Distributed Source Coding in the Presence of Byzantine Sensors
暂无分享,去创建一个
Lang Tong | Oliver Kosut | L. Tong | O. Kosut
[1] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[2] Lang Tong,et al. Distributed Inference in the Presence of Byzantine Sensors , 2006, 2006 Fortieth Asilomar Conference on Signals, Systems and Computers.
[3] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[4] Thomas M. Cover,et al. A Proof of the Data Compression Theorem of Slepian and Wolf for Ergodic Sources , 1971 .
[5] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[6] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.
[7] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[8] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[9] Danny Dolev,et al. The Byzantine Generals Strike Again , 1981, J. Algorithms.
[10] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[11] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[12] Aaron D. Wyner,et al. The common information of two dependent random variables , 1975, IEEE Trans. Inf. Theory.
[13] Lang Tong,et al. Capacity of Cooperative Fusion in the Presence of Byzantine Sensors , 2006, ArXiv.
[14] Toby Berger,et al. The CEO problem [multiterminal source coding] , 1996, IEEE Trans. Inf. Theory.
[15] Giuseppe Longo,et al. The information theory approach to communications , 1977 .
[16] Tracey Ho,et al. Correction of adversarial errors in networks , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..