Security and privacy of machine learning assisted P2P networks

被引:3
|
作者
Li, Hongwei [1 ]
Lu, Rongxing [2 ]
Mahmoud, Mohamed M. E. A. [3 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[2] Univ New Brunswick, Fredericton, NB, Canada
[3] Tennessee Technol Univ, Cookeville, TN 38505 USA
关键词
D O I
10.1007/s12083-020-00922-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:2234 / 2236
页数:3
相关论文
共 50 条
  • [41] Learning by P2P bidding
    Li, Xun
    Jiang, Xue
    Yang, Yang
    ASIA-PACIFIC JOURNAL OF ACCOUNTING & ECONOMICS, 2023, 30 (01) : 96 - 119
  • [42] Toward Privacy-Preserving Shared Storage in Untrusted Blockchain P2P Networks
    Rahmadika, Sandi
    Rhee, Kyung-Hyune
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [43] Efficient privacy-preservation scheme for securing urban P2P VANET networks
    Alaya, Bechir
    EGYPTIAN INFORMATICS JOURNAL, 2021, 22 (03) : 317 - 328
  • [45] Automated P2P learning in agent-based classification networks
    Gorodetsky, Vladimir
    Karsaev, Oleg
    Samoylov, Vladimir
    Serebryakov, Sergey
    PROCEEDING OF THE 2007 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY, WORKSHOPS, 2007, : 503 - 507
  • [46] Analytical evaluation of dynamic proxy assisted mobility support in P2P networks
    Ranasinghe, Sampath N.
    Pragad, A. Dev
    Benmesbah, Lamia
    Friderikos, Vasilis
    Aghvami, Hamid
    2008 IEEE 67TH VEHICULAR TECHNOLOGY CONFERENCE-SPRING, VOLS 1-7, 2008, : 2774 - +
  • [47] DHT-assisted probabilistic exhaustive search in unstructured P2P networks
    Luo, Xucheng
    Qin, Zhiguang
    Han, Jinsong
    Chen, Hanhua
    2008 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-8, 2008, : 1213 - +
  • [48] A P2P E-commerce Related Network Security Issue: P2P Worm
    Zhang, Yejiang
    Li, Zhitang
    Hu, Zhengbing
    Tu, Hao
    Lin, Huaiqing
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 114 - 117
  • [49] Design of security functionality in P2P applications
    Park, ZW
    Lee, JH
    Kim, MK
    KORUS 2004, VOL 1, PROCEEDINGS, 2004, : 132 - 136
  • [50] Security Analysis for P2P Routing Protocols
    Fujii, Tatsuro
    Ren, Yizhi
    Hori, Yoshiaki
    Sakurai, Kouichi
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 899 - +