Distributed Detection in the Presence of Byzantine Attacks
暂无分享,去创建一个
[1] S.A. Kassam,et al. Robust techniques for signal processing: A survey , 1985, Proceedings of the IEEE.
[2] Pramod K. Varshney,et al. Distributed Detection and Data Fusion , 1996 .
[3] Rick S. Blum,et al. The good, bad and ugly: distributed detection of a known signal in dependent Gaussian noise , 2000, IEEE Trans. Signal Process..
[4] Peter J. Huber,et al. Robust Statistics , 2005, Wiley Series in Probability and Statistics.
[5] Zhi-Quan Luo,et al. Distributed signal processing in sensor networks , 2006 .
[6] Pramod K. Varshney,et al. Distributed detection with multiple sensors I. Fundamentals , 1997, Proc. IEEE.
[7] Rick S. Blum,et al. Distributed detection with multiple sensors I. Advanced topics , 1997, Proc. IEEE.
[8] J. Tsitsiklis. Decentralized Detection' , 1993 .
[9] Ming Dong,et al. On distributed fault-tolerant detection in wireless sensor networks , 2006, IEEE Transactions on Computers.
[10] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[11] Yunghsiang Sam Han,et al. A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[12] Birgit Pfitzmann,et al. Information-Theoretic Pseudosignatures and Byzantine Agreement for t ≥ n/3 , 2007 .
[13] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[14] P. J. Huber. A Robust Version of the Probability Ratio Test , 1965 .
[15] M. Vetterli. Distributed signal processing for sensor networks , 2005, IEEE 6th Workshop on Signal Processing Advances in Wireless Communications, 2005..
[16] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.
[17] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[18] Zhi-Quan Luo,et al. Distributed signal processing in sensor networks [from the guest Editors] , 2006, IEEE Signal Processing Magazine.
[19] Parameswaran Ramanathan,et al. Fault tolerance in collaborative sensor networks for target detection , 2004, IEEE Transactions on Computers.
[20] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[21] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[22] B. Ripley,et al. Robust Statistics , 2018, Encyclopedia of Mathematical Geosciences.
[23] Lang Tong,et al. Distributed Source Coding in the Presence of Byzantine Sensors , 2007, IEEE Transactions on Information Theory.
[24] Danny Dolev,et al. The Byzantine Generals Strike Again , 1981, J. Algorithms.