Artykuły w czasopismach na temat „Byzantine attack”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Byzantine attack”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Yang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (2019): 3436. http://dx.doi.org/10.3390/s19153436.
Pełny tekst źródłaPashkin, Nikolai G. "Aims of the Byzantine Attack on Gallipoli in 1410." Античная древность и средние века 48 (2020): 156–71. http://dx.doi.org/10.15826/adsv.2020.48.010.
Pełny tekst źródłaNasir, Muhammad, and Ananda Maiti. "Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things." Machines 12, no. 3 (2024): 205. http://dx.doi.org/10.3390/machines12030205.
Pełny tekst źródłaLiu, Yuchen, Chen Chen, Lingjuan Lyu, Yaochu Jin, and Gang Chen. "Exploit Gradient Skewness to Circumvent Byzantine Defenses for Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 18 (2025): 19024–32. https://doi.org/10.1609/aaai.v39i18.34094.
Pełny tekst źródłaWang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long, and Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median." Electronics 12, no. 5 (2023): 1190. http://dx.doi.org/10.3390/electronics12051190.
Pełny tekst źródłaAmir, Y., B. Coan, J. Kirsch, and J. Lane. "Prime: Byzantine Replication under Attack." IEEE Transactions on Dependable and Secure Computing 8, no. 4 (2011): 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.
Pełny tekst źródłaMedhi, Jishu K., Rui Liu, Qianlong Wang, and Xuhui Chen. "Robust Multiagent Reinforcement Learning for UAV Systems: Countering Byzantine Attacks." Information 14, no. 11 (2023): 623. http://dx.doi.org/10.3390/info14110623.
Pełny tekst źródłaWan, Fangyi, Ting Ma, Yi Hua, Bin Liao, and Xinlin Qing. "Secure distributed estimation under Byzantine attack and manipulation attack." Engineering Applications of Artificial Intelligence 116 (November 2022): 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.
Pełny tekst źródłaWang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–41. https://doi.org/10.1145/3700422.
Pełny tekst źródłaWang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." ACM SIGMETRICS Performance Evaluation Review 53, no. 1 (2025): 25–27. https://doi.org/10.1145/3744970.3727296.
Pełny tekst źródłaSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Pełny tekst źródłaMuhamet Qerimi. "Durres During The First Norman Attack 1081-1085." Journal of Namibian Studies : History Politics Culture 36 (October 3, 2023): 721–35. http://dx.doi.org/10.59670/jns.v36i.4997.
Pełny tekst źródłaAvzhi, Zhasim. "Relatıons wıth Byzantıne Empıre Durıng The Prophet’s Tıme (Pbuh)." Iasaýı ýnıversıtetіnіń habarshysy 127, no. 1 (2023): 494–506. http://dx.doi.org/10.47526/2023-1/2664-0686.38.
Pełny tekst źródłaZhang, Zhongjian, Mengmei Zhang, Xiao Wang, et al. "Rethinking Byzantine Robustness in Federated Recommendation from Sparse Aggregation Perspective." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 12 (2025): 13331–38. https://doi.org/10.1609/aaai.v39i12.33455.
Pełny tekst źródłaABORISADE, D. O., A. S. SODIYA, A. A. ODUMOSU, O. Y. ALOWOSILE, and A. A. ADEDEJI. "A SURVIVABLE DISTRIBUTED DATABASE AGAINST BYZANTINE FAILURE." Journal of Natural Sciences Engineering and Technology 15, no. 2 (2017): 61–72. http://dx.doi.org/10.51406/jnset.v15i2.1684.
Pełny tekst źródłaKim, Woocheol, and Hyuk Lim. "FedCC: Federated Learning with Consensus Confirmation for Byzantine Attack Resistance (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 11 (2022): 12981–82. http://dx.doi.org/10.1609/aaai.v36i11.21627.
Pełny tekst źródłaWang, Jingyao, Xingming Deng, Jinghua Guo, and Zeqin Zeng. "Resilient Consensus Control for Multi-Agent Systems: A Comparative Survey." Sensors 23, no. 6 (2023): 2904. http://dx.doi.org/10.3390/s23062904.
Pełny tekst źródłaPejušković, Vojislav. "Constantinople in imperial ideology of Stefan Dušan." Zbornik radova Filozofskog fakulteta u Pristini 52, no. 2 (2022): 163–75. http://dx.doi.org/10.5937/zrffp52-36444.
Pełny tekst źródłaWang, Huijian, Xiao Liu, and Jining Chen. "RVR Blockchain Consensus: A Verifiable, Weighted-Random, Byzantine-Tolerant Framework for Smart Grid Energy Trading." Computers 14, no. 6 (2025): 232. https://doi.org/10.3390/computers14060232.
Pełny tekst źródłaPrabhakar, Anjana, and Tricha Anjali. "Gray Hole Attack as a Byzantine Attack in a Wireless Multi-Hop Network." Journal of Applied Security Research 15, no. 1 (2019): 116–45. http://dx.doi.org/10.1080/19361610.2019.1669988.
Pełny tekst źródłaMenelaou, Iakovos. "Byzantine Satire: The Background in the Timarion." Hiperboreea 4, no. 2 (2017): 53–66. http://dx.doi.org/10.5325/hiperboreea.4.2.0053.
Pełny tekst źródłaB.Dhakde, Apeksha, and Sonali U. Nimbhorkar Sonali.U.Nimbhorkar. "Distributed Detection Methods for Byzantine Attack in Tree Topology." International Journal of Computer Applications 90, no. 18 (2014): 1–4. http://dx.doi.org/10.5120/15817-4238.
Pełny tekst źródłaAgrawal, Neha, Krishna Kumar, and Neelam Joshi. "Performance Evaluation of Byzantine Rushing Attack in ADHOC Network." International Journal of Computer Applications 123, no. 6 (2015): 1–4. http://dx.doi.org/10.5120/ijca2015905339.
Pełny tekst źródłaWu, Jun, Pei Li, Yang Chen, et al. "Analysis of Byzantine Attack Strategy for Cooperative Spectrum Sensing." IEEE Communications Letters 24, no. 8 (2020): 1631–35. http://dx.doi.org/10.1109/lcomm.2020.2990869.
Pełny tekst źródłaWu, Jun, Tianle Liu, and Rui Zhao. "Beta Distribution Function for Cooperative Spectrum Sensing against Byzantine Attack in Cognitive Wireless Sensor Networks." Electronics 13, no. 17 (2024): 3386. http://dx.doi.org/10.3390/electronics13173386.
Pełny tekst źródłaAgrawal, Neha, Krishna Kumar, and Neelam Joshi. "Implemented and Evaluated the Byzantine Attack with the Aid of Rushing Attack in Manet." International Journal of Computer Applications 130, no. 6 (2015): 6–11. http://dx.doi.org/10.5120/ijca2015906621.
Pełny tekst źródłaHanrahan-Shirley, Jack. "Tractus Errores Graecorum: Polemics of the Latin Patriarchate of Constantinople against the Greeks." Athens Journal of History 10, no. 2 (2024): 113–32. http://dx.doi.org/10.30958/ajhis.10-2-3.
Pełny tekst źródłaCheng, Chien-Fu, Jerry Chun-Wei Lin, Gautam Srivastava, and Chu-Chiao Hsu. "Reaching Consensus with Byzantine Faulty Controllers in Software-Defined Networks." Wireless Communications and Mobile Computing 2021 (April 12, 2021): 1–9. http://dx.doi.org/10.1155/2021/6662175.
Pełny tekst źródłaPlatt, Moritz, and Peter McBurney. "Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance." Algorithms 16, no. 1 (2023): 34. http://dx.doi.org/10.3390/a16010034.
Pełny tekst źródłaKrishnamohan, Theviyanthan. "IMPROVING BYZANTINE FAULT TOLERANCE IN SWARM ROBOTICS COLLECTIVE DECISION-MAKING SCENARIO VIA A NEW BLOCKCHAIN CONSENSUS ALGORITHM." ICTACT Journal on Soft Computing 13, no. 4 (2023): 3027–33. http://dx.doi.org/10.21917/ijsc.2023.0426.
Pełny tekst źródłaWu, Jun, Yue Yu, Hancheng Zhu, Tiecheng Song, and Jing Hu. "Cost-Benefit Tradeoff of Byzantine Attack in Cooperative Spectrum Sensing." IEEE Systems Journal 14, no. 2 (2020): 2532–43. http://dx.doi.org/10.1109/jsyst.2019.2952395.
Pełny tekst źródłaSarmah, Rupam, Amar Taggu, and Ningrinla Marchang. "Detecting Byzantine attack in cognitive radio networks using machine learning." Wireless Networks 26, no. 8 (2020): 5939–50. http://dx.doi.org/10.1007/s11276-020-02398-w.
Pełny tekst źródłaZhang, Linyuan, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, and Jinlong Wang. "Byzantine Attack and Defense in Cognitive Radio Networks: A Survey." IEEE Communications Surveys & Tutorials 17, no. 3 (2015): 1342–63. http://dx.doi.org/10.1109/comst.2015.2422735.
Pełny tekst źródłaMakani, Ruchi, and Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.
Pełny tekst źródłaYang, Caiyi, and Javad Ghaderi. "Byzantine-Robust Decentralized Learning via Remove-then-Clip Aggregation." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 19 (2024): 21735–43. http://dx.doi.org/10.1609/aaai.v38i19.30173.
Pełny tekst źródłaFoss, Clive. "Byzantine Malagina and the Lower Sangarius." Anatolian Studies 40 (December 1990): 161–83. http://dx.doi.org/10.2307/3642800.
Pełny tekst źródłaBöhm, Marcin. "Constantine X Doukas (1059–1067) versus Uzes – about the Nomads on Boats on the Danube in 1064." Studia Ceranea 11 (December 30, 2021): 39–49. http://dx.doi.org/10.18778/2084-140x.11.02.
Pełny tekst źródłaTomaszek, Michał Piotr. "Lombard, Bulgarians and Greeks. Prejudice and Communication in Liudprand of Cremona’s Story about his Legation to Constantinople in 968." Res Historica 57 (October 22, 2024): 141–73. https://doi.org/10.17951/rh.2024.57.141-173.
Pełny tekst źródłaHong, Sangwoo, Heecheol Yang, and Jungwoo Lee. "Hierarchical Group Testing for Byzantine Attack Identification in Distributed Matrix Multiplication." IEEE Journal on Selected Areas in Communications 40, no. 3 (2022): 1013–29. http://dx.doi.org/10.1109/jsac.2022.3142364.
Pełny tekst źródłaXu, Chentao, Qingshan Liu, and Tingwen Huang. "Resilient Penalty Function Method for Distributed Constrained Optimization under Byzantine Attack." Information Sciences 596 (June 2022): 362–79. http://dx.doi.org/10.1016/j.ins.2022.02.055.
Pełny tekst źródłaGupta, Chitvan, Laxman Singh, and Rajdev Tiwari. "Wormhole attack detection techniques in ad-hoc network: A systematic review." Open Computer Science 12, no. 1 (2022): 260–88. http://dx.doi.org/10.1515/comp-2022-0245.
Pełny tekst źródłaHoward-Johnston, James. "Rus and Khazars." Studia Ceranea 13 (December 30, 2023): 381–418. http://dx.doi.org/10.18778/2084-140x.13.45.
Pełny tekst źródłaChen, Huifang, Lei Xie, and Congqi Shen. "Optimal Byzantine attack strategy for distributed localisation with M ‐ary quantised data." Electronics Letters 51, no. 25 (2015): 2158–60. http://dx.doi.org/10.1049/el.2015.2172.
Pełny tekst źródłaFu, Yuanhua, and Zhiming He. "Entropy-Based Weighted Decision Combining for Collaborative Spectrum Sensing Over Byzantine Attack." IEEE Wireless Communications Letters 8, no. 6 (2019): 1528–32. http://dx.doi.org/10.1109/lwc.2019.2926087.
Pełny tekst źródłaHe, Xiaofan, Huaiyu Dai, and Peng Ning. "A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check." IEEE Transactions on Wireless Communications 12, no. 5 (2013): 2512–23. http://dx.doi.org/10.1109/twc.2013.031313.121551.
Pełny tekst źródłaNazário Coelho, Vitor, Rodolfo Pereira Araújo, Haroldo Gambini Santos, Wang Yong Qiang, and Igor Machado Coelho. "A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus." Future Internet 12, no. 11 (2020): 185. http://dx.doi.org/10.3390/fi12110185.
Pełny tekst źródłaLuo, Xujiang, and Bin Tang. "Byzantine Fault-Tolerant Federated Learning Based on Trustworthy Data and Historical Information." Electronics 13, no. 8 (2024): 1540. http://dx.doi.org/10.3390/electronics13081540.
Pełny tekst źródłaKislinger, Ewald. "Erster und zweiter Sieger. Zum Byzantinisch-Karolingischen bündnis bezüglich Bari 870-871." Zbornik radova Vizantoloskog instituta, no. 50-1 (2013): 245–58. http://dx.doi.org/10.2298/zrvi1350245k.
Pełny tekst źródłaWu, Jun, and Zehao Chen. "Secure and efficient cooperative spectrum sensing under byzantine attack and imperfect reporting channel." Wireless Networks 28, no. 1 (2022): 367–80. http://dx.doi.org/10.1007/s11276-021-02853-2.
Pełny tekst źródłaZhang, Linyuan, Guoru Ding, Qihui Wu, and Fei Song. "Defending Against Byzantine Attack in Cooperative Spectrum Sensing: Defense Reference and Performance Analysis." IEEE Access 4 (2016): 4011–24. http://dx.doi.org/10.1109/access.2016.2593952.
Pełny tekst źródła