Gotowa bibliografia na temat „Byzantine attack”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Byzantine attack”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Byzantine attack"
Yang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (2019): 3436. http://dx.doi.org/10.3390/s19153436.
Pełny tekst źródłaPashkin, Nikolai G. "Aims of the Byzantine Attack on Gallipoli in 1410." Античная древность и средние века 48 (2020): 156–71. http://dx.doi.org/10.15826/adsv.2020.48.010.
Pełny tekst źródłaNasir, Muhammad, and Ananda Maiti. "Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things." Machines 12, no. 3 (2024): 205. http://dx.doi.org/10.3390/machines12030205.
Pełny tekst źródłaLiu, Yuchen, Chen Chen, Lingjuan Lyu, Yaochu Jin, and Gang Chen. "Exploit Gradient Skewness to Circumvent Byzantine Defenses for Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 18 (2025): 19024–32. https://doi.org/10.1609/aaai.v39i18.34094.
Pełny tekst źródłaWang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long, and Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median." Electronics 12, no. 5 (2023): 1190. http://dx.doi.org/10.3390/electronics12051190.
Pełny tekst źródłaAmir, Y., B. Coan, J. Kirsch, and J. Lane. "Prime: Byzantine Replication under Attack." IEEE Transactions on Dependable and Secure Computing 8, no. 4 (2011): 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.
Pełny tekst źródłaMedhi, Jishu K., Rui Liu, Qianlong Wang, and Xuhui Chen. "Robust Multiagent Reinforcement Learning for UAV Systems: Countering Byzantine Attacks." Information 14, no. 11 (2023): 623. http://dx.doi.org/10.3390/info14110623.
Pełny tekst źródłaWan, Fangyi, Ting Ma, Yi Hua, Bin Liao, and Xinlin Qing. "Secure distributed estimation under Byzantine attack and manipulation attack." Engineering Applications of Artificial Intelligence 116 (November 2022): 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.
Pełny tekst źródłaWang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–41. https://doi.org/10.1145/3700422.
Pełny tekst źródłaWang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." ACM SIGMETRICS Performance Evaluation Review 53, no. 1 (2025): 25–27. https://doi.org/10.1145/3744970.3727296.
Pełny tekst źródłaRozprawy doktorskie na temat "Byzantine attack"
Sironen, Erkki. "The late Roman and early Byzantine inscriptions of Athens and Attica : an edition with appendices on scripts, sepulchral formulae and occupations /." Helsinki : Hakapaino Oy, 1997. http://bibpurl.oclc.org/web/25751.
Pełny tekst źródłaAlam, Mohammad Rafiqul. "Detecting wormhole and Byzantine attacks in mobile ad hoc networks." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1701.
Pełny tekst źródłaTzavella, Elissavet. "Urban and rural landscape in early and middle Byzantine Attica (4th-12th c. AD)." Thesis, University of Birmingham, 2013. http://etheses.bham.ac.uk//id/eprint/4321/.
Pełny tekst źródłaWang, Qianlong. "Blockchain-Empowered Secure Machine Learning and Applications." Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1625183576139299.
Pełny tekst źródłaHan, Kai. "Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy Systems." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/26917.
Pełny tekst źródłaKALLAS, KASSEM. "A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks." Doctoral thesis, Università di Siena, 2017. http://hdl.handle.net/11365/1005735.
Pełny tekst źródłaChen, Ho-Chun, and 陳和均. "The Study of Byzantine Attack in Large Scale Wireless Sensor Networks." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/n2y87u.
Pełny tekst źródłaCheng, Sheng-Hong, and 鄭勝鴻. "Defense and Detection of Sybil Attack Using Byzantine Agreement Algorithm in Mobile Ad Hoc Network." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/24pgmr.
Pełny tekst źródła(9154928), Aritra Mitra. "New Approaches to Distributed State Estimation, Inference and Learning with Extensions to Byzantine-Resilience." Thesis, 2020.
Znajdź pełny tekst źródłaMapunya, Sekgoari Semaka. "The design and the implementation of the byzantine attack mitigation scheme in cognitive radio ad hoc networks." Thesis, 2019. http://hdl.handle.net/10386/3137.
Pełny tekst źródłaKsiążki na temat "Byzantine attack"
Yarbro, Chelsea Quinn. A Flame in Byzantium. Tom Doherty Assoc Llc, 1988.
Znajdź pełny tekst źródłaCzęści książek na temat "Byzantine attack"
Pooja, A. Saraswathi, Rampa Theresa, Satya Govind, and Anuja Aloy Mary. "Detection of Byzantine Attack in Cognitive Radio Network." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5029-4_37.
Pełny tekst źródłaHe, Xiaofan, and Huaiyu Dai. "Case Study II: HMM-Based Byzantine Attack Detection." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_5.
Pełny tekst źródłaHe, Xiaofan, and Huaiyu Dai. "Case Study III: CFC-Based Byzantine Attack Detection." In SpringerBriefs in Electrical and Computer Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75868-8_6.
Pełny tekst źródłaZhang, Linyuan, Guoru Ding, and Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_301.
Pełny tekst źródłaZhang, Linyuan, Guoru Ding, and Qihui Wu. "Byzantine Attack and Defense in Wireless Data Fusion." In Encyclopedia of Wireless Networks. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-32903-1_301-1.
Pełny tekst źródłaHu, Chenyu, Yuhan Liu, Mingyue Zhang, and Zheng Yang. "Defense-Guided Adaptive Attack on Byzantine-Robust Federated Learning." In Communications in Computer and Information Science. Springer Nature Singapore, 2024. https://doi.org/10.1007/978-981-96-0151-6_7.
Pełny tekst źródłaBing, Yuchen, Long Wang, and Zesheng Chen. "A Spectrum Sensing Method for UAV Swarms Under Byzantine Attack." In Proceedings of 2021 International Conference on Autonomous Unmanned Systems (ICAUS 2021). Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9492-9_172.
Pełny tekst źródłaGuo, Lan, Weifeng Chen, Yang Cong, and Xuechun Yan. "A Robust MOR-Based Secure Fusion Strategy Against Byzantine Attack in Cooperative Spectrum Sensing." In Communications in Computer and Information Science. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-3581-9_6.
Pełny tekst źródłaHancock, James F. "Spice trade in the dark ages of Europe." In Spices, scents and silk: catalysts of world trade. CABI, 2021. http://dx.doi.org/10.1079/9781789249743.0012.
Pełny tekst źródłaFiat, Amos, Jared Saia, and Maxwell Young. "Making Chord Robust to Byzantine Attacks." In Algorithms – ESA 2005. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11561071_71.
Pełny tekst źródłaStreszczenia konferencji na temat "Byzantine attack"
Alyahya, Aren, David Tipper, and Amy Babay. "Availability Analysis of Network-Attack-Resilient Byzantine Fault Tolerant Systems." In 2024 43rd International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2024. https://doi.org/10.1109/srds64841.2024.00014.
Pełny tekst źródłaShen, Gang, Zhiqiang Fu, and Shaohua Liu. "EFLSS: An Efficient Federated Learning Security Scheme in Byzantine Attack Scenarios." In 2024 IEEE Smart World Congress (SWC). IEEE, 2024. https://doi.org/10.1109/swc62898.2024.00148.
Pełny tekst źródłaDewi, Ayu Oktaviani, Dyonisius Dony Ariananda, and Sigit Basuki Wibowo. "Byzantine Attack Identification using Graph Signal Processing in Cooperative Spectrum Sensing." In 2024 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT). IEEE, 2024. https://doi.org/10.1109/comnetsat63286.2024.10862364.
Pełny tekst źródłaAlyahya, Aren. "PhD Forum: Challenges of Availability and Cost Assessments for Network-Attack-Resilient Byzantine Systems." In 2024 43rd International Symposium on Reliable Distributed Systems (SRDS). IEEE, 2024. https://doi.org/10.1109/srds64841.2024.00040.
Pełny tekst źródłaD, Gopinath, N. Karthikeyan, Yashoda M B, and K. K. Savitha. "Machine Learning Based Secured Reliable Routing Protocol to Predict and Prevent Byzantine Attack in MANET." In 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, 2024. http://dx.doi.org/10.1109/icesc60852.2024.10690060.
Pełny tekst źródłaJahan Mouri, Israt, Muhammad Ridowant, and Muhammad Abdullah Adnan. "XGDFed: Exposing Vulnerability in Byzantine Robust Federated Binary Classifiers with Novel Aggregation-Agnostic Model Poisoning Attack." In 2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2024. http://dx.doi.org/10.1109/compsac61105.2024.00138.
Pełny tekst źródłaLi, Yunlong, Jun Wu, Zhaoyang Qiu, et al. "Cross-Validation-Based SVM for Cooperative Spectrum Sensing Against Probabilistic Byzantine Attack in Cognitive Wireless Sensor Networks." In 2025 10th International Conference on Computer and Communication System (ICCCS). IEEE, 2025. https://doi.org/10.1109/icccs65393.2025.11069740.
Pełny tekst źródłaLou, YiFan, Jun Wu, Yunlong Li, Jiabao Yu, Zhiguang Yang, and Ye Jin. "Parameter Selection of Support Vector Machines for Cooperative Spectrum Sensing Against Probabilistic Byzantine Attack in Cognitive Wireless Sensor Networks." In 2025 10th International Conference on Computer and Communication System (ICCCS). IEEE, 2025. https://doi.org/10.1109/icccs65393.2025.11069750.
Pełny tekst źródłaYuan, Liwei, Hideaki Ishii, and Yaonan Wang. "Robust Average Consensus under Byzantine Attacks." In 2024 IEEE 63rd Conference on Decision and Control (CDC). IEEE, 2024. https://doi.org/10.1109/cdc56724.2024.10886555.
Pełny tekst źródłaPavloff, Ulysse, Yackolley Amoussou-Guenou, and Sara Tucci-Piergiovanni. "Byzantine Attacks Exploiting Penalties in Ethereum PoS." In 2024 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2024. http://dx.doi.org/10.1109/dsn58291.2024.00020.
Pełny tekst źródła