Distributed function calculation via linear iterations in the presence of malicious agents — Part II: Overcoming malicious behavior | IEEE Conference Publication | IEEE Xplore