Article thumbnail

Learning Requirements for Stealth Attacks

By K. Sun, I. Esnaola, A. M. Tulino and H. Vincent Poor
Topics: data injection attacks, information theory, random matrix theory, stealth attacks
Publisher: 'Institute of Electrical and Electronics Engineers (IEEE)'
Year: 2019
DOI identifier: 10.1109/ICASSP.2019.8682919
OAI identifier:
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.