E. Palomar, J. M. Estevez-Tapiador, J. C. Hernandez-Castro, and A. Ribagorda, “Security in P2P Networks: Survey and Research Directions,” Lecture Notes in Computer Science, vol. 4097, pp. 183–192, Aug. 2006, doi: 10.1007/11807964_19.
H. Li, R. Lu, and M. M. E. A. Mahmoud, “Security and privacy of machine learning assisted P2P networks,” Peer-to-Peer Networking and Applications, vol. 13, pp. 2234–2236, Jun. 2020, doi: 10.1007/s12083-020-00922-5.
P. Kairouz, H. B. McMahan, B. Avent, A. Bellet, M. Bennis, A. N. Bhagoji et al., “Advances and open problems in federated learning,” Foundations and Trends in Machine Learning, vol. 4, no. 1, pp. 1–210, Mar. 2021. doi: 10.48550/arXiv.1912.04977
E. Heilman, A. Kendler, A. Zohar, and S. Goldberg, “Eclipse attacks on Bitcoin’s peer-to-peer network,” in Proc. 24th USENIX Security Symposium, Washington, D.C., USA, Aug. 2015, pp. 129–144. [Online]. Available: https://www.usenix.org/conference/usenixsecurity15/technicalsessions/presentation/heilman
B. Biggio and F. Roli, “Wild patterns: Ten years after the rise of adversarial machine learning,” Pattern Recognition, vol. 84, pp. 317–331, 2018. doi: https://doi.org/10.1016/j.patcog.2018.07.023