Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks
暂无分享,去创建一个
[1] Rick S. Blum,et al. Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing , 2015, IEEE Transactions on Signal Processing.
[2] Donggang Liu,et al. Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[3] S. Nash,et al. A Numerical Comparison of Barrier and Modified Barrier Methods for Large-Scale Bound-Constrained Optimization , 1994 .
[4] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[5] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[6] Jun Fang,et al. Hyperplane-Based Vector Quantization for Distributed Estimation in Wireless Sensor Networks , 2009, IEEE Transactions on Information Theory.
[7] S. Kay. Fundamentals of statistical signal processing: estimation theory , 1993 .
[8] Haralabos C. Papadopoulos,et al. Sequential signal encoding from noisy measurements using quantizers with dynamic bias control , 2001, IEEE Trans. Inf. Theory.
[9] Alexander M. Haimovich,et al. Noncoherent MIMO Radar for Location and Velocity Estimation: More Antennas Means Better Performance , 2010, IEEE Transactions on Signal Processing.
[10] G.B. Giannakis,et al. Distributed compression-estimation using wireless sensor networks , 2006, IEEE Signal Processing Magazine.
[11] Donggang Liu,et al. Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.
[12] New York Dover,et al. ON THE CONVERGENCE PROPERTIES OF THE EM ALGORITHM , 1983 .
[13] S. J. Roome,et al. Digital radio frequency memory , 1990 .
[14] J. S. Wood,et al. Theory of acoustic field invariants in layered waveguides , 1993 .
[15] M. Skolnik,et al. Introduction to Radar Systems , 2021, Advances in Adaptive Radar Detection and Range Estimation.
[16] Rick S. Blum,et al. Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.
[17] William S. Hodgkiss,et al. Mirages in shallow water matched‐field processing , 1995 .
[18] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[19] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.
[20] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[21] W. Kuperman,et al. Robust time reversal focusing in the ocean. , 2003, The Journal of the Acoustical Society of America.
[22] Rick S. Blum,et al. Distributed joint spoofing attack identification and estimation in sensor networks , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[23] G. McLachlan,et al. The EM algorithm and extensions , 1996 .
[24] Ruixin Niu,et al. False information detection with minimum mean squared errors for Bayesian estimation , 2015, 2015 49th Annual Conference on Information Sciences and Systems (CISS).
[25] Pramod K. Varshney,et al. Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.
[26] Stephen P. Boyd,et al. Relaxed maximum a posteriori fault identification , 2009, Signal Process..
[27] P.K. Varshney,et al. Target Location Estimation in Sensor Networks With Quantized Data , 2006, IEEE Transactions on Signal Processing.
[28] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[29] R. Michael Buehrer,et al. Characterization and detection of location spoofing attacks , 2012, Journal of Communications and Networks.
[30] Ananthram Swami,et al. Quantization for Maximin ARE in Distributed Estimation , 2007, IEEE Transactions on Signal Processing.
[31] S BlumRick,et al. Noncoherent MIMO radar for location and velocity estimation , 2010 .
[32] Merril I. Skolnik,et al. Introduction to radar systems /2nd edition/ , 1980 .
[33] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[34] Alejandro Ribeiro,et al. Bandwidth-constrained distributed estimation for wireless sensor Networks-part I: Gaussian case , 2006, IEEE Transactions on Signal Processing.
[35] Yunghsiang Sam Han,et al. Distributed Inference With M-Ary Quantized Data in the Presence of Byzantine Attacks , 2014, IEEE Transactions on Signal Processing.