Outlier detection based fault tolerant data aggregation for wireless sensor networks
暂无分享,去创建一个
[1] Gustavo Alonso,et al. Declarative Support for Sensor Data Cleaning , 2006, Pervasive.
[2] David P. Williamson,et al. Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming , 1995, JACM.
[3] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[4] Christoph Heinz Bernhard Seeger. Statistical Modeling of Sensor Data and its Application to Outlier Detection , 2006 .
[5] Jyh-Ching Juang,et al. Outlier-Detection-Based Indoor Localization System for Wireless Sensor Networks , 2012 .
[6] Elaine Shi,et al. Designing secure sensor networks , 2004, IEEE Wireless Communications.
[7] Hasan Çam,et al. Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks , 2010, IEEE/ACM Transactions on Networking.
[8] Yang Xiao,et al. Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.
[9] Alice M. Agogino,et al. Fuzzy Validation and Fusion for Wireless Sensor Networks , 2004 .
[10] Lei Chen,et al. A Weighted Moving Average-based Approach for Cleaning Sensor Data , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[11] H. Cam,et al. ESPDA: Energy-efficient and Secure Pattern-based Data Aggregation for wireless sensor networks , 2003, Proceedings of IEEE Sensors 2003 (IEEE Cat. No.03CH37498).
[12] Victor C. M. Leung,et al. Directional Controlled Fusion in Wireless Sensor Networks , 2008, QShine '08.
[13] Qiong Luo,et al. Online Mining in Sensor Networks , 2004, NPC.
[14] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[15] Yi Jiang,et al. A topology-aware hierarchical structured overlay network based on locality sensitive hashing scheme , 2007, UPGRADE '07.
[16] Nirvana Meratnia,et al. Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.
[17] Suat Ozdemir,et al. Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .
[18] B. R. Badrinath,et al. Cleaning and querying noisy sensors , 2003, WSNA '03.
[19] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[20] Y. Zhang,et al. – 20 Statistics-based outlier detection for wireless sensor networks , 2012 .
[21] Bo Sheng,et al. Outlier detection in sensor networks , 2007, MobiHoc '07.
[22] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[23] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[24] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[25] Alex Delis,et al. Another Outlier Bites the Dust: Computing Meaningful Aggregates in Sensor Networks , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[26] Vipnesh Jha,et al. Outlier Detection Techniques and Cleaning of Data for Wireless Sensor Networks : A Survey , 2022 .
[27] Moses Charikar,et al. Similarity estimation techniques from rounding algorithms , 2002, STOC '02.
[28] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[29] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[30] Arun Somani,et al. Distributed fault detection of wireless sensor networks , 2006, DIWANS '06.
[31] Deborah Estrin,et al. Impact of network density on data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[32] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[33] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[34] Yang Xiao,et al. Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2007, Ad Hoc Networks.
[35] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.