Detecting Byzantine attacks without clean reference

R Cao, TF Wong, T Lv, H Gao… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
We consider an amplify-and-forward relay network composed of a source, two relays, and a
destination. In this network, the two relays are untrusted in the sense that they may perform …

A coding approach to guarantee information integrity against a Byzantine relay

E Graves, TF Wong - 2013 IEEE International Symposium on …, 2013 - ieeexplore.ieee.org
This paper presents a random coding scheme with which two nodes can exchange
information with guaranteed integrity over a two-way Byzantine relay. This coding scheme is …

Detecting arbitrary attacks using continuous secured side information in wireless networks

R Cao - IEEE Access, 2017 - ieeexplore.ieee.org
This paper focuses on Byzantine attack detection for Gaussian two-hop one-way relay
network, where an amplify-and-forward relay may conduct Byzantine attacks by forwarding …

Detecting substitution attacks against non-colluding relays

R Cao, E Graves, TF Wong, T Lv - 2013 IEEE Global …, 2013 - ieeexplore.ieee.org
The goal of this paper is to obtain the channel conditions (if exist) under which substitution
attacks performed by relay node (s) in a relay network can be detected. The network model …

On Study of physical-layer attack detection for large volumes of data

R Cao, Y Lu - 2017 IEEE Second International Conference on …, 2017 - ieeexplore.ieee.org
We consider Byzantine attack detection for Gaussian two-way relay network which carries
large volumes of data. Two source nodes communicate with each other with the help of an …

Detecting Byzantine Attacks for Gaussian Two-Way Relay System

R Cao - arXiv preprint arXiv:1612.01707, 2016 - arxiv.org
This paper focuses on Byzantine attack detection for Gaussian two-way relay network. In this
network, two source nodes communicate with each other with the help of an amplify-and …

Certification codes for maliciousness detection in physical-layer network coding

E Graves, B Landers, D Greene… - MILCOM 2012-2012 …, 2012 - ieeexplore.ieee.org
The problem of two sources wanting to share information through a potentially untrustworthy
relay node is considered. The two sources transmit symbols simultaneously, and the relay …

Web for data mining applications

B Liu, Y Ma, CK Wong - Proceedings 24th Annual International …, 2000 - ieeexplore.ieee.org
The Web not only contains a huge amount of information, but also provides a powerful
infrastructure for communication and information sharing. While mining for valuable …

[图书][B] Information Integrity

E Graves - 2013 - search.proquest.com
This dissertation introduces the concept of Information Integrity, which is the detection and
possible correction of information manipulation by any intermediary node in a …

[引用][C] A physical-layer attack detection method using continuous secured side information

R Cao - arXiv preprint arXiv:1701.01590, 2017