暂无分享,去创建一个
[1] M. Mobilia. Does a single zealot affect an infinite group of voters? , 2003, Physical review letters.
[2] Marimuthu Palaniswami,et al. Distributed Real-Time IoT for Autonomous Vehicles , 2019, IEEE Transactions on Industrial Informatics.
[3] Asuman E. Ozdaglar,et al. Constrained Consensus and Optimization in Multi-Agent Networks , 2008, IEEE Transactions on Automatic Control.
[4] Tomasz Bednarz,et al. Discovery of Malicious Nodes in Wireless Sensor Networks Using Neural Predictors , 2007 .
[5] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[6] David Gesbert,et al. Adaptation, Coordination, and Distributed Resource Allocation in Interference-Limited Wireless Networks , 2007, Proceedings of the IEEE.
[7] Anna Scaglione,et al. Detection of data injection attacks in decentralized learning , 2015, 2015 49th Asilomar Conference on Signals, Systems and Computers.
[8] Ming Li,et al. Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.
[9] Anna Scaglione,et al. Data Injection Attack on Decentralized Optimization , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[10] Soung Chang Liew,et al. Deep-Reinforcement Learning Multiple Access for Heterogeneous Wireless Networks , 2017, 2018 IEEE International Conference on Communications (ICC).
[11] Danijela Cabric,et al. Distributed Wideband Sensing-Based Architecture for Unlicensed Massive IoT Communications , 2018, IEEE Transactions on Cognitive Communications and Networking.
[12] Anna Scaglione,et al. Detection and Isolation of Adversaries in Decentralized Optimization for Non-Strongly Convex Objectives , 2019, ArXiv.
[13] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[14] Shreyas Sundaram,et al. Consensus-based distributed optimization with malicious nodes , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[15] Yongqiang Wang,et al. Enabling Privacy-Preservation in Decentralized Optimization , 2019, IEEE Transactions on Control of Network Systems.
[16] Pramod K. Varshney,et al. Consensus based Detection in the Presence of Data Falsification Attacks , 2015, ArXiv.
[17] Qiang Li,et al. Detect Insider Attacks Using CNN in Decentralized Optimization , 2020, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[18] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[19] Chung-Horng Lung,et al. DDoS Attacks Detection and Mitigation in SDN Using Machine Learning , 2019, 2019 IEEE World Congress on Services (SERVICES).
[20] Sourav Patel,et al. Distributed Detection of Malicious Attacks on Consensus Algorithms with Applications in Power Networks , 2020, 2020 7th International Conference on Control, Decision and Information Technologies (CoDIT).
[21] Angelia Nedic,et al. Distributed Stochastic Subgradient Projection Algorithms for Convex Optimization , 2008, J. Optim. Theory Appl..
[22] Asuman E. Ozdaglar,et al. Distributed Subgradient Methods for Multi-Agent Optimization , 2009, IEEE Transactions on Automatic Control.
[23] Rasmus Berg Palm,et al. Prediction as a candidate for learning deep hierarchical models of data , 2012 .
[24] Qiang Li,et al. Neural Networks-Aided Insider Attack Detection for the Average Consensus Algorithm , 2020, IEEE Access.
[25] Lodovico Giaretta,et al. Gossip Learning: Off the Beaten Path , 2019, 2019 IEEE International Conference on Big Data (Big Data).
[26] John N. Tsitsiklis,et al. Problems in decentralized decision making and computation , 1984 .
[27] Anna Scaglione,et al. Detection of Data Injection Attacks on Decentralized Statistical Estimation , 2018, 2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE).
[28] Anna Scaglione,et al. A Review of Distributed Algorithms for Principal Component Analysis , 2018, Proceedings of the IEEE.
[29] Anna Scaglione,et al. Detecting and Localizing Adversarial Nodes Usig Neural Networks , 2018, 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[30] Jiming Chen,et al. Resilient Consensus with Mobile Detectors Against Malicious Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[31] Georgios B. Giannakis,et al. Monitoring and Optimization for Power Grids: A Signal Processing Perspective , 2013, IEEE Signal Processing Magazine.
[32] Abdullah Al-Dujaili,et al. AST-Based Deep Learning for Detecting Malicious PowerShell , 2018, CCS.
[33] Yitao Liu,et al. Deep Learning-Based Interval State Estimation of AC Smart Grids Against Sparse Cyber Attacks , 2018, IEEE Transactions on Industrial Informatics.
[34] B. Gharesifard,et al. Distributed Optimization Under Adversarial Nodes , 2016, IEEE Transactions on Automatic Control.
[35] Pramod K. Varshney,et al. Data Falsification Attacks on Consensus-Based Detection Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[36] Chinmay Hegde,et al. Collaborative Deep Learning in Fixed Topology Networks , 2017, NIPS.
[37] István Hegedüs,et al. Gossip learning with linear models on fully distributed data , 2011, Concurr. Comput. Pract. Exp..
[38] Abhinav Vishnu,et al. GossipGraD: Scalable Deep Learning using Gossip Communication based Asynchronous Gradient Descent , 2018, ArXiv.
[39] István Hegedüs,et al. Gossip Learning as a Decentralized Alternative to Federated Learning , 2019, DAIS.
[40] Jia Zhou,et al. A Survey of Intrusion Detection for In-Vehicle Networks , 2020, IEEE Transactions on Intelligent Transportation Systems.
[41] Monica Nicoli,et al. Federated Learning With Cooperating Devices: A Consensus Approach for Massive IoT Networks , 2019, IEEE Internet of Things Journal.
[42] Matthieu Cord,et al. GoSGD: Distributed Optimization for Deep Learning with Gossip Exchange , 2018, Neurocomputing.
[43] Anna Scaglione,et al. Data Injection Attacks in Randomized Gossiping , 2016, IEEE Transactions on Signal and Information Processing over Networks.