An Efficient Gradient Descent Approach to Secure Localization in Resource Constrained Wireless Sensor Networks
暂无分享,去创建一个
Min Wu | Ravi Garg | Avinash L. Varna | Min Wu | Ravi Garg
[1] Rogerio A. Enríquez-Caldera,et al. Position Location Techniques and Applications , 2009 .
[2] Hisato Iwai,et al. Self-Organizing Location Estimation Method Using Received Signal Strength , 2006, IEICE Trans. Commun..
[3] B. R. Badrinath,et al. DV Based Positioning in Ad Hoc Networks , 2003, Telecommun. Syst..
[4] Vijay Kumar,et al. Distributed multi-robot task assignment and formation control , 2008, 2008 IEEE International Conference on Robotics and Automation.
[5] Daniela Rus,et al. Model-based monitoring for early warning flood detection , 2008, SenSys '08.
[6] Koen Langendoen,et al. Monte-Carlo Localization for Mobile Wireless Sensor Networks , 2006, MSN.
[7] J. Tenenbaum,et al. A global geometric framework for nonlinear dimensionality reduction. , 2000, Science.
[8] Peter J. Rousseeuw,et al. Robust Regression and Outlier Detection , 2005, Wiley Series in Probability and Statistics.
[9] Donggang Liu,et al. Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[10] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[11] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[12] Ying Zhang,et al. Localization from mere connectivity , 2003, MobiHoc '03.
[13] S. Ramanathan,et al. A survey of routing techniques for mobile communications networks , 1996, Mob. Networks Appl..
[14] Donggang Liu,et al. Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.
[15] Peter J. Rousseeuw,et al. Robust regression and outlier detection , 1987 .
[16] Vedat Coskun,et al. Wireless sensor networks for underwater survelliance systems , 2006, Ad Hoc Networks.
[17] Yih-Chun Hu,et al. Secure and precise location verification using distance bounding and simultaneous multilateration , 2009, WiSec '09.
[18] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[19] Zhang Jingjing,et al. Variable Step Size LMS Algorithm , 2012 .
[20] Srdjan Capkun,et al. Secure Location Verification with Hidden and Mobile Base Stations , 2008, IEEE Transactions on Mobile Computing.
[21] Shigeng Zhang,et al. SecMCL: A Secure Monte Carlo Localization algorithm for mobile sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[22] Richard O. Duda,et al. Use of the Hough transformation to detect lines and curves in pictures , 1972, CACM.
[23] B. R. Badrinath,et al. Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[24] Chunming Qiao,et al. Towards a Theory of Robust Localization Against Malicious Beacon Nodes , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[25] Radha Poovendran,et al. SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.
[26] Nitin H. Vaidya,et al. Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.
[27] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[28] Mani B. Srivastava,et al. Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.
[29] Paramvir Bahl,et al. RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[30] C.-C. Jay Kuo,et al. Cooperative Communications and Networking , 2010 .
[31] Sarvesh Bhardwaj,et al. ROSETTA: Robust And Secure Mobile Target Tracking In A Wireless Ad Hoc Environment , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[32] Min Wu,et al. Gradient descent approach for secure localization in resource constrained wireless sensor networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[33] Martin Mauve,et al. A survey on position-based routing in mobile ad hoc networks , 2001, IEEE Netw..
[34] Deborah Estrin,et al. Habitat monitoring with sensor networks , 2004, CACM.
[35] Xiaoqiao Meng,et al. Real-time forest fire detection with wireless sensor networks , 2005, Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005..
[36] Neal Patwari,et al. Location estimation in sensor networks. , 2005 .
[37] Thomas F. La Porta,et al. Movement-assisted sensor deployment , 2004, IEEE INFOCOM 2004.
[38] Bruce H. Krogh,et al. Energy-efficient surveillance system using wireless sensor networks , 2004, MobiSys '04.
[39] David Evans,et al. Localization for mobile sensor networks , 2004, MobiCom '04.
[40] PETER J. ROUSSEEUW,et al. Computing LTS Regression for Large Data Sets , 2005, Data Mining and Knowledge Discovery.