Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation
暂无分享,去创建一个
[1] Laurence T. Yang,et al. Optimal data fusion of collaborative spectrum sensing under attack in cognitive radio networks , 2014, IEEE Network.
[2] Shuguang Cui,et al. Optimal Linear Cooperation for Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE Journal of Selected Topics in Signal Processing.
[3] H. Urkowitz. Energy detection of unknown deterministic signals , 1967 .
[4] H. Nikaidô. On von Neumann’s minimax theorem , 1954 .
[5] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.
[6] Pramod K. Varshney,et al. Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.
[7] Carlos A. Pomalaza-Raez,et al. Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.
[8] Pramod K. Varshney,et al. Distributed Detection and Data Fusion , 1996 .
[9] Masoumeh Nasiri-Kenari,et al. Multiple antenna spectrum sensing in cognitive radios , 2010, IEEE Transactions on Wireless Communications.
[10] Sergio Barbarossa,et al. Distributed Detection and Estimation in Wireless Sensor Networks , 2013, ArXiv.
[11] S. Shankar Sastry,et al. Instrumenting wireless sensor networks for real-time surveillance , 2006, Proceedings 2006 IEEE International Conference on Robotics and Automation, 2006. ICRA 2006..
[12] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.
[13] Gregory J. Pottie,et al. Instrumenting the world with wireless sensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[14] Venugopal V. Veeravalli,et al. Asymptotic results for decentralized detection in power constrained wireless sensor networks , 2004, IEEE Journal on Selected Areas in Communications.
[15] Peter C. Mason,et al. Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[16] Reza Olfati-Saber,et al. Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.
[17] Mounir Ghogho,et al. Quantized fusion rules for energy-based distributed detection in wireless sensor networks , 2014, 2014 Sensor Signal Processing for Defence (SSPD).
[18] Mounir Ghogho,et al. Optimal quantization and power allocation for energy-based distributed sensor detection , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).
[19] Pramod K. Varshney,et al. On the performance analysis of data fusion schemes with Byzantines , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[20] Pramod K. Varshney,et al. Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques , 2013, IEEE Transactions on Signal Processing.
[21] Steven Kay,et al. Fundamentals Of Statistical Signal Processing , 2001 .
[22] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[23] H. Vincent Poor,et al. Optimal Power Allocation for Distributed Detection Over MIMO Channels in Wireless Sensor Networks , 2007, IEEE Transactions on Signal Processing.
[24] Rick S. Blum,et al. Distributed detection with multiple sensors I. Advanced topics , 1997, Proc. IEEE.
[25] Alejandro Ribeiro,et al. Bandwidth-constrained distributed estimation for wireless sensor Networks-part I: Gaussian case , 2006, IEEE Transactions on Signal Processing.
[26] Mounir Ghogho,et al. Distributed Two-Step Quantized Fusion Rules Via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks , 2016, IEEE Transactions on Signal and Information Processing over Networks.
[27] Majid Khabbazian,et al. Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.
[28] Zhu Han,et al. Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[29] Yuping Zhao,et al. A New Cooperative Detection Technique with Malicious User Suppression , 2009, 2009 IEEE International Conference on Communications.
[30] Qihui Wu,et al. Performance analysis of probabilistic soft SSDF attack in cooperative spectrum sensing , 2014, EURASIP J. Adv. Signal Process..
[31] J. Tsitsiklis. Decentralized Detection' , 1993 .
[32] Yunghsiang Sam Han,et al. Distributed Inference With M-Ary Quantized Data in the Presence of Byzantine Attacks , 2014, IEEE Transactions on Signal Processing.
[33] Lang Tong,et al. Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.