Z Teng, B Pang, C Du, Z Li - IEEE Access, 2020 - ieeexplore.ieee.org
… There will be sub attack malicious nodes and normal nodes in a relatively bad environment
… In this paper, we aim to identify malicious nodes, especially the sub attack malicious nodes …