no code implementations • 4 Aug 2020 • Fayha ALmutairy, Reem Shadid, Safwan Wshah
recent literature has proposed various detection and identification methods for FDIAs, but few studies have focused on a solution that would prevent such attacks from occurring.