On Strategic Multi-Antenna Jamming in Centralized Detection Networks
暂无分享,去创建一个
Vinod Sharma | Pramod K. Varshney | V. Sriram Siddhardh Nadendla | P. Varshney | V. Sharma | V. S. S. Nadendla
[1] Pramod K. Varshney,et al. Strategic Power Allocation With Incomplete Information in the Presence of a Jammer , 2016, IEEE Transactions on Communications.
[2] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[3] Pramod K Varshney,et al. Distributed inference in wireless sensor networks , 2012, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[4] Ke Liu,et al. Decentralized Inference Over Multiple-Access Channels , 2007, IEEE Transactions on Signal Processing.
[5] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[6] M. Dufwenberg. Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.
[7] Charalampos Konstantopoulos,et al. A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.
[8] Husheng Li,et al. A denial-of-service jamming game for remote state monitoring in smart grid , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[9] Pierluigi Salvo Rossi,et al. Optimality of Received Energy in Decision Fusion Over Rayleigh Fading Diversity MAC With Non-Identical Sensors , 2012, IEEE Transactions on Signal Processing.
[10] Pramod K. Varshney,et al. On ARQ-based wireless communication systems in the presence of a strategic jammer , 2014, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[11] Pramod K. Varshney,et al. On jamming models against collaborative spectrum sensing in a simple cognitive radio network , 2010, 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers.
[12] Pramod K. Varshney,et al. Minimax games for cooperative spectrum sensing in a centralized cognitive radio network in the presence of interferers , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[13] Andrey Garnaev,et al. Fair resource allocation under an unknown jamming attack: a Bayesian game , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).
[14] Aytug Denk. Detection and jamming low probability of intercept (LPI) radars , 2006 .
[15] Brandon F. Lo. A survey of common control channel design in cognitive radio networks , 2011, Phys. Commun..
[16] Anthony Ephremides,et al. Jamming games in wireless networks with incomplete information , 2011, IEEE Communications Magazine.
[17] Darren John Bachmann,et al. Game Theoretic Analysis of Adaptive Radar Jamming , 2011, IEEE Transactions on Aerospace and Electronic Systems.
[18] Peter B. Luh,et al. The MIMO Radar and Jammer Games , 2012, IEEE Transactions on Signal Processing.
[19] Wenyuan Xu,et al. Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.
[20] Shengli Zhou,et al. PAC vs. MAC for Decentralized Detection Using Noncoherent Modulation , 2009, IEEE Transactions on Signal Processing.
[21] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[22] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[23] Ling Shi,et al. SINR-Based DoS Attack on Remote State Estimation: A Game-Theoretic Approach , 2017, IEEE Transactions on Control of Network Systems.
[24] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[25] Sennur Ulukus,et al. Mutual Information Games in Multi-user Channels with Correlated Jamming , 2006, ArXiv.
[26] Radha Poovendran,et al. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[27] Andrey Garnaev,et al. Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary’s Attack Type is Unknown , 2016, IEEE Transactions on Signal and Information Processing over Networks.
[28] R. Srikant,et al. Correlated jamming on MIMO Gaussian fading channels , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[29] T. Duman,et al. Decentralized detection over multiple-access channels , 1998 .
[30] Richard D. Wesel,et al. Optimal bi-level quantization of i.i.d. sensor observations for binary hypothesis testing , 2002, IEEE Trans. Inf. Theory.
[31] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[32] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..