogurs, Huns, ethnogenesis, Byzantine politic., № 54 (31 жовтня 2018): 82–89. https://doi.org/10.5281/zenodo.1476243.

Full text
Abstract:
<em>The article discusses the early stage of the ethnogenesis of Bulgars in Eastern Europe. The author connects them main Hun&rsquo;s ethno-political association (Akaziri, Hilandurs, Hunugurs etc.) that emerged in Eastern Europe after the death of the leader of the Huns of Attila. Part of coming to the West is the conglomerate of tribes came from the region of the Sayan-Altai, part of the areas of North-West China (the Tarim river) and the Eastern Kazakhstan. Part of the Bulgars had a lot of former Iranian population of the steppes and even Toharian population of the oases of Xinjiang (Tarim r
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (2019): 3436. http://dx.doi.org/10.3390/s19153436.

Full text
Abstract:
Herein, the problem of target tracking in wireless sensor networks (WSNs) is investigated in the presence of Byzantine attacks. More specifically, we analyze the impact of Byzantine attacks on the performance of a tracking system. First, under the condition of jointly estimating the target state and the attack parameters, the posterior Cramer–Rao lower bound (PCRLB) is calculated. Then, from the perspective of attackers, we define the optimal Byzantine attack and theoretically find a way to achieve such an attack with minimal cost. When the attacked nodes are correctly identified by the fusion
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long, and Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median." Electronics 12, no. 5 (2023): 1190. http://dx.doi.org/10.3390/electronics12051190.

Full text
Abstract:
Federated learning techniques accomplish federated modeling and share global models without sharing data. Federated learning offers a good answer to complex data and privacy security issues. Although there are many ways to target federated learning, Byzantine attacks are the ones we concentrate on. Byzantine attacks primarily impede learning by tampering with the local model parameters provided by a client to the master node throughout the federation learning process, leading to a final global model that diverges from the optimal solution. To address this problem, we combine aggregation rules
APA, Harvard, Vancouver, ISO, and other styles
9

Nasir, Muhammad, and Ananda Maiti. "Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things." Machines 12, no. 3 (2024): 205. http://dx.doi.org/10.3390/machines12030205.

Full text
Abstract:
In this paper, an adaptive and resilient consensus control mechanism for multi-robot systems under Byzantine attack, based on sliding mode control, is proposed. The primary aim of the article is to develop a finite-time consensus control strategy even in the presence of a Byzantine attack. In the start, a finite-time consensus control mechanism is proposed to identify the essential conditions required for ensuring consensus accuracy in multi-robot systems, even when faced with Byzantine attacks using Lyapunov theory. Subsequently, a sliding mode control is combined with an adaptive technique f
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Yuchen, Chen Chen, Lingjuan Lyu, Yaochu Jin, and Gang Chen. "Exploit Gradient Skewness to Circumvent Byzantine Defenses for Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 18 (2025): 19024–32. https://doi.org/10.1609/aaai.v39i18.34094.

Full text
Abstract:
Federated Learning (FL) is notorious for its vulnerability to Byzantine attacks. Most current Byzantine defenses share a common inductive bias: among all the gradients, the densely distributed ones are more likely to be honest. However, such a bias is a poison to Byzantine robustness due to a newly discovered phenomenon in this paper -- gradient skew. We discover that a group of densely distributed honest gradients skew away from the optimal gradient (the average of honest gradients) due to heterogeneous data. This gradient skew phenomenon allows Byzantine gradients to hide within the densely
APA, Harvard, Vancouver, ISO, and other styles
11

Czyż, Maciej. "Byzantine Reconquista (10th–11th Centuries) and the Attacks on Christians in the Lands of Islam (Egypt, Syria and Iraq)." Studia Ceranea 14 (December 30, 2024): 369–87. https://doi.org/10.18778/2084-140x.14.23.

Full text
Abstract:
The paper discusses a wave of attacks on Christians in the lands of Islam that accompanied Byzantine victories on the battlefield in 10th–11th centuries, including pogroms and attacks in the capital of Egypt, Antioch, Alexandria, and Daqūqā’, which were clearly linked with the fear or anger towards Byzantines, as well as events in Damascus, Al-Ramla, Caesarea, Ascalon and Tinnis, in case of which the link with Byzantium is not mentioned by the sources. It is argued that these events paved the way for the persecutions of Al-Ḥākim.
APA, Harvard, Vancouver, ISO, and other styles
12

Medhi, Jishu K., Rui Liu, Qianlong Wang, and Xuhui Chen. "Robust Multiagent Reinforcement Learning for UAV Systems: Countering Byzantine Attacks." Information 14, no. 11 (2023): 623. http://dx.doi.org/10.3390/info14110623.

Full text
Abstract:
Multiple unmanned aerial vehicle (multi-UAV) systems have gained significant attention in applications, such as aerial surveillance and search and rescue missions. With the recent development of state-of-the-art multiagent reinforcement learning (MARL) algorithms, it is possible to train multi-UAV systems in collaborative and competitive environments. However, the inherent vulnerabilities of multiagent systems pose significant privacy and security risks when deploying general and conventional MARL algorithms. The presence of even a single Byzantine adversary within the system can severely degr
APA, Harvard, Vancouver, ISO, and other styles
13

Salama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.

Full text
Abstract:
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attac
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Jingyao, Xingming Deng, Jinghua Guo, and Zeqin Zeng. "Resilient Consensus Control for Multi-Agent Systems: A Comparative Survey." Sensors 23, no. 6 (2023): 2904. http://dx.doi.org/10.3390/s23062904.

Full text
Abstract:
Due to the openness of communication network and the complexity of system structures, multi-agent systems are vulnerable to malicious network attacks, which can cause intense instability to these systems. This article provides a survey of state-of-the-art results of network attacks on multi-agent systems. Recent advances on three types of attacks, i.e., those on DoS attacks, spoofing attacks and Byzantine attacks, the three main network attacks, are reviewed. Their attack mechanisms are introduced, and the attack model and the resilient consensus control structure are discussed, respectively,
APA, Harvard, Vancouver, ISO, and other styles
15

Zhang, Zhongjian, Mengmei Zhang, Xiao Wang, et al. "Rethinking Byzantine Robustness in Federated Recommendation from Sparse Aggregation Perspective." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 12 (2025): 13331–38. https://doi.org/10.1609/aaai.v39i12.33455.

Full text
Abstract:
To preserve user privacy in recommender systems, federated recommendation (FR) based on federated learning (FL) emerges, keeping the personal data on the local client and updating a model collaboratively. Unlike FL, FR has a unique sparse aggregation mechanism, where the embedding of each item is updated by only partial clients, instead of full clients in a dense aggregation of general FL. Recently, as an essential principle of FL, model security has received increasing attention, especially for Byzantine attacks, where malicious clients can send arbitrary updates. The problem of exploring the
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–41. https://doi.org/10.1145/3700422.

Full text
Abstract:
Byzantine-robust Federated Learning (FL) aims to counter malicious clients and train an accurate global model while maintaining an extremely low attack success rate. Most existing systems, however, are only robust when most of the clients are honest. FLTrust (NDSS '21) and Zeno++ (ICML '20) do not make such an honest majority assumption but can only be applied to scenarios where the server is provided with an auxiliary dataset used to filter malicious updates. FLAME (USENIX '22) and EIFFeL (CCS '22) maintain the semi-honest majority assumption to guarantee robustness and the confidentiality of
APA, Harvard, Vancouver, ISO, and other styles
17

Wang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." ACM SIGMETRICS Performance Evaluation Review 53, no. 1 (2025): 25–27. https://doi.org/10.1145/3744970.3727296.

Full text
Abstract:
Byzantine-robust Federated Learning (FL) aims to counter malicious clients and train an accurate global model while maintaining an extremely low attack success rate. Most existing systems, however, are only robust when most of the clients are honest. FLTrust (NDSS '21) and Zeno++ (ICML '20) do not make such an honest majority assumption but can only be applied to scenarios where the server is provided with an auxiliary dataset used to filter malicious updates. FLAME (USENIX '22) and EIFFeL (CCS '22) maintain the semi-honest majority assumption to guarantee robustness and the confidentiality of
APA, Harvard, Vancouver, ISO, and other styles
18

Amir, Y., B. Coan, J. Kirsch, and J. Lane. "Prime: Byzantine Replication under Attack." IEEE Transactions on Dependable and Secure Computing 8, no. 4 (2011): 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Wang, Huijian, Xiao Liu, and Jining Chen. "RVR Blockchain Consensus: A Verifiable, Weighted-Random, Byzantine-Tolerant Framework for Smart Grid Energy Trading." Computers 14, no. 6 (2025): 232. https://doi.org/10.3390/computers14060232.

Full text
Abstract:
Blockchain technology empowers decentralized transactions in smart grids, but existing consensus algorithms face efficiency and security bottlenecks under Byzantine attacks. This article proposes the RVR consensus algorithm, which innovatively integrates dynamic reputation evaluation, verifiable random function (VRF), and a weight-driven probability election mechanism to achieve (1) behavior-aware dynamic adjustment of reputation weights and (2) manipulation-resistant random leader election via VRF. Experimental verification shows that under a silence attack, the maximum latency is reduced by
APA, Harvard, Vancouver, ISO, and other styles
20

ABORISADE, D. O., A. S. SODIYA, A. A. ODUMOSU, O. Y. ALOWOSILE, and A. A. ADEDEJI. "A SURVIVABLE DISTRIBUTED DATABASE AGAINST BYZANTINE FAILURE." Journal of Natural Sciences Engineering and Technology 15, no. 2 (2017): 61–72. http://dx.doi.org/10.51406/jnset.v15i2.1684.

Full text
Abstract:
Distributed Database Systems have been very useful technologies in making a wide range of information available to users across the World. However, there are now growing security concerns, arising from the use of distributed systems, particularly the ones attached to critical systems. More than ever before, data in distributed databases are more susceptible to attacks, failures or accidents owing to advanced knowledge explosions in network and database technologies. The imperfection of the existing security mechanisms coupled with the heightened and growing concerns for intrusion, attack, comp
APA, Harvard, Vancouver, ISO, and other styles
21

Makani, Ruchi, and Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.

Full text
Abstract:
Background &amp; Objective:: In past few years, Cognitive Radio (CR) paradigm has emerged as a promising and revolutionary solution to avoid problems of spectrum paucity and inefficiency in spectrum usage. Efficiently utilization of the spectrum offers high network performance. CRs are proficient to identify and adopt the unused spectrum in order to allow secondary users to occupy it without interfering the primary user’s activity. Cognitive Internet on Things (CIoT) is an integration of several technologies and communication solutions which can be effectively realized as Cognitive Radio Adhoc
APA, Harvard, Vancouver, ISO, and other styles
22

Wan, Fangyi, Ting Ma, Yi Hua, Bin Liao, and Xinlin Qing. "Secure distributed estimation under Byzantine attack and manipulation attack." Engineering Applications of Artificial Intelligence 116 (November 2022): 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Platt, Moritz, and Peter McBurney. "Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance." Algorithms 16, no. 1 (2023): 34. http://dx.doi.org/10.3390/a16010034.

Full text
Abstract:
Consensus algorithms are applied in the context of distributed computer systems to improve their fault tolerance. The explosive development of distributed ledger technology following the proposal of “Bitcoin” led to a sharp increase in research activity in this area. Specifically, public and permissionless networks require robust leader selection strategies resistant to Sybil attacks in which malicious attackers present bogus identities to induce byzantine faults. Our goal is to analyse the entire breadth of works in this area systematically, thereby uncovering trends and research directions r
APA, Harvard, Vancouver, ISO, and other styles
24

Kaya, Tülin. "Understanding the Use of Byzantine Routes in Central Anatolia (ca. 7TH–9TH Centuries)." Studia Ceranea 9 (December 30, 2019): 259–78. http://dx.doi.org/10.18778/2084-140x.09.14.

Full text
Abstract:
This paper mainly focuses on the impact of the change in the political equilibrium in the East caused by the effects of the Arab invasions on the main communication routes in Byzantine Central Anatolia. Beginning in the 640s and continuing for over 150 years, these incursions had an impact on the ways in which major routes in and through the new frontier zone were used, reflecting in part the fact that during this period the Taurus mountain range constituted the natural frontier between the Byzantines and the Arabs. The main communication routes in Central Anatolia, which lie on the northwest-
APA, Harvard, Vancouver, ISO, and other styles
25

Muhamet Qerimi. "Durres During The First Norman Attack 1081-1085." Journal of Namibian Studies : History Politics Culture 36 (October 3, 2023): 721–35. http://dx.doi.org/10.59670/jns.v36i.4997.

Full text
Abstract:
Following the Norman conquest of Byzantine Italy and Saracen Sicily, Robert Guiscard took the initiative to conquer the Byzantine Empire in 1081. Robert Guiscard set out from Italy for the island of Corfu, which he soon conquered. After landing, he received military reinforcements from Italy, and attacks began on the city of Durres, the main port on the Adriatic. The city was well protected on a long, narrow peninsula running parallel to the coast but separated by swamps. Guiscard brought his army to the peninsula and set up camp outside the city walls, but the Norman fleet sailing towards Dur
APA, Harvard, Vancouver, ISO, and other styles
26

Wu, Jun, Tianle Liu, and Rui Zhao. "Beta Distribution Function for Cooperative Spectrum Sensing against Byzantine Attack in Cognitive Wireless Sensor Networks." Electronics 13, no. 17 (2024): 3386. http://dx.doi.org/10.3390/electronics13173386.

Full text
Abstract:
In order to explore more spectrum resources to support sensors and their related applications, cognitive wireless sensor networks (CWSNs) have emerged to identify available channels being underutilized by the primary user (PU). To improve the detection accuracy of the PU signal, cooperative spectrum sensing (CSS) among sensor paradigms is proposed to make a global decision about the PU status for CWSNs. However, CSS is susceptible to Byzantine attacks from malicious sensor nodes due to its open nature, resulting in wastage of spectrum resources or causing harmful interference to PUs. To suppre
APA, Harvard, Vancouver, ISO, and other styles
27

Cheng, Chien-Fu, Jerry Chun-Wei Lin, Gautam Srivastava, and Chu-Chiao Hsu. "Reaching Consensus with Byzantine Faulty Controllers in Software-Defined Networks." Wireless Communications and Mobile Computing 2021 (April 12, 2021): 1–9. http://dx.doi.org/10.1155/2021/6662175.

Full text
Abstract:
The combination of the Internet of Things (IoT) and Cloud computing are both popular applications that are based on the Internet. However, the traditional networking structure can no longer support the transmission of the huge number of packets required by cloud computing and IoT. Therefore, a new-generation architecture, software-defined networking (SDN), came into being. The new-generation SDN can control routing through software, making flexible and convenient management a key feature of SDN. However, attacks and threats are prevalent in today’s networking environment. When an SDN controlle
APA, Harvard, Vancouver, ISO, and other styles
28

Filatov, Alexey. "The power of the arab caliphs in the byzantine literature of the 9th and 10th centuries." Metamorphoses of history, no. 26 (2022): 0. http://dx.doi.org/10.37490/s230861810023611-2.

Full text
Abstract:
The birth of Islam proclaimed a new age in the history of interreligious interactions in the Middle East. In the 7th century, the political map of the region has changed, and the Christian world encountered a new adversary represented by the first Islamic state known as Caliphate. First of all, the transformation of the region influenced the consciousness of Eastern Romans (or Byzantines), whose state became a real barrier protecting Europe from the hordes of conquerors. Byzantine Empire held back the Arabian attacks for centuries, and the Caliphate was always regarded as «the state of evil» o
APA, Harvard, Vancouver, ISO, and other styles
29

Whealey, Alice. "Muslim Motives for Conquering the Byzantine Empire 634–720: The Evidence from Eastern Christian Sources." Russian History 40, no. 1 (2013): 9–26. http://dx.doi.org/10.1163/18763316-04001002.

Full text
Abstract:
This article examines the motives of the earliest Muslim attacks on the Byzantine Empire in the seventh and eighth centuries by examining the earliest Christian (Byzantine) and Muslim sources that describe these attacks. The article assesses the strengths of these accounts and culls from them the possible religious motivations behind the first Muslim attacks on the Byzantine Empire. One question particularly addressed is the goal of the Muslim attacks: to bring down the Byzantine Empire entirely, or merely to wrest from it Palestine and the surrounding territories that were of significance to
APA, Harvard, Vancouver, ISO, and other styles
30

Pashkin, Nikolai G. "Aims of the Byzantine Attack on Gallipoli in 1410." Античная древность и средние века 48 (2020): 156–71. http://dx.doi.org/10.15826/adsv.2020.48.010.

Full text
Abstract:
This research suggests an interpretation of the reasons behind the Byzantine attack on the Turkish fort of Gallipoli in spring 1410. The citadel that controlled Dardanelles was attacked by a squadron of eight ships. This operation is considered not successful. However, there are reasons to consider that initially Greeks did not plan to take the town. The search for the proofs should be in the sphere of international relations. In the period in question, the Byzantine policy was influenced by contradictions between Venice and Hungarian king Sigismund of Luxembourg concerning Dalmatia. Their int
APA, Harvard, Vancouver, ISO, and other styles
31

Li, Liping, Wei Xu, Tianyi Chen, Georgios B. Giannakis, and Qing Ling. "RSA: Byzantine-Robust Stochastic Aggregation Methods for Distributed Learning from Heterogeneous Datasets." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1544–51. http://dx.doi.org/10.1609/aaai.v33i01.33011544.

Full text
Abstract:
In this paper, we propose a class of robust stochastic subgradient methods for distributed learning from heterogeneous datasets at presence of an unknown number of Byzantine workers. The Byzantine workers, during the learning process, may send arbitrary incorrect messages to the master due to data corruptions, communication failures or malicious attacks, and consequently bias the learned model. The key to the proposed methods is a regularization term incorporated with the objective function so as to robustify the learning task and mitigate the negative effects of Byzantine attacks. The resulta
APA, Harvard, Vancouver, ISO, and other styles
32

Kim, Woocheol, and Hyuk Lim. "FedCC: Federated Learning with Consensus Confirmation for Byzantine Attack Resistance (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 11 (2022): 12981–82. http://dx.doi.org/10.1609/aaai.v36i11.21627.

Full text
Abstract:
In federated learning (FL), a server determines a global learning model by aggregating the local learning models of clients, and the determined global model is broadcast to all the clients. However, the global learning model can significantly deteriorate if a Byzantine attacker transmits malicious learning models trained with incorrectly labeled data. We propose a Byzantine-robust FL algorithm that, by employing a consensus confirmation method, can reduce the success probability of Byzantine attacks. After aggregating the local models from clients, the proposed FL server validates the global m
APA, Harvard, Vancouver, ISO, and other styles
33

Zhai, Kun, Qiang Ren, Junli Wang, and Chungang Yan. "Byzantine-robust federated learning via credibility assessment on non-IID data." Mathematical Biosciences and Engineering 19, no. 2 (2021): 1659–76. http://dx.doi.org/10.3934/mbe.2022078.

Full text
Abstract:
&lt;abstract&gt; &lt;p&gt;Federated learning is a novel framework that enables resource-constrained edge devices to jointly learn a model, which solves the problem of data protection and data islands. However, standard federated learning is vulnerable to Byzantine attacks, which will cause the global model to be manipulated by the attacker or fail to converge. On non-iid data, the current methods are not effective in defensing against Byzantine attacks. In this paper, we propose a Byzantine-robust framework for federated learning via credibility assessment on non-iid data (BRCA). Credibility a
APA, Harvard, Vancouver, ISO, and other styles
34

Yao, Wenbin, Bangli Pan, Yingying Hou, Xiaoyong Li, and Yamei Xia. "An Adaptive Model Filtering Algorithm Based on Grubbs Test in Federated Learning." Entropy 25, no. 5 (2023): 715. http://dx.doi.org/10.3390/e25050715.

Full text
Abstract:
Federated learning has been popular for its ability to train centralized models while protecting clients’ data privacy. However, federated learning is highly susceptible to poisoning attacks, which can result in a decrease in model performance or even make it unusable. Most existing defense methods against poisoning attacks cannot achieve a good trade-off between robustness and training efficiency, especially on non-IID data. Therefore, this paper proposes an adaptive model filtering algorithm based on the Grubbs test in federated learning (FedGaf), which can achieve great trade-offs between r
APA, Harvard, Vancouver, ISO, and other styles
35

Guru, Abhishek, Bhabendu Kumar Mohanta, Hitesh Mohapatra, Fadi Al-Turjman, Chadi Altrjman, and Arvind Yadav. "A Survey on Consensus Protocols and Attacks on Blockchain Technology." Applied Sciences 13, no. 4 (2023): 2604. http://dx.doi.org/10.3390/app13042604.

Full text
Abstract:
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree. Additionally, many researchers aim to implement a public key infrastructure (PKI) cryptography mechanism to boost the security of blockchain-based data management. However, the issue is that many of these are required for advanced cryptographic protocols. For all consensus protocols, security features are required to be discussed because these consensus algor
APA, Harvard, Vancouver, ISO, and other styles
36

Gupta, Chitvan, Laxman Singh, and Rajdev Tiwari. "Wormhole attack detection techniques in ad-hoc network: A systematic review." Open Computer Science 12, no. 1 (2022): 260–88. http://dx.doi.org/10.1515/comp-2022-0245.

Full text
Abstract:
Abstract Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different types of attacks such as blackhole attack, gray hole attack, Sybil attack, rushing attack, jellyfish attack, wormhole attack (WHA), byzantine attack, selfishness attack, and network partition attack. Out of these, worm hole attack is the most common and severe attack that substantially undermines the performance of the network and dis
APA, Harvard, Vancouver, ISO, and other styles
37

Cao, Ruohan, Tan F. Wong, Tiejun Lv, Hui Gao, and Shaoshi Yang. "Detecting Byzantine Attacks Without Clean Reference." IEEE Transactions on Information Forensics and Security 11, no. 12 (2016): 2717–31. http://dx.doi.org/10.1109/tifs.2016.2596140.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Prabhakar, Anjana, and Tricha Anjali. "Gray Hole Attack as a Byzantine Attack in a Wireless Multi-Hop Network." Journal of Applied Security Research 15, no. 1 (2019): 116–45. http://dx.doi.org/10.1080/19361610.2019.1669988.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Agrawal, Neha, Krishna Kumar, and Neelam Joshi. "Implemented and Evaluated the Byzantine Attack with the Aid of Rushing Attack in Manet." International Journal of Computer Applications 130, no. 6 (2015): 6–11. http://dx.doi.org/10.5120/ijca2015906621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

B.Dhakde, Apeksha, and Sonali U. Nimbhorkar Sonali.U.Nimbhorkar. "Distributed Detection Methods for Byzantine Attack in Tree Topology." International Journal of Computer Applications 90, no. 18 (2014): 1–4. http://dx.doi.org/10.5120/15817-4238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Agrawal, Neha, Krishna Kumar, and Neelam Joshi. "Performance Evaluation of Byzantine Rushing Attack in ADHOC Network." International Journal of Computer Applications 123, no. 6 (2015): 1–4. http://dx.doi.org/10.5120/ijca2015905339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Wu, Jun, Pei Li, Yang Chen, et al. "Analysis of Byzantine Attack Strategy for Cooperative Spectrum Sensing." IEEE Communications Letters 24, no. 8 (2020): 1631–35. http://dx.doi.org/10.1109/lcomm.2020.2990869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Menelaou, Iakovos. "Byzantine Satire: The Background in the Timarion." Hiperboreea 4, no. 2 (2017): 53–66. http://dx.doi.org/10.5325/hiperboreea.4.2.0053.

Full text
Abstract:
Abstract In this paper, I examine the twelfth century Byzantine satire Timarion. I seek to analyse the background of the work, through a focus on the plot and characters, the classical sources that influenced the Byzantine author and the issues of date and authorship which should be seen in relation to the targets of his attack. While there is no certainty about the identity of the author, the Timarion was written, probably, by a learned author who had knowledge of classical authors and medical theories of his era. This is obvious in the way he embodies these traditions in his satire. Similarl
APA, Harvard, Vancouver, ISO, and other styles
44

Nazário Coelho, Vitor, Rodolfo Pereira Araújo, Haroldo Gambini Santos, Wang Yong Qiang, and Igor Machado Coelho. "A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus." Future Internet 12, no. 11 (2020): 185. http://dx.doi.org/10.3390/fi12110185.

Full text
Abstract:
Mixed-integer mathematical programming has been widely used to model and solve challenging optimization problems. One interesting feature of this technique is the ability to prove the optimality of the achieved solution, for many practical scenarios where a linear programming model can be devised. This paper explores its use to model very strong Byzantine adversaries, in the context of distributed consensus systems. In particular, we apply the proposed technique to find challenging adversarial conditions on a state-of-the-art blockchain consensus: the Neo dBFT. Neo Blockchain has been using th
APA, Harvard, Vancouver, ISO, and other styles
45

Harris, Simon. "The Byzantine prokeimena." Plainsong and Medieval Music 3, no. 2 (1994): 133–47. http://dx.doi.org/10.1017/s096113710000070x.

Full text
Abstract:
It is possible to attach too much significance to the names of both the hypakoae and the prokeimena. The word ‘hypakoe’ means ‘respond’, but this by itself does not mean that the Byzantine hypakoae were chants that derived from responsorially performed psalms (even though that is what they may ultimately have been), for the name might well refer simply to a responsorial method of singing them which, evidence suggests, prevailed between the eleventh and thirteenth centuries.
APA, Harvard, Vancouver, ISO, and other styles
46

Zhou, Antong, Ning Jiang, and Tong Tang. "Asynchronous Robust Aggregation Method with Privacy Protection for IoV Federated Learning." World Electric Vehicle Journal 15, no. 1 (2024): 18. http://dx.doi.org/10.3390/wevj15010018.

Full text
Abstract:
Due to the wide connection range and open communication environment of internet of vehicle (IoV) devices, they are susceptible to Byzantine attacks and privacy inference attacks, resulting in security and privacy issues in IoV federated learning. Therefore, there is an urgent need to study IoV federated learning methods with privacy protection. However, the heterogeneity and resource limitations of IoV devices pose significant challenges to the aggregation of federated learning model parameters. Therefore, this paper proposes an asynchronous robust aggregation method with privacy protection fo
APA, Harvard, Vancouver, ISO, and other styles
47

Krishnamohan, Theviyanthan. "IMPROVING BYZANTINE FAULT TOLERANCE IN SWARM ROBOTICS COLLECTIVE DECISION-MAKING SCENARIO VIA A NEW BLOCKCHAIN CONSENSUS ALGORITHM." ICTACT Journal on Soft Computing 13, no. 4 (2023): 3027–33. http://dx.doi.org/10.21917/ijsc.2023.0426.

Full text
Abstract:
Swarm robotics applies concepts of swarm intelligence to robotics. Discrete consensus achievement is one of the major behaviors found in swarm robotics. Various algorithms have been developed for discrete consensus achievement. However, existing discrete consensus achievement algorithms are vulnerable to Byzantine robots. Blockchain has been successfully used to mitigate the negative effect of Byzantine robots. Nevertheless, since the blockchain solution uses the Proof-of-Work blockchain consensus algorithm, it is vulnerable to the 51% attack. Besides, the swarm also takes longer to achieve co
APA, Harvard, Vancouver, ISO, and other styles
48

Wu, Jun, Yue Yu, Hancheng Zhu, Tiecheng Song, and Jing Hu. "Cost-Benefit Tradeoff of Byzantine Attack in Cooperative Spectrum Sensing." IEEE Systems Journal 14, no. 2 (2020): 2532–43. http://dx.doi.org/10.1109/jsyst.2019.2952395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Sarmah, Rupam, Amar Taggu, and Ningrinla Marchang. "Detecting Byzantine attack in cognitive radio networks using machine learning." Wireless Networks 26, no. 8 (2020): 5939–50. http://dx.doi.org/10.1007/s11276-020-02398-w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Linyuan, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, and Jinlong Wang. "Byzantine Attack and Defense in Cognitive Radio Networks: A Survey." IEEE Communications Surveys & Tutorials 17, no. 3 (2015): 1342–63. http://dx.doi.org/10.1109/comst.2015.2422735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!