Cited By
View all- Zhao XRoy ABanerjee ASrinivasan KKim YKim JKoushanfar FRasmussen K(2024)Fewer Demands, More Chances: Active Eavesdropping in MU-MIMO SystemsProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656136(162-173)Online publication date: 27-May-2024
- Lyu XLi SWang NLi TChen DChen Y(2024)Adversarial Attacks on Federated Learning Revisited: a Client-Selection Perspective2024 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS62487.2024.10735606(1-9)Online publication date: 30-Sep-2024
- Meng YZhu HShen XMeng YZhu HShen X(2022)Privacy Breaches and Countermeasures at Terminal Device LayerSecurity in Smart Home Networks10.1007/978-3-031-24185-7_3(37-75)Online publication date: 1-Dec-2022
- Show More Cited By