no code implementations • 12 Jun 2019 • Qi Zhang, Carla Seatzu, Zhiwu Li, Alessandro Giua
The aim of the attacker is that of altering the state estimation of the operator.
Cryptography and Security Formal Languages and Automata Theory