On the Perfect Privacy: A Statistical Analysis of Network Traffic Approach
暂无分享,去创建一个
[1] Ken R. Duffy,et al. Bounds on inference , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[2] Seyed Pooya Shariatpanahi,et al. A Dummy-Based Approach for Preserving Source Rate Privacy , 2016, IEEE Transactions on Information Forensics and Security.
[3] George Kesidis. An Introduction to Communication Network Analysis , 2007 .
[4] Sergio Verdú,et al. Generalizing the Fano inequality , 1994, IEEE Trans. Inf. Theory.
[5] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[6] H. Vincent Poor,et al. A lower bound on the probability of error in multihypothesis testing , 1995, IEEE Trans. Inf. Theory.
[7] Andrew W. Moore,et al. Discriminators for use in flow-based classification , 2013 .
[8] Wenyuan Xu,et al. Temporal privacy in wireless sensor networks: Theory and practice , 2009, TOSN.
[9] George Kesidis. An Introduction to Communication Network Analysis: Kesidis/An Introduction , 2007 .
[10] Daryl J. Daley,et al. Revisiting queueing output processes: a point process viewpoint , 2011, Queueing Syst. Theory Appl..
[11] Mauro Conti,et al. Providing Source Location Privacy in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[12] Maurizio Dusi,et al. Traffic classification through simple statistical fingerprinting , 2007, CCRV.
[13] P. Burke. The Output of a Queuing System , 1956 .