Article thumbnail

Learning Requirements for Stealth Attacks

By K. Sun, I. Esnaola, A. M. Tulino and H. Vincent Poor
Topics: data injection attacks, information theory, random matrix theory, stealth attacks
Publisher: 'Institute of Electrical and Electronics Engineers (IEEE)'
Year: 2019
DOI identifier: 10.1109/ICASSP.2019.8682919
OAI identifier: oai:www.iris.unina.it:11588/776610
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://hdl.handle.net/11588/77... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.