Channel-Based Sybil Detection in Industrial Wireless Sensor Networks: A Multi-Kernel Approach
暂无分享,去创建一个
Xuemin Shen | Michael Cheffena | Kuan Zhang | Qihao Li | Xuemin Shen | M. Cheffena | Kuan Zhang | Qihao Li
[1] Xiaohui Liang,et al. Exploiting mobile social behaviors for Sybil detection , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[2] Qi Xiong,et al. An Energy-Ratio-Based Approach for Detecting Pilot Spoofing Attack in Multiple-Antenna Systems , 2015, IEEE Transactions on Information Forensics and Security.
[3] Yue Liu,et al. The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities , 2014, IEEE Transactions on Mobile Computing.
[4] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[5] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[6] Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[7] Xuemin Shen,et al. Exploiting dispersive power gain and delay spread for sybil detection in industrial WSNs , 2016, 2016 IEEE/CIC International Conference on Communications in China (ICCC).
[8] Ivan Stojmenovic,et al. Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications , 2013, IEEE Transactions on Computers.
[9] Yung-Yu Chuang,et al. Multiple Kernel Fuzzy Clustering , 2012, IEEE Transactions on Fuzzy Systems.
[10] Richard P. Martin,et al. Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.
[11] Prateek Mittal,et al. SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection , 2013, IEEE Transactions on Information Forensics and Security.
[12] Michael Cheffena,et al. Industrial wireless communications over the millimeter wave spectrum: opportunities and challenges , 2016, IEEE Communications Magazine.
[13] Lei Li,et al. Fuzzy C-Means clustering based secure fusion strategy in collaborative spectrum sensing , 2014, 2014 IEEE International Conference on Communications (ICC).
[14] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[15] Song Guo,et al. Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce , 2015, IEEE Trans. Parallel Distributed Syst..
[16] Nello Cristianini,et al. Kernel Methods for Pattern Analysis , 2004 .
[17] C. L. Philip Chen,et al. A Multiple-Kernel Fuzzy C-Means Algorithm for Image Segmentation , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).