Guaranteeing spoof-resilient multi-robot networks
暂无分享,去创建一个
[1] Swarun Kumar,et al. Adaptive communication in multi-robot systems using directionality of signal strength , 2015, Int. J. Robotics Res..
[2] Swarun Kumar,et al. Accurate indoor localization with zero start-up cost , 2014, MobiCom.
[3] Swarun Kumar,et al. LTE radio analytics made easy and accessible , 2014 .
[4] Yih-Chun Hu,et al. Lightweight source authentication and path validation , 2014, SIGCOMM.
[5] Jie Yang,et al. Practical user authentication leveraging channel state information (CSI) , 2014, AsiaCCS.
[6] JooSeok Song,et al. A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks , 2014, 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS).
[7] Yue Liu,et al. The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities , 2014, IEEE Transactions on Mobile Computing.
[8] Candice King,et al. Fundamentals of wireless communications , 2013, 2014 67th Annual Conference for Protective Relay Engineers.
[9] George J. Pappas,et al. Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.
[10] Allan Tomlinson,et al. Modelling malicious entities in a robotic swarm , 2013, 2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC).
[11] Jie Xiong,et al. SecureArray: improving wifi security with fine-grained physical-layer information , 2013, MobiCom.
[12] Swarun Kumar,et al. Interference alignment by motion , 2013, MobiCom.
[13] Jue Wang,et al. Dude, where's my card?: RFID positioning that works with multipath and non-line of sight , 2013, SIGCOMM.
[14] Ting Wang,et al. Analysis on perfect location spoofing attacks using beamforming , 2013, 2013 Proceedings IEEE INFOCOM.
[15] Ayman I. Kayssi,et al. Malicious Node Detection in Wireless Sensor Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.
[16] Mehrzad Malmirchegini,et al. On the Spatial Predictability of Communication Channels , 2012, IEEE Transactions on Wireless Communications.
[17] Maxim Likhachev,et al. Planning for landing site selection in the aerial supply delivery , 2011, 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[18] Michalis Faloutsos,et al. Coping with packet replay attacks in wireless networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[19] David Wetherall,et al. Tool release: gathering 802.11n traces with channel state information , 2011, CCRV.
[20] Peter Druschel,et al. Peer-to-peer systems , 2010, Commun. ACM.
[21] Allan Tomlinson,et al. Threats to the Swarm: Security Considerations for Swarm Robotics , 2009 .
[22] M. Goodrich,et al. UAV intelligent path planning for Wilderness Search and Rescue , 2009, 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[23] Mehran Mesbahi,et al. Identification and Infiltration in Consensus-type Networks* *This work has been supported by AFOSR FA9550-09-1-0091. , 2009 .
[24] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[25] Mac Schwager,et al. Optimal coverage for multiple hovering robots with downward facing cameras , 2009, 2009 IEEE International Conference on Robotics and Automation.
[26] Christian Wietfeld,et al. AirShield: A system-of-systems MUAV remote sensing architecture for disaster response , 2009, 2009 3rd Annual IEEE Systems Conference.
[27] Emilio Frazzoli,et al. Adaptive and Distributed Algorithms for Vehicle Routing in a Stochastic and Dynamic Environment , 2009, IEEE Transactions on Automatic Control.
[28] Mac Schwager,et al. Decentralized, Adaptive Coverage Control for Networked Robots , 2009, Int. J. Robotics Res..
[29] Xin Liu,et al. Passport: Secure and Adoptable Source Authentication , 2008, NSDI.
[30] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[31] Eylem Ekici,et al. A Localization-Based Anti-Sensor Network System , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[32] Timothy W. McLain,et al. Decentralized Cooperative Aerial Surveillance Using Fixed-Wing Miniature UAVs , 2006, Proceedings of the IEEE.
[33] D. Shen,et al. Fundamentals of Wireless Communications , 2006 .
[34] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[35] Andreas F. Molisch,et al. Wireless Communications , 2005 .
[36] Richard M. Murray,et al. Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.
[37] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[38] Antonio Alfredo Ferreira Loureiro,et al. Malicious node detection in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[39] Houcem Gazzah,et al. Directive antenna arrays for 3D source localization , 2003, 2003 4th IEEE Workshop on Signal Processing Advances in Wireless Communications - SPAWC 2003 (IEEE Cat. No.03EX689).
[40] F. Bullo,et al. Coverage control for mobile sensing networks , 2002, IEEE Transactions on Robotics and Automation.
[41] L. Parker. Distributed Algorithms for Multi-Robot Observation of Multiple Moving Targets , 2002, Auton. Robots.
[42] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[43] Monson H. Hayes,et al. Statistical Digital Signal Processing and Modeling , 1996 .
[44] Armin W. Doerry,et al. Synthetic Aperture Radar , 1992, Inverse Synthetic Aperture Radar Imaging with MATLAB® Algorithms.
[45] Helmut Klausing,et al. Feasibility of a Synthetic Aperture Radar with Rotating Antennas (ROSAR) , 1989, 1989 19th European Microwave Conference.
[46] Petre Stoica,et al. MUSIC, maximum likelihood, and Cramer-Rao bound , 1989, IEEE Transactions on Acoustics, Speech, and Signal Processing.
[47] Gilbert Laporte,et al. Solving a Family of Multi-Depot Vehicle Routing and Location-Routing Problems , 1988, Transp. Sci..
[48] A. Field,et al. Communications , 1963, The Journal of Asian Studies.
[49] Divya Divya,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2016 .
[50] Jie Yang,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[51] Emilio Frazzoli,et al. Distributed and Adaptive Algorithms for Vehicle Routing in a Stochastic and Dynamic Environment , 2009, ArXiv.
[52] Tom Fawcett,et al. ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .
[53] Houcem Gazzah,et al. Cramer-Rao bounds for antenna array design , 2006, IEEE Transactions on Signal Processing.
[54] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[55] D. Bertsekas,et al. Introduction to Probability , 2002 .
[56] Michael D. Zoltowski,et al. Signal Subspace Techniques for Source Localization with Circular Sensor Arrays , 1994 .