Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Byzantine attack.

Artykuły w czasopismach na temat „Byzantine attack”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Byzantine attack”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Yang, Xiong, Wang, and Zhang. "Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks." Sensors 19, no. 15 (2019): 3436. http://dx.doi.org/10.3390/s19153436.

Pełny tekst źródła
Streszczenie:
Herein, the problem of target tracking in wireless sensor networks (WSNs) is investigated in the presence of Byzantine attacks. More specifically, we analyze the impact of Byzantine attacks on the performance of a tracking system. First, under the condition of jointly estimating the target state and the attack parameters, the posterior Cramer–Rao lower bound (PCRLB) is calculated. Then, from the perspective of attackers, we define the optimal Byzantine attack and theoretically find a way to achieve such an attack with minimal cost. When the attacked nodes are correctly identified by the fusion
Style APA, Harvard, Vancouver, ISO itp.
2

Pashkin, Nikolai G. "Aims of the Byzantine Attack on Gallipoli in 1410." Античная древность и средние века 48 (2020): 156–71. http://dx.doi.org/10.15826/adsv.2020.48.010.

Pełny tekst źródła
Streszczenie:
This research suggests an interpretation of the reasons behind the Byzantine attack on the Turkish fort of Gallipoli in spring 1410. The citadel that controlled Dardanelles was attacked by a squadron of eight ships. This operation is considered not successful. However, there are reasons to consider that initially Greeks did not plan to take the town. The search for the proofs should be in the sphere of international relations. In the period in question, the Byzantine policy was influenced by contradictions between Venice and Hungarian king Sigismund of Luxembourg concerning Dalmatia. Their int
Style APA, Harvard, Vancouver, ISO itp.
3

Nasir, Muhammad, and Ananda Maiti. "Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things." Machines 12, no. 3 (2024): 205. http://dx.doi.org/10.3390/machines12030205.

Pełny tekst źródła
Streszczenie:
In this paper, an adaptive and resilient consensus control mechanism for multi-robot systems under Byzantine attack, based on sliding mode control, is proposed. The primary aim of the article is to develop a finite-time consensus control strategy even in the presence of a Byzantine attack. In the start, a finite-time consensus control mechanism is proposed to identify the essential conditions required for ensuring consensus accuracy in multi-robot systems, even when faced with Byzantine attacks using Lyapunov theory. Subsequently, a sliding mode control is combined with an adaptive technique f
Style APA, Harvard, Vancouver, ISO itp.
4

Liu, Yuchen, Chen Chen, Lingjuan Lyu, Yaochu Jin, and Gang Chen. "Exploit Gradient Skewness to Circumvent Byzantine Defenses for Federated Learning." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 18 (2025): 19024–32. https://doi.org/10.1609/aaai.v39i18.34094.

Pełny tekst źródła
Streszczenie:
Federated Learning (FL) is notorious for its vulnerability to Byzantine attacks. Most current Byzantine defenses share a common inductive bias: among all the gradients, the densely distributed ones are more likely to be honest. However, such a bias is a poison to Byzantine robustness due to a newly discovered phenomenon in this paper -- gradient skew. We discover that a group of densely distributed honest gradients skew away from the optimal gradient (the average of honest gradients) due to heterogeneous data. This gradient skew phenomenon allows Byzantine gradients to hide within the densely
Style APA, Harvard, Vancouver, ISO itp.
5

Wang, Xiaoxue, Hongqi Zhang, Anas Bilal, Haixia Long, and Xiaowen Liu. "WGM-dSAGA: Federated Learning Strategies with Byzantine Robustness Based on Weighted Geometric Median." Electronics 12, no. 5 (2023): 1190. http://dx.doi.org/10.3390/electronics12051190.

Pełny tekst źródła
Streszczenie:
Federated learning techniques accomplish federated modeling and share global models without sharing data. Federated learning offers a good answer to complex data and privacy security issues. Although there are many ways to target federated learning, Byzantine attacks are the ones we concentrate on. Byzantine attacks primarily impede learning by tampering with the local model parameters provided by a client to the master node throughout the federation learning process, leading to a final global model that diverges from the optimal solution. To address this problem, we combine aggregation rules
Style APA, Harvard, Vancouver, ISO itp.
6

Amir, Y., B. Coan, J. Kirsch, and J. Lane. "Prime: Byzantine Replication under Attack." IEEE Transactions on Dependable and Secure Computing 8, no. 4 (2011): 564–77. http://dx.doi.org/10.1109/tdsc.2010.70.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Medhi, Jishu K., Rui Liu, Qianlong Wang, and Xuhui Chen. "Robust Multiagent Reinforcement Learning for UAV Systems: Countering Byzantine Attacks." Information 14, no. 11 (2023): 623. http://dx.doi.org/10.3390/info14110623.

Pełny tekst źródła
Streszczenie:
Multiple unmanned aerial vehicle (multi-UAV) systems have gained significant attention in applications, such as aerial surveillance and search and rescue missions. With the recent development of state-of-the-art multiagent reinforcement learning (MARL) algorithms, it is possible to train multi-UAV systems in collaborative and competitive environments. However, the inherent vulnerabilities of multiagent systems pose significant privacy and security risks when deploying general and conventional MARL algorithms. The presence of even a single Byzantine adversary within the system can severely degr
Style APA, Harvard, Vancouver, ISO itp.
8

Wan, Fangyi, Ting Ma, Yi Hua, Bin Liao, and Xinlin Qing. "Secure distributed estimation under Byzantine attack and manipulation attack." Engineering Applications of Artificial Intelligence 116 (November 2022): 105384. http://dx.doi.org/10.1016/j.engappai.2022.105384.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Wang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–41. https://doi.org/10.1145/3700422.

Pełny tekst źródła
Streszczenie:
Byzantine-robust Federated Learning (FL) aims to counter malicious clients and train an accurate global model while maintaining an extremely low attack success rate. Most existing systems, however, are only robust when most of the clients are honest. FLTrust (NDSS '21) and Zeno++ (ICML '20) do not make such an honest majority assumption but can only be applied to scenarios where the server is provided with an auxiliary dataset used to filter malicious updates. FLAME (USENIX '22) and EIFFeL (CCS '22) maintain the semi-honest majority assumption to guarantee robustness and the confidentiality of
Style APA, Harvard, Vancouver, ISO itp.
10

Wang, Rui, Xingkai Wang, Huanhuan Chen, et al. "MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering." ACM SIGMETRICS Performance Evaluation Review 53, no. 1 (2025): 25–27. https://doi.org/10.1145/3744970.3727296.

Pełny tekst źródła
Streszczenie:
Byzantine-robust Federated Learning (FL) aims to counter malicious clients and train an accurate global model while maintaining an extremely low attack success rate. Most existing systems, however, are only robust when most of the clients are honest. FLTrust (NDSS '21) and Zeno++ (ICML '20) do not make such an honest majority assumption but can only be applied to scenarios where the server is provided with an auxiliary dataset used to filter malicious updates. FLAME (USENIX '22) and EIFFeL (CCS '22) maintain the semi-honest majority assumption to guarantee robustness and the confidentiality of
Style APA, Harvard, Vancouver, ISO itp.
11

Salama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.

Pełny tekst źródła
Streszczenie:
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attac
Style APA, Harvard, Vancouver, ISO itp.
12

Muhamet Qerimi. "Durres During The First Norman Attack 1081-1085." Journal of Namibian Studies : History Politics Culture 36 (October 3, 2023): 721–35. http://dx.doi.org/10.59670/jns.v36i.4997.

Pełny tekst źródła
Streszczenie:
Following the Norman conquest of Byzantine Italy and Saracen Sicily, Robert Guiscard took the initiative to conquer the Byzantine Empire in 1081. Robert Guiscard set out from Italy for the island of Corfu, which he soon conquered. After landing, he received military reinforcements from Italy, and attacks began on the city of Durres, the main port on the Adriatic. The city was well protected on a long, narrow peninsula running parallel to the coast but separated by swamps. Guiscard brought his army to the peninsula and set up camp outside the city walls, but the Norman fleet sailing towards Dur
Style APA, Harvard, Vancouver, ISO itp.
13

Avzhi, Zhasim. "Relatıons wıth Byzantıne Empıre Durıng The Prophet’s Tıme (Pbuh)." Iasaýı ýnıversıtetіnіń habarshysy 127, no. 1 (2023): 494–506. http://dx.doi.org/10.47526/2023-1/2664-0686.38.

Pełny tekst źródła
Streszczenie:
The period of Muhammad [pbuh] is the most important time period of whole 15-century Islamic history. It is because his sayings and habits had become a source of influence for later periods. As being the head of state of Islam based in Madina, his relations with the two super power states of the world at that time, Sasanids and Byzantines are substantial examples. The north side of the Arabian peninsula, at the time Muhammad [pbuh] was preaching Islam to the people of Macca, were hosting a power struggle between Sasanids and Byzantines. In this time, the polytheist heathen people of Macca were
Style APA, Harvard, Vancouver, ISO itp.
14

Zhang, Zhongjian, Mengmei Zhang, Xiao Wang, et al. "Rethinking Byzantine Robustness in Federated Recommendation from Sparse Aggregation Perspective." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 12 (2025): 13331–38. https://doi.org/10.1609/aaai.v39i12.33455.

Pełny tekst źródła
Streszczenie:
To preserve user privacy in recommender systems, federated recommendation (FR) based on federated learning (FL) emerges, keeping the personal data on the local client and updating a model collaboratively. Unlike FL, FR has a unique sparse aggregation mechanism, where the embedding of each item is updated by only partial clients, instead of full clients in a dense aggregation of general FL. Recently, as an essential principle of FL, model security has received increasing attention, especially for Byzantine attacks, where malicious clients can send arbitrary updates. The problem of exploring the
Style APA, Harvard, Vancouver, ISO itp.
15

ABORISADE, D. O., A. S. SODIYA, A. A. ODUMOSU, O. Y. ALOWOSILE, and A. A. ADEDEJI. "A SURVIVABLE DISTRIBUTED DATABASE AGAINST BYZANTINE FAILURE." Journal of Natural Sciences Engineering and Technology 15, no. 2 (2017): 61–72. http://dx.doi.org/10.51406/jnset.v15i2.1684.

Pełny tekst źródła
Streszczenie:
Distributed Database Systems have been very useful technologies in making a wide range of information available to users across the World. However, there are now growing security concerns, arising from the use of distributed systems, particularly the ones attached to critical systems. More than ever before, data in distributed databases are more susceptible to attacks, failures or accidents owing to advanced knowledge explosions in network and database technologies. The imperfection of the existing security mechanisms coupled with the heightened and growing concerns for intrusion, attack, comp
Style APA, Harvard, Vancouver, ISO itp.
16

Kim, Woocheol, and Hyuk Lim. "FedCC: Federated Learning with Consensus Confirmation for Byzantine Attack Resistance (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 11 (2022): 12981–82. http://dx.doi.org/10.1609/aaai.v36i11.21627.

Pełny tekst źródła
Streszczenie:
In federated learning (FL), a server determines a global learning model by aggregating the local learning models of clients, and the determined global model is broadcast to all the clients. However, the global learning model can significantly deteriorate if a Byzantine attacker transmits malicious learning models trained with incorrectly labeled data. We propose a Byzantine-robust FL algorithm that, by employing a consensus confirmation method, can reduce the success probability of Byzantine attacks. After aggregating the local models from clients, the proposed FL server validates the global m
Style APA, Harvard, Vancouver, ISO itp.
17

Wang, Jingyao, Xingming Deng, Jinghua Guo, and Zeqin Zeng. "Resilient Consensus Control for Multi-Agent Systems: A Comparative Survey." Sensors 23, no. 6 (2023): 2904. http://dx.doi.org/10.3390/s23062904.

Pełny tekst źródła
Streszczenie:
Due to the openness of communication network and the complexity of system structures, multi-agent systems are vulnerable to malicious network attacks, which can cause intense instability to these systems. This article provides a survey of state-of-the-art results of network attacks on multi-agent systems. Recent advances on three types of attacks, i.e., those on DoS attacks, spoofing attacks and Byzantine attacks, the three main network attacks, are reviewed. Their attack mechanisms are introduced, and the attack model and the resilient consensus control structure are discussed, respectively,
Style APA, Harvard, Vancouver, ISO itp.
18

Pejušković, Vojislav. "Constantinople in imperial ideology of Stefan Dušan." Zbornik radova Filozofskog fakulteta u Pristini 52, no. 2 (2022): 163–75. http://dx.doi.org/10.5937/zrffp52-36444.

Pełny tekst źródła
Streszczenie:
The centuries-old expansion of the Serbian state at the expense of Byzantium received its epilogue with the rule of Stefan Dušan. The Serbian king managed to use the opportunity provided by the Roman civil war of 1341-1347, manoeuvring between two warring houses, Kantakouzenos and Palaiologos. It was the weakening of both Byzantium and Bulgaria that gave him the opportunity to, by crowning himself emperor of the Serbs and Romans, plan a possible attack on Constantinople, which would absolutely justify the title he had held since 1345. Byzantine sources testify in their own way about Dušan's ne
Style APA, Harvard, Vancouver, ISO itp.
19

Wang, Huijian, Xiao Liu, and Jining Chen. "RVR Blockchain Consensus: A Verifiable, Weighted-Random, Byzantine-Tolerant Framework for Smart Grid Energy Trading." Computers 14, no. 6 (2025): 232. https://doi.org/10.3390/computers14060232.

Pełny tekst źródła
Streszczenie:
Blockchain technology empowers decentralized transactions in smart grids, but existing consensus algorithms face efficiency and security bottlenecks under Byzantine attacks. This article proposes the RVR consensus algorithm, which innovatively integrates dynamic reputation evaluation, verifiable random function (VRF), and a weight-driven probability election mechanism to achieve (1) behavior-aware dynamic adjustment of reputation weights and (2) manipulation-resistant random leader election via VRF. Experimental verification shows that under a silence attack, the maximum latency is reduced by
Style APA, Harvard, Vancouver, ISO itp.
20

Prabhakar, Anjana, and Tricha Anjali. "Gray Hole Attack as a Byzantine Attack in a Wireless Multi-Hop Network." Journal of Applied Security Research 15, no. 1 (2019): 116–45. http://dx.doi.org/10.1080/19361610.2019.1669988.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
21

Menelaou, Iakovos. "Byzantine Satire: The Background in the Timarion." Hiperboreea 4, no. 2 (2017): 53–66. http://dx.doi.org/10.5325/hiperboreea.4.2.0053.

Pełny tekst źródła
Streszczenie:
Abstract In this paper, I examine the twelfth century Byzantine satire Timarion. I seek to analyse the background of the work, through a focus on the plot and characters, the classical sources that influenced the Byzantine author and the issues of date and authorship which should be seen in relation to the targets of his attack. While there is no certainty about the identity of the author, the Timarion was written, probably, by a learned author who had knowledge of classical authors and medical theories of his era. This is obvious in the way he embodies these traditions in his satire. Similarl
Style APA, Harvard, Vancouver, ISO itp.
22

B.Dhakde, Apeksha, and Sonali U. Nimbhorkar Sonali.U.Nimbhorkar. "Distributed Detection Methods for Byzantine Attack in Tree Topology." International Journal of Computer Applications 90, no. 18 (2014): 1–4. http://dx.doi.org/10.5120/15817-4238.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
23

Agrawal, Neha, Krishna Kumar, and Neelam Joshi. "Performance Evaluation of Byzantine Rushing Attack in ADHOC Network." International Journal of Computer Applications 123, no. 6 (2015): 1–4. http://dx.doi.org/10.5120/ijca2015905339.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
24

Wu, Jun, Pei Li, Yang Chen, et al. "Analysis of Byzantine Attack Strategy for Cooperative Spectrum Sensing." IEEE Communications Letters 24, no. 8 (2020): 1631–35. http://dx.doi.org/10.1109/lcomm.2020.2990869.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Wu, Jun, Tianle Liu, and Rui Zhao. "Beta Distribution Function for Cooperative Spectrum Sensing against Byzantine Attack in Cognitive Wireless Sensor Networks." Electronics 13, no. 17 (2024): 3386. http://dx.doi.org/10.3390/electronics13173386.

Pełny tekst źródła
Streszczenie:
In order to explore more spectrum resources to support sensors and their related applications, cognitive wireless sensor networks (CWSNs) have emerged to identify available channels being underutilized by the primary user (PU). To improve the detection accuracy of the PU signal, cooperative spectrum sensing (CSS) among sensor paradigms is proposed to make a global decision about the PU status for CWSNs. However, CSS is susceptible to Byzantine attacks from malicious sensor nodes due to its open nature, resulting in wastage of spectrum resources or causing harmful interference to PUs. To suppre
Style APA, Harvard, Vancouver, ISO itp.
26

Agrawal, Neha, Krishna Kumar, and Neelam Joshi. "Implemented and Evaluated the Byzantine Attack with the Aid of Rushing Attack in Manet." International Journal of Computer Applications 130, no. 6 (2015): 6–11. http://dx.doi.org/10.5120/ijca2015906621.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
27

Hanrahan-Shirley, Jack. "Tractus Errores Graecorum: Polemics of the Latin Patriarchate of Constantinople against the Greeks." Athens Journal of History 10, no. 2 (2024): 113–32. http://dx.doi.org/10.30958/ajhis.10-2-3.

Pełny tekst źródła
Streszczenie:
This paper examines the Latin text entitled Tractus Errores Graecorum: De Processione Spiritus Sancti. De Animabus Defunctorum. De Azymis Et Fermentato, De Obedientia Romanae Ecclesiae, most probably written and published in 1252 in Constantinople, attributed to the deacon Pantaleone. Attention will be specifically given to the argumentation utilized by Pantaleone to attack the theological and liturgical positions advocated for and defended by his Byzantine opponents. This paper is the first examination of the text by modern English-language scholarship. The analysis of the Tractus Errores Gra
Style APA, Harvard, Vancouver, ISO itp.
28

Cheng, Chien-Fu, Jerry Chun-Wei Lin, Gautam Srivastava, and Chu-Chiao Hsu. "Reaching Consensus with Byzantine Faulty Controllers in Software-Defined Networks." Wireless Communications and Mobile Computing 2021 (April 12, 2021): 1–9. http://dx.doi.org/10.1155/2021/6662175.

Pełny tekst źródła
Streszczenie:
The combination of the Internet of Things (IoT) and Cloud computing are both popular applications that are based on the Internet. However, the traditional networking structure can no longer support the transmission of the huge number of packets required by cloud computing and IoT. Therefore, a new-generation architecture, software-defined networking (SDN), came into being. The new-generation SDN can control routing through software, making flexible and convenient management a key feature of SDN. However, attacks and threats are prevalent in today’s networking environment. When an SDN controlle
Style APA, Harvard, Vancouver, ISO itp.
29

Platt, Moritz, and Peter McBurney. "Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance." Algorithms 16, no. 1 (2023): 34. http://dx.doi.org/10.3390/a16010034.

Pełny tekst źródła
Streszczenie:
Consensus algorithms are applied in the context of distributed computer systems to improve their fault tolerance. The explosive development of distributed ledger technology following the proposal of “Bitcoin” led to a sharp increase in research activity in this area. Specifically, public and permissionless networks require robust leader selection strategies resistant to Sybil attacks in which malicious attackers present bogus identities to induce byzantine faults. Our goal is to analyse the entire breadth of works in this area systematically, thereby uncovering trends and research directions r
Style APA, Harvard, Vancouver, ISO itp.
30

Krishnamohan, Theviyanthan. "IMPROVING BYZANTINE FAULT TOLERANCE IN SWARM ROBOTICS COLLECTIVE DECISION-MAKING SCENARIO VIA A NEW BLOCKCHAIN CONSENSUS ALGORITHM." ICTACT Journal on Soft Computing 13, no. 4 (2023): 3027–33. http://dx.doi.org/10.21917/ijsc.2023.0426.

Pełny tekst źródła
Streszczenie:
Swarm robotics applies concepts of swarm intelligence to robotics. Discrete consensus achievement is one of the major behaviors found in swarm robotics. Various algorithms have been developed for discrete consensus achievement. However, existing discrete consensus achievement algorithms are vulnerable to Byzantine robots. Blockchain has been successfully used to mitigate the negative effect of Byzantine robots. Nevertheless, since the blockchain solution uses the Proof-of-Work blockchain consensus algorithm, it is vulnerable to the 51% attack. Besides, the swarm also takes longer to achieve co
Style APA, Harvard, Vancouver, ISO itp.
31

Wu, Jun, Yue Yu, Hancheng Zhu, Tiecheng Song, and Jing Hu. "Cost-Benefit Tradeoff of Byzantine Attack in Cooperative Spectrum Sensing." IEEE Systems Journal 14, no. 2 (2020): 2532–43. http://dx.doi.org/10.1109/jsyst.2019.2952395.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Sarmah, Rupam, Amar Taggu, and Ningrinla Marchang. "Detecting Byzantine attack in cognitive radio networks using machine learning." Wireless Networks 26, no. 8 (2020): 5939–50. http://dx.doi.org/10.1007/s11276-020-02398-w.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Zhang, Linyuan, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, and Jinlong Wang. "Byzantine Attack and Defense in Cognitive Radio Networks: A Survey." IEEE Communications Surveys & Tutorials 17, no. 3 (2015): 1342–63. http://dx.doi.org/10.1109/comst.2015.2422735.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

Makani, Ruchi, and Busi V. Ramana Reddy. "Performance Evaluation of Cognitive Internet on Things Under Routing Attacks." International Journal of Sensors, Wireless Communications and Control 10, no. 1 (2020): 15–24. http://dx.doi.org/10.2174/2210327909666181217122655.

Pełny tekst źródła
Streszczenie:
Background & Objective:: In past few years, Cognitive Radio (CR) paradigm has emerged as a promising and revolutionary solution to avoid problems of spectrum paucity and inefficiency in spectrum usage. Efficiently utilization of the spectrum offers high network performance. CRs are proficient to identify and adopt the unused spectrum in order to allow secondary users to occupy it without interfering the primary user’s activity. Cognitive Internet on Things (CIoT) is an integration of several technologies and communication solutions which can be effectively realized as Cognitive Radio Adhoc
Style APA, Harvard, Vancouver, ISO itp.
35

Yang, Caiyi, and Javad Ghaderi. "Byzantine-Robust Decentralized Learning via Remove-then-Clip Aggregation." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 19 (2024): 21735–43. http://dx.doi.org/10.1609/aaai.v38i19.30173.

Pełny tekst źródła
Streszczenie:
We consider decentralized learning over a network of workers with heterogeneous datasets, in the presence of Byzantine workers. Byzantine workers may transmit arbitrary or malicious values to neighboring workers, leading to degradation in overall performance. The heterogeneous nature of the training data across various workers complicates the identification and mitigation of Byzantine workers. To address this complex problem, we introduce a resilient decentralized learning approach that combines the gradient descent algorithm with a novel robust aggregator. Specifically, we propose a remove-th
Style APA, Harvard, Vancouver, ISO itp.
36

Foss, Clive. "Byzantine Malagina and the Lower Sangarius." Anatolian Studies 40 (December 1990): 161–83. http://dx.doi.org/10.2307/3642800.

Pełny tekst źródła
Streszczenie:
Malagina was a place of considerable strategic importance in the Byzantine period, from the Dark Ages until the final collapse of imperial rule in Asia Minor. Frequent mentions in the sources indicate that it was a major base, a station on the route of imperial armies to the East, and the seat of the stables from which the expeditions were supplied. It had an administration of its own, and grew in importance as the Empire shrank. Although its general location, on the Sangarius river, has never been in doubt, the site has so far failed to be convincingly identified, in spite of serious attempts
Style APA, Harvard, Vancouver, ISO itp.
37

Böhm, Marcin. "Constantine X Doukas (1059–1067) versus Uzes – about the Nomads on Boats on the Danube in 1064." Studia Ceranea 11 (December 30, 2021): 39–49. http://dx.doi.org/10.18778/2084-140x.11.02.

Pełny tekst źródła
Streszczenie:
The reign of the Doukas dynasty in 1059–1078 was a time when new threats to the Byzantine Empire emerge in Europe and Asia. One of them was the increased activity of Turkmen who were penetrating the lands belonging to the Byzantines. A manifestation of these threats was visible during the rule of Constantine X Doukas (1059–1067) in 1064. We have there an invasion of the tribe of Uzes, who crossed the Danube. They ventured so far, as the vicinity of Thessalonica and the province of Hellas, plundering everything in their path. Their actions surprised the defense of the Byzantines. This attack on
Style APA, Harvard, Vancouver, ISO itp.
38

Tomaszek, Michał Piotr. "Lombard, Bulgarians and Greeks. Prejudice and Communication in Liudprand of Cremona’s Story about his Legation to Constantinople in 968." Res Historica 57 (October 22, 2024): 141–73. https://doi.org/10.17951/rh.2024.57.141-173.

Pełny tekst źródła
Streszczenie:
This article examines work of Liudprand of Cremona, which is an account of his legation to the court of Byzantine Emperor Nicephorus II Phocas, made in 968 on behalf of western Emperor Otto I the Great. The embassy did not reach a compromise and Liudprand in his text explained its failure. The work is a vividly written, venomous attack against the emperor Nicephorus and his subjects – the Greeks. The argumentation developed in the article justifies the thesis according to which Liudprand not only called on Emperor Otto and the Lombard princes of Italy to war against Byzantium, and the papal cu
Style APA, Harvard, Vancouver, ISO itp.
39

Hong, Sangwoo, Heecheol Yang, and Jungwoo Lee. "Hierarchical Group Testing for Byzantine Attack Identification in Distributed Matrix Multiplication." IEEE Journal on Selected Areas in Communications 40, no. 3 (2022): 1013–29. http://dx.doi.org/10.1109/jsac.2022.3142364.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
40

Xu, Chentao, Qingshan Liu, and Tingwen Huang. "Resilient Penalty Function Method for Distributed Constrained Optimization under Byzantine Attack." Information Sciences 596 (June 2022): 362–79. http://dx.doi.org/10.1016/j.ins.2022.02.055.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

Gupta, Chitvan, Laxman Singh, and Rajdev Tiwari. "Wormhole attack detection techniques in ad-hoc network: A systematic review." Open Computer Science 12, no. 1 (2022): 260–88. http://dx.doi.org/10.1515/comp-2022-0245.

Pełny tekst źródła
Streszczenie:
Abstract Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different types of attacks such as blackhole attack, gray hole attack, Sybil attack, rushing attack, jellyfish attack, wormhole attack (WHA), byzantine attack, selfishness attack, and network partition attack. Out of these, worm hole attack is the most common and severe attack that substantially undermines the performance of the network and dis
Style APA, Harvard, Vancouver, ISO itp.
42

Howard-Johnston, James. "Rus and Khazars." Studia Ceranea 13 (December 30, 2023): 381–418. http://dx.doi.org/10.18778/2084-140x.13.45.

Pełny tekst źródła
Streszczenie:
The southern thrust of the Rus in the ninth–tenth centuries is to be explained not only by Viking hunger for wealth and glory, but also by the large, rapidly growing market for furs in the Caliphate. In order to reach that market, the Rus had to cross the Khazars’ sphere of influence in the steppes and wooded steppes of the Volga and Don regions. The khaganate was a great power, which presided over many client peoples. It was perhaps awareness of the potential threat posed by the Rus which prompted the Khazars to improve their northern defences in the 830s. There is clear evidence that they th
Style APA, Harvard, Vancouver, ISO itp.
43

Chen, Huifang, Lei Xie, and Congqi Shen. "Optimal Byzantine attack strategy for distributed localisation with M ‐ary quantised data." Electronics Letters 51, no. 25 (2015): 2158–60. http://dx.doi.org/10.1049/el.2015.2172.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
44

Fu, Yuanhua, and Zhiming He. "Entropy-Based Weighted Decision Combining for Collaborative Spectrum Sensing Over Byzantine Attack." IEEE Wireless Communications Letters 8, no. 6 (2019): 1528–32. http://dx.doi.org/10.1109/lwc.2019.2926087.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

He, Xiaofan, Huaiyu Dai, and Peng Ning. "A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check." IEEE Transactions on Wireless Communications 12, no. 5 (2013): 2512–23. http://dx.doi.org/10.1109/twc.2013.031313.121551.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
46

Nazário Coelho, Vitor, Rodolfo Pereira Araújo, Haroldo Gambini Santos, Wang Yong Qiang, and Igor Machado Coelho. "A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus." Future Internet 12, no. 11 (2020): 185. http://dx.doi.org/10.3390/fi12110185.

Pełny tekst źródła
Streszczenie:
Mixed-integer mathematical programming has been widely used to model and solve challenging optimization problems. One interesting feature of this technique is the ability to prove the optimality of the achieved solution, for many practical scenarios where a linear programming model can be devised. This paper explores its use to model very strong Byzantine adversaries, in the context of distributed consensus systems. In particular, we apply the proposed technique to find challenging adversarial conditions on a state-of-the-art blockchain consensus: the Neo dBFT. Neo Blockchain has been using th
Style APA, Harvard, Vancouver, ISO itp.
47

Luo, Xujiang, and Bin Tang. "Byzantine Fault-Tolerant Federated Learning Based on Trustworthy Data and Historical Information." Electronics 13, no. 8 (2024): 1540. http://dx.doi.org/10.3390/electronics13081540.

Pełny tekst źródła
Streszczenie:
Federated learning (FL) is a highly promising collaborative machine learning method that preserves privacy by enabling model training on client nodes (e.g., mobile phones, Internet-of-Things devices) without sharing raw data. However, FL is vulnerable to Byzantine nodes, which can disrupt model performance, render training ineffective, or even manipulate the model by transmitting harmful gradients. In this paper, we propose a Byzantine fault-tolerant FL algorithm called federated learning with trustworthy data and historical information (FLTH). It utilizes a small trusted training dataset at t
Style APA, Harvard, Vancouver, ISO itp.
48

Kislinger, Ewald. "Erster und zweiter Sieger. Zum Byzantinisch-Karolingischen bündnis bezüglich Bari 870-871." Zbornik radova Vizantoloskog instituta, no. 50-1 (2013): 245–58. http://dx.doi.org/10.2298/zrvi1350245k.

Pełny tekst źródła
Streszczenie:
The growth of Arab power in Southern Italy and even Dalmatia menaced the Byzantine Empire as well as Carolingian Italy and led both to an alliance in 869/870. Their attempt, however, to conquer Bari in a joint attack failed in 870 (not 869) due to a lack of coordination. An exchange of letters, which followed between Basil I and Louis II, reveals cultural and ideological alienation between christian East and West.
Style APA, Harvard, Vancouver, ISO itp.
49

Wu, Jun, and Zehao Chen. "Secure and efficient cooperative spectrum sensing under byzantine attack and imperfect reporting channel." Wireless Networks 28, no. 1 (2022): 367–80. http://dx.doi.org/10.1007/s11276-021-02853-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Zhang, Linyuan, Guoru Ding, Qihui Wu, and Fei Song. "Defending Against Byzantine Attack in Cooperative Spectrum Sensing: Defense Reference and Performance Analysis." IEEE Access 4 (2016): 4011–24. http://dx.doi.org/10.1109/access.2016.2593952.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!