Reliable Inference from Unreliable Agents

Distributed inference using multiple sensors has been an active area of research since the emergence of wireless sensor networks (WSNs). Several researchers have addressed the design issues to ensure optimal inference performance in such networks. The central goal of this thesis is to analyze distributed inference systems with potentially unreliable components and design strategies to ensure reliable inference in such systems. The inference process can be that of detection or estimation or classification, and the components/agents in the system can be sensors and/or humans. The system components can be unreliable due to a variety of reasons: faulty sensors, security attacks causing sensors to send falsified information, or unskilled human workers sending imperfect information. This thesis first quantifies the effect of such unreliable agents on the inference performance of the network and then designs schemes that ensure a reliable overall inference. In the first part of this thesis, we study the case when only sensors are present in the system, referred to as sensor networks. For sensor networks, the presence of malicious sensors, referred to as Byzantines, are considered. Byzantines are sensors that inject false information into the system. In such systems, the effect of Byzantines on the overall inference performance is characterized in terms of the optimal attack strategies. Game-theoretic formulations are explored to analyze two-player interactions. Next, Byzantine mitigation schemes are designed that address the problem from the system’s perspective. These mitigation schemes are of two kinds: Byzantine identification schemes and Byzantine tolerant schemes. Using learning based techniques, Byzantine identification schemes are designed that learn the identity of Byzantines in the network and use this information to improve system performance. When such schemes are not possible, Byzantine tolerant schemes using error-correcting codes are developed that tolerate the effect of Byzantines and maintain good performance in the network. Error-correcting codes help in correcting the erroneous information from these Byzantines and thereby counter their attack. The second line of research in this thesis considers humans-only networks, referred to as human networks. A similar research strategy is adopted for human networks where, the effect of unskilled humans sharing beliefs with a central observer called CEO is analyzed, and the loss in performance due to the presence of such unskilled humans is characterized. This problem falls under the family of problems in information theory literature referred to as the CEO Problem, but for belief sharing. The asymptotic behavior of the minimum achievable mean squared error distortion at the CEO is studied in the limit when the number of agents L and the sum rate R tend to infinity. An intermediate regime of performance between the exponential behavior in discrete CEO problems and the 1/R behavior in Gaussian CEO problems is established. This result can be summarized as the fact that sharing beliefs (uniform) is fundamentally easier in terms of convergence rate than sharing measurements (Gaussian), but sharing decisions is even easier (discrete). Besides theoretical analysis, experimental results are reported for experiments designed in collaboration with cognitive psychologists to understand the behavior of humans in the network. The act of fusing decisions from multiple agents is observed for humans and the behavior is statistically modeled using hierarchical Bayesian models. The implications of such modeling on the design of large human-machine systems is discussed. Furthermore, an error-correcting codes based scheme is proposed to improve system performance in the presence of unreliable humans in the inference process. For a crowdsourcing system consisting of unskilled human workers providing unreliable responses, the scheme helps in designing easy-to-perform tasks and also mitigates the effect of erroneous data. The benefits of using the proposed approach in comparison to the majority voting based approach are highlighted using simulated and real datasets. In the final part of the thesis, a human-machine inference framework is developed where humans and machines interact to perform complex tasks in a faster and more efficient manner. A mathematical framework is built to understand the benefits of human-machine collaboration. Such a study is extremely important for current scenarios where humans and machines are constantly interacting with each other to perform even the simplest of tasks. While machines perform best in some tasks, humans still give better results in tasks such as identifying new patterns. By using humans and machines together, one can extract complete information about a phenomenon of interest. Such an architecture, referred to as Human-Machine Inference Networks (HuMaINs), provides promising results for the two cases of human-machine collaboration: machine as a coach and machine as a colleague. For simple systems, we demonstrate tangible performance gains by such a collaboration which provides design modules for larger, and more complex human-machine systems. However, the details of such larger systems needs to be further explored.

[1]  Lang Tong,et al.  Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.

[2]  Yunghsiang Sam Han,et al.  Distributed Detection in Tree Topologies With Byzantines , 2013, IEEE Transactions on Signal Processing.

[3]  Douglas L. Jones,et al.  Decentralized Detection With Censoring Sensors , 2008, IEEE Transactions on Signal Processing.

[4]  Lav R. Varshney,et al.  Privacy and Reliability in Crowdsourcing Service Delivery , 2012, 2012 Annual SRII Global Conference.

[5]  Y. Bar-Shalom,et al.  Censoring sensors: a low-communication-rate scheme for distributed detection , 1996, IEEE Transactions on Aerospace and Electronic Systems.

[6]  H. Vincent Poor,et al.  Probabilistic Coherence and Proper Scoring Rules , 2007, IEEE Transactions on Information Theory.

[7]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[8]  Pramod K Varshney,et al.  Distributed inference in wireless sensor networks , 2012, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[9]  Pramod K. Varshney,et al.  Channel Aware Target Localization With Quantized Data in Wireless Sensor Networks , 2009, IEEE Transactions on Signal Processing.

[10]  S. Atkinson Explaining Creativity: The Science of Human Innovation , 2007 .

[11]  G. Laughlin,et al.  A Scientometric Prediction of the Discovery of the First Potentially Habitable Planet with a Mass Similar to Earth , 2010, PloS one.

[12]  H. V. Trees Detection, Estimation, And Modulation Theory , 2001 .

[13]  Amy R. Reibman,et al.  Design of quantizers for decentralized estimation systems , 1993, IEEE Trans. Commun..

[14]  Shun-ichi Amari,et al.  Statistical Inference Under Multiterminal Data Compression , 1998, IEEE Trans. Inf. Theory.

[15]  Pramod K. Varshney,et al.  Noise-Enhanced Information Systems , 2014, Proceedings of the IEEE.

[16]  B. Brunt The calculus of variations , 2003 .

[17]  P.K. Varshney,et al.  Adaptive local quantizer design for tracking in a wireless sensor network , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[18]  Gonzalo R. Arce,et al.  On the midrange estimator , 1988, IEEE Trans. Acoust. Speech Signal Process..

[19]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[20]  Peng Ning,et al.  HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing , 2013, IEEE Journal on Selected Areas in Communications.

[21]  Samuel Arbesman Quantifying the ease of scientific discovery , 2010, Scientometrics.

[22]  Venugopal V. Veeravalli,et al.  How Dense Should a Sensor Network Be for Detection With Correlated Observations? , 2006, IEEE Transactions on Information Theory.

[23]  Nicholas A. Christakis,et al.  Eurekometrics: Analyzing the Nature of Discovery , 2011, PLoS Comput. Biol..

[24]  Lang Tong,et al.  Distributed Source Coding in the Presence of Byzantine Sensors , 2007, IEEE Transactions on Information Theory.

[25]  Don Tapscott,et al.  Wikinomics: How Mass Collaboration Changes Everything , 2006 .

[26]  Minyue Fu,et al.  Target Tracking in Wireless Sensor Networks Based on the Combination of KF and MLE Using Distance Measurements , 2012, IEEE Transactions on Mobile Computing.

[27]  Panagiotis G. Ipeirotis,et al.  Quality management on Amazon Mechanical Turk , 2010, HCOMP '10.

[28]  Lang Tong,et al.  Support-based and ML approaches to DOA estimation in a dumb sensor network , 2006, IEEE Transactions on Signal Processing.

[29]  Azzedine Boukerche,et al.  Secure localization algorithms for wireless sensor networks , 2008, IEEE Communications Magazine.

[30]  Pramod K. Varshney,et al.  A Parametric Copula-Based Framework for Hypothesis Testing Using Heterogeneous Data , 2011, IEEE Transactions on Signal Processing.

[31]  Rick S. Blum,et al.  Distributed detection with multiple sensors I. Advanced topics , 1997, Proc. IEEE.

[32]  Alejandro Ribeiro,et al.  Bandwidth-constrained distributed estimation for wireless sensor Networks-part I: Gaussian case , 2006, IEEE Transactions on Signal Processing.

[33]  Diane E. Vaughan,et al.  A Survey of the Coupon Collector’s Problem with Random Sample Sizes , 2007 .

[34]  Pramod K. Varshney,et al.  Performance Limit for Distributed Estimation Systems With Identical One-Bit Quantizers , 2010, IEEE Transactions on Signal Processing.

[35]  Lang Tong,et al.  Nonlinear network coding is necessary to combat general Byzantine attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[36]  Timothy J. Robinson,et al.  Sequential Monte Carlo Methods in Practice , 2003 .

[37]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1967 .

[38]  Yu Hen Hu,et al.  Energy-Based Collaborative Source Localization Using Acoustic Microsensor Array , 2003, EURASIP J. Adv. Signal Process..

[39]  R. W. Taylor,et al.  Identifying trouble patterns in complex IT services engagements , 2010, IBM J. Res. Dev..

[40]  Duncan J. Watts,et al.  Financial incentives and the "performance of crowds" , 2009, HCOMP '09.

[41]  P.K. Varshney,et al.  Channel-aware distributed detection in wireless sensor networks , 2006, IEEE Signal Processing Magazine.

[42]  Pramod K. Varshney,et al.  Distributed Detection and Data Fusion , 1996 .

[43]  Feller William,et al.  An Introduction To Probability Theory And Its Applications , 1950 .

[44]  M. Hofri,et al.  The coupon-collector problem revisited — a survey of engineering problems and computational methods , 1997 .

[45]  Roger Ratcliff,et al.  Anxiety enhances threat processing without competition among multiple inputs: a diffusion model analysis. , 2010, Emotion.

[46]  David Alan Grier,et al.  Error Identification and Correction in Human Computation: Lessons from the WPA , 2011, Human Computation.

[47]  Pietro Perona,et al.  Visual Recognition with Humans in the Loop , 2010, ECCV.

[48]  Toby Berger,et al.  An upper bound on the sum-rate distortion function and its corresponding rate allocation schemes for the CEO problem , 2004, IEEE Journal on Selected Areas in Communications.

[49]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[50]  S.D. Servetto Achievable Rates for Multiterminal Source Coding with Scalar Quantizers , 2005, Conference Record of the Thirty-Ninth Asilomar Conference onSignals, Systems and Computers, 2005..

[51]  Benjamin B. Bederson,et al.  Human computation: a survey and taxonomy of a growing field , 2011, CHI.

[52]  Devavrat Shah,et al.  Efficient crowdsourcing for multi-class labeling , 2013, SIGMETRICS '13.

[53]  Yasutada Oohama,et al.  The Rate-Distortion Function for the Quadratic Gaussian CEO Problem , 1998, IEEE Trans. Inf. Theory.

[54]  Yossef Steinberg,et al.  Extended Ziv-Zakai lower bound for vector parameter estimation , 1997, IEEE Trans. Inf. Theory.

[55]  Ananthram Swami,et al.  Quantization for Maximin ARE in Distributed Estimation , 2007, IEEE Transactions on Signal Processing.

[56]  Todd Lubart,et al.  How can computers be partners in the creative process: Classification and commentary on the Special Issue , 2005, Int. J. Hum. Comput. Stud..

[57]  John W. Payne,et al.  Walking with the scarecrow: The information-processing approach to decision research. , 2008 .

[58]  Lav R. Varshney,et al.  Unreliable and resource-constrained decoding , 2010 .

[59]  Brendan T. O'Connor,et al.  Cheap and Fast – But is it Good? Evaluating Non-Expert Annotations for Natural Language Tasks , 2008, EMNLP.

[60]  Yunghsiang Sam Han,et al.  Performance Analysis and Code Design for Minimum Hamming Distance Fusion in Wireless Sensor Networks , 2007, IEEE Transactions on Information Theory.

[61]  P. R. Rider,et al.  The Midrange of a Sample as an Estimator of the Population Midrange , 1957 .

[62]  John R. Anderson Cognitive Psychology and Its Implications , 1980 .

[63]  Pramod K. Varshney,et al.  False discovery rate based distributed detection in the presence of Byzantines , 2014, IEEE Transactions on Aerospace and Electronic Systems.

[64]  Thomas M. Cover,et al.  A Proof of the Data Compression Theorem of Slepian and Wolf for Ergodic Sources , 1971 .

[65]  Zixiang Xiong,et al.  On the Generalized Gaussian CEO Problem , 2012, IEEE Transactions on Information Theory.

[66]  Claudia Biermann,et al.  Mathematical Methods Of Statistics , 2016 .

[67]  L. Ljung,et al.  On the choice of norms in system identification , 1994, IEEE Trans. Autom. Control..

[68]  Onkar Dabeer,et al.  Multivariate Signal Parameter Estimation Under Dependent Noise From 1-Bit Dithered Quantized Data , 2008, IEEE Transactions on Information Theory.

[69]  Alfred O. Hero,et al.  Using proximity and quantized RSS for sensor localization in wireless networks , 2003, WSNA '03.

[70]  Sriram Vishwanath,et al.  Sum Rate of the Vacationing-CEO Problem , 2012, IEEE Transactions on Information Theory.

[71]  Moe Z. Win,et al.  Data Fusion Trees for Detection: Does Architecture Matter? , 2008, IEEE Transactions on Information Theory.

[72]  M. Boden The creative mind : myths & mechanisms , 1991 .

[73]  R. Radner,et al.  Economic theory of teams , 1972 .

[74]  Devavrat Shah,et al.  Budget-optimal crowdsourcing using low-rank matrix approximations , 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[75]  Douglas L. Jones,et al.  Energy-efficient detection in sensor networks , 2005, IEEE Journal on Selected Areas in Communications.

[76]  Pramod K. Varshney,et al.  Optimal Identical Binary Quantizer Design for Distributed Estimation , 2012, IEEE Transactions on Signal Processing.

[77]  Charu C. Aggarwal,et al.  Mining collective intelligence in diverse groups , 2013, WWW.

[78]  Péter Molnár,et al.  Maximum likelihood methods for bearings-only target localization , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[79]  Thiagalingam Kirubarajan,et al.  Estimation with Applications to Tracking and Navigation , 2001 .

[80]  Maria Liakata,et al.  The Robot Scientist Adam , 2009, Computer.

[81]  Kung Yao,et al.  Absolute error rate-distortion functions for sources with constrained magnitudes (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[82]  Neil J. Gordon,et al.  A tutorial on particle filters for online nonlinear/non-Gaussian Bayesian tracking , 2002, IEEE Trans. Signal Process..

[83]  Zhi-Quan Luo,et al.  Universal decentralized estimation in a bandwidth constrained sensor network , 2005, IEEE Transactions on Information Theory.

[84]  Toby Berger,et al.  The quadratic Gaussian CEO problem , 1997, IEEE Trans. Inf. Theory.

[85]  C. Sims Implications of rational inattention , 2003 .

[86]  Biao Chen,et al.  Fusion of censored decisions in wireless sensor networks , 2005, IEEE Transactions on Wireless Communications.

[87]  Clive Thompson,et al.  Smarter Than You Think: How Technology is Changing Our Minds for the Better , 2013 .

[88]  Jun Chen,et al.  On the vector Gaussian CEO problem , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[89]  R. Radner,et al.  Team Decision Problems , 1962 .

[90]  Toby Berger,et al.  Multiterminal Source Coding with High Resolution , 1999, IEEE Trans. Inf. Theory.

[91]  Franz Aurenhammer,et al.  Voronoi diagrams—a survey of a fundamental geometric data structure , 1991, CSUR.

[92]  Wai-Tat Fu,et al.  Don't hide in the crowd!: increasing social transparency between peer workers improves crowdsourcing outcomes , 2013, CHI.

[93]  Yuguang Fang,et al.  Secure localization in wireless sensor networks , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[94]  P. F. Swaszek,et al.  On the performance of serial networks in distributed detection , 1993 .

[95]  J.-F. Chamberland,et al.  Wireless Sensors in Distributed Detection Applications , 2007, IEEE Signal Processing Magazine.

[96]  P. Viswanath,et al.  On the Sum-rate of the Vector Gaussian CEO Problem , 2005, Conference Record of the Thirty-Ninth Asilomar Conference onSignals, Systems and Computers, 2005..

[97]  Bin Bi,et al.  Iterative Learning for Reliable Crowdsourcing Systems , 2012 .

[98]  Yunghsiang Sam Han,et al.  Distributed Inference With M-Ary Quantized Data in the Presence of Byzantine Attacks , 2014, IEEE Transactions on Signal Processing.

[99]  Bill Tomlinson,et al.  Who are the crowdworkers?: shifting demographics in mechanical turk , 2010, CHI Extended Abstracts.

[100]  Xiaodong Wang,et al.  Monte Carlo methods for signal processing: a review in the statistical signal processing context , 2005, IEEE Signal Processing Magazine.

[101]  R D Sorkin,et al.  Signal-detection analysis of group decision making. , 2001, Psychological review.

[102]  Charles Kemp,et al.  Bayesian models of cognition , 2008 .

[103]  Hao He,et al.  On Quantizer Design for Distributed Bayesian Estimation in Sensor Networks , 2014, IEEE Transactions on Signal Processing.

[104]  J. Henrich,et al.  Most people are not WEIRD , 2010, Nature.

[105]  Carlos H. Muravchik,et al.  Posterior Cramer-Rao bounds for discrete-time nonlinear filtering , 1998, IEEE Trans. Signal Process..

[106]  Lav R. Varshney,et al.  Participation in crowd systems , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[107]  R. Ratcliff,et al.  Diffusion model for one-choice reaction-time tasks and the cognitive effects of sleep deprivation , 2011, Proceedings of the National Academy of Sciences.

[108]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[109]  E. Vald Principles of human-computer collaboration for knowledge discovery in science , 1999 .

[110]  Thomas Sauerwald,et al.  The Weighted Coupon Collector's Problem and Applications , 2009, COCOON.

[111]  Bin Liu,et al.  Joint source-channel coding for distributed sensor networks , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[112]  Vivek K. Goyal,et al.  Quantization of Prior Probabilities for Collaborative Distributed Hypothesis Testing , 2011, IEEE Transactions on Signal Processing.

[113]  E. S. Pearson,et al.  ON THE USE AND INTERPRETATION OF CERTAIN TEST CRITERIA FOR PURPOSES OF STATISTICAL INFERENCE PART I , 1928 .

[114]  Clifford Hildrethi BAYESIAN STATISTICIANS AND REMOTE CLIENTS , 1963 .

[115]  Jacob Ziv,et al.  Improved Lower Bounds on Signal Parameter Estimation , 1975, IEEE Trans. Inf. Theory.

[116]  Jack K. Wolf,et al.  Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.

[117]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[118]  Serap A. Savari,et al.  Communicating Probability Distributions , 2007, IEEE Transactions on Information Theory.

[119]  Jacob Ziv,et al.  Some lower bounds on signal parameter estimation , 1969, IEEE Trans. Inf. Theory.

[120]  Pat Langley,et al.  The computational support of scientific discovery , 2000, Int. J. Hum. Comput. Stud..

[121]  Yasutada Oohama,et al.  Rate-distortion theory for Gaussian multiterminal source coding systems with several side informations at the decoder , 2005, IEEE Transactions on Information Theory.

[122]  Richard P. Larrick,et al.  Strategies for revising judgment: how (and how well) people use others' opinions. , 2009, Journal of experimental psychology. Learning, memory, and cognition.

[123]  Hao Chen,et al.  Noise Enhanced Signal Detection and Estimation , 2007, 2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers.

[124]  Bill Ravens,et al.  An Introduction to Copulas , 2000, Technometrics.

[125]  Pramod K. Varshney,et al.  Assuring privacy and reliability in crowdsourcing with coding , 2014, 2014 Information Theory and Applications Workshop (ITA).

[126]  C. Genest,et al.  The Joy of Copulas: Bivariate Distributions with Uniform Marginals , 1986 .

[127]  Michael G. Taylor Reliable information storage in memories designed from unreliable components , 1968 .

[128]  Kaigui Bian,et al.  Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[129]  Matthew Lease,et al.  On Quality Control and Machine Learning in Crowdsourcing , 2011, Human Computation.

[130]  Pramod K. Varshney,et al.  A unified approach to the design of decentralized detection systems , 1995 .

[131]  R. Selten,et al.  Bounded rationality: The adaptive toolbox , 2000 .

[132]  S. Brendle,et al.  Calculus of Variations , 1927, Nature.

[133]  Kush R. Varshney,et al.  Quantization of Prior Probabilities for Hypothesis Testing , 2022 .

[134]  Divesh Srivastava,et al.  Sailing the Information Ocean with Awareness of Currents: Discovery and Application of Source Dependence , 2009, CIDR.

[135]  H. Simon Models of Bounded Rationality: Empirically Grounded Economic Reason , 1997 .

[136]  Pramod Viswanath,et al.  Rate Region of the Quadratic Gaussian Two-Encoder Source-Coding Problem , 2006, ISIT.

[137]  Lang Tong,et al.  DOA estimation via a network of dumb sensors under the SENMA paradigm , 2005, IEEE Signal Processing Letters.

[138]  Ashok Sundaresan,et al.  Copula-Based Fusion of Correlated Decisions , 2011, IEEE Transactions on Aerospace and Electronic Systems.

[139]  Yunghsiang Sam Han,et al.  A combined decision fusion and channel coding scheme for distributed fault-tolerant classification in wireless sensor networks , 2006, IEEE Transactions on Wireless Communications.

[140]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[141]  E. Luciano,et al.  Copula methods in finance , 2004 .

[142]  Wade Trappe,et al.  Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[143]  Kush R. Varshney,et al.  Ieee Transactions on Information Theory 1 Optimal Grouping for Group Minimax Hypothesis Testing , 2022 .

[144]  Lorrie Faith Cranor,et al.  Are your participants gaming the system?: screening mechanical turk workers , 2010, CHI.

[145]  H. V. Trees,et al.  Bayesian Bounds for Parameter Estimation and Nonlinear Filtering/Tracking , 2007 .

[146]  Yunghsiang Sam Han,et al.  Asymptotic Analysis of Distributed Bayesian Detection with Byzantine Data , 2014, IEEE Signal Processing Letters.

[147]  Zhen Zhang,et al.  On the CEO problem , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[148]  Pramod K. Varshney,et al.  On covert data falsification attacks on distributed detection systems , 2013, 2013 13th International Symposium on Communications and Information Technologies (ISCIT).

[149]  P.K. Varshney,et al.  Optimal Data Fusion in Multiple Sensor Detection Systems , 1986, IEEE Transactions on Aerospace and Electronic Systems.

[150]  Urbashi Mitra,et al.  On Energy-Based Acoustic Source Localization for Sensor Networks , 2008, IEEE Transactions on Signal Processing.

[151]  Devavrat Shah,et al.  Iterative Learning for Reliable Crowdsourcing Systems , 2011, NIPS.

[152]  Michael Gastpar,et al.  On the quadratic AWGN CEO problem and non-gaussian sources , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[153]  Pramod K. Varshney,et al.  Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.

[154]  Nils Sandell,et al.  Detection with Distributed Sensors , 1980, IEEE Transactions on Aerospace and Electronic Systems.

[155]  Kung Yao,et al.  A maximum-likelihood parametric approach to source localizations , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[156]  Pramod K. Varshney,et al.  Adaptive learning of Byzantines' behavior in cooperative spectrum sensing , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[157]  Sumanth Yenduri,et al.  Paper-based dichotomous key to computer based application for biological indentification , 2007 .

[158]  P.K. Varshney,et al.  Target Location Estimation in Sensor Networks With Quantized Data , 2006, IEEE Transactions on Signal Processing.

[159]  Pramod K. Varshney,et al.  Distributed detection with multiple sensors I. Fundamentals , 1997, Proc. IEEE.

[160]  Vinod M. Prabhakaran,et al.  Rate region of the quadratic Gaussian CEO problem , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[161]  Pavel Berkhin,et al.  A Survey of Clustering Data Mining Techniques , 2006, Grouping Multidimensional Data.