Presentation Information

[B-11-30]Vulnerable Node Detection Method for Fake-type CPA of ICN using GCN

〇Yui Ueno1, Noriaki Kamiyama1 (1. Ritsumeikan Univ.)

Keywords:

Information-Centric Networking,content poisoning attack,graph convolusional neural network

Password required to view