Trojan horse Malware that masquerades as non-malicious software.
特洛伊木马软件,经常伪装成无害软件。
2
Experimental result shows that the model can better protect non-malicious nodes and isolate bad nodes, so that the network has better robustness.
实验结果表明,该模型能有效保护非恶意节点,孤立恶意节点,使网络具有更好的健壮性。
3
There's no contradiction here: the precise one-for-one payback of the "eye-for-en-eye" principle applies to personal duels and to non-malicious property damage.