2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2016
DOI: 10.1109/dasc-picom-datacom-cyberscitec.2016.67
|View full text |Cite
|
Sign up to set email alerts
|

Collusion Attack Detection in Networked Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 17 publications
0
11
0
Order By: Relevance
“…The adversary can use the compromised node to carry out malicious activities to exploit the system, such as collecting confidential information, executing sophisticated attacks, injecting false data, etc. [121]. It can also lead to various kinds of network security attacks and hence can pose a serious threat to the vehicular networks.…”
Section: Denial Of Servicementioning
confidence: 99%
“…The adversary can use the compromised node to carry out malicious activities to exploit the system, such as collecting confidential information, executing sophisticated attacks, injecting false data, etc. [121]. It can also lead to various kinds of network security attacks and hence can pose a serious threat to the vehicular networks.…”
Section: Denial Of Servicementioning
confidence: 99%
“…The traditional control system to be openly accessed through IIoT network, which poses severe threats to its security [3], [4]. In 2014, more than 30% intelligent electric meters of the top-three power supply providers in Spain exhibited serious security holes [5].…”
Section: Introductionmentioning
confidence: 99%
“…The adversary can attempt to compromise the transfer learning with negative transfer [12], [13], for example by executing a malicious computation, and changing the computation results for transfer learning. Thus, a covert adversary can launch a malicious learning with dishonest majority [14] by maliciously tuning transfer learning, resulting in transfer learning behaving badly on specific attacker-chosen inputs. Existing secure machine learning schemes are not generally designed to the setting of dishonest majority.…”
Section: Introductionmentioning
confidence: 99%