共 50 条
- [22] Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 941 - 956
- [23] Defending ML-Based Feedback Loop System Against Malicious Adversarial Inference Attacks [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2021), 2021, : 382 - 390
- [24] FLDetector: Defending Federated Learning Against Model Poisoning Attacks via Detecting Malicious Clients [J]. PROCEEDINGS OF THE 28TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2022, 2022, : 2545 - 2555
- [25] Analysis and Feasibility of Reactive Routing Protocols with Malicious Nodes in MANETs [J]. 2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 356 - 360
- [26] An Analysis on the Effect of Malicious Nodes on the Performance of LAR Protocol in MANETs [J]. INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 3, INDIA 2016, 2016, 435 : 623 - 633
- [27] Prevention of Malicious Nodes Communication in MANETs by Using Authorized Tokens [J]. COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 441 - +
- [28] Grey Model and Polynomial Regression for Identifying Malicious Nodes in MANETs [J]. 2014 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2014), 2014, : 162 - 168
- [29] A Reliable Solution against Packet Dropping Attack due to Malicious Nodes Using Fuzzy Logic in MANETs [J]. PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 178 - 181
- [30] EMAODV: TECHNIQUE TO PREVENT COLLABORATIVE ATTACKS IN MANETs [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 : 137 - 145