Distributed function calculation via linear iterations in the presence of malicious agents — Part I: Attacking the network | IEEE Conference Publication | IEEE Xplore