Attack Detection in Sensor Network Target Localization Systems With Quantized Data
暂无分享,去创建一个
[1] Moe Z. Win,et al. Fundamental Limits of Wideband Localization— Part I: A General Framework , 2010, IEEE Transactions on Information Theory.
[2] Pramod K. Varshney,et al. Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques , 2013, IEEE Transactions on Signal Processing.
[3] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.
[4] Robert H. Deng,et al. Secure localization with attack detection in wireless sensor networks , 2011, International Journal of Information Security.
[5] Azzedine Boukerche,et al. Secure localization algorithms for wireless sensor networks , 2008, IEEE Communications Magazine.
[6] Pramod K. Varshney,et al. Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.
[7] Rick S. Blum,et al. Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing , 2015, IEEE Transactions on Signal Processing.
[8] P.K. Varshney,et al. Target Location Estimation in Sensor Networks With Quantized Data , 2006, IEEE Transactions on Signal Processing.
[9] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[10] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[11] Rick S. Blum,et al. Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks , 2016, IEEE Transactions on Signal Processing.
[12] Rick S. Blum,et al. Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.
[13] Péter Molnár,et al. Maximum likelihood methods for bearings-only target localization , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[14] R. Michael Buehrer,et al. Characterization and detection of location spoofing attacks , 2012, Journal of Communications and Networks.
[15] Rick S. Blum,et al. Distributed joint spoofing attack identification and estimation in sensor networks , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[16] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[17] Pramod K. Varshney,et al. Target Localization in Wireless Sensor Networks Using Error Correcting Codes , 2013, IEEE Trans. Inf. Theory.
[18] Pramod K. Varshney,et al. Channel Aware Target Localization With Quantized Data in Wireless Sensor Networks , 2009, IEEE Transactions on Signal Processing.
[19] Mark L. Fowler,et al. Strategies for information injection for networks estimating emitter location , 2015, IEEE Transactions on Aerospace and Electronic Systems.