Source Location with Quantized Sensor Data Corrupted by False Information
暂无分享,去创建一个
[1] Wolfram Burgard,et al. Gaussian mixture models for probabilistic localization , 2008, 2008 IEEE International Conference on Robotics and Automation.
[2] Rick S. Blum,et al. Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks , 2016, IEEE Transactions on Signal Processing.
[3] Lawrence E. Kinsler,et al. Fundamentals of acoustics , 1950 .
[4] Pramod K. Varshney,et al. Closed-form performance for location estimation based on quantized data in sensor networks , 2010, 2010 13th International Conference on Information Fusion.
[5] R. Michael Buehrer,et al. Characterization and detection of location spoofing attacks , 2012, Journal of Communications and Networks.
[6] P.K. Varshney,et al. Target Location Estimation in Sensor Networks With Quantized Data , 2006, IEEE Transactions on Signal Processing.
[7] Ruixin Niu,et al. False information injection attack on dynamic state estimation in multi-sensor systems , 2014, 17th International Conference on Information Fusion (FUSION).
[8] Fredrik Gustafsson,et al. Robust cooperative sensor network localization via the EM criterion in LOS/NLOS environments , 2013, 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[9] Yunghsiang Sam Han,et al. Target localization in Wireless Sensor Networks using error correcting codes in the presence of Byzantines , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[10] Rick S. Blum,et al. Attack Detection in Sensor Network Target Localization Systems With Quantized Data , 2017, IEEE Transactions on Signal Processing.
[11] Yu Hen Hu,et al. Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor networks , 2005, IEEE Transactions on Signal Processing.
[12] Randolph L. Moses,et al. Outlier compensation in sensor network self-localization via the EM algorithm , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[13] Rick S. Blum,et al. Distributed joint spoofing attack identification and estimation in sensor networks , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[14] Rick S. Blum,et al. After-attack performance of parameter estimation systems , 2014, 2014 48th Annual Conference on Information Sciences and Systems (CISS).
[15] Fredrik Gustafsson,et al. Cooperative Localization in WSNs Using Gaussian Mixture Modeling: Distributed ECM Algorithms , 2015, IEEE Transactions on Signal Processing.
[16] Pramod K. Varshney,et al. Target localization in Wireless Sensor Networks with quantized data in the presence of Byzantine attacks , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[17] Ruixin Niu,et al. False information detection with minimum mean squared errors for Bayesian estimation , 2015, 2015 49th Annual Conference on Information Sciences and Systems (CISS).
[18] Rick S. Blum,et al. Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing , 2015, IEEE Transactions on Signal Processing.
[19] Lianfeng Shen,et al. RSS-Based Localization in WSNs Using Gaussian Mixture Model via Semidefinite Relaxation , 2017, IEEE Communications Letters.
[20] Yuan Zhang,et al. Base Station Localization in Search of Empty Spectrum Spaces in Cognitive Radio Networks , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.
[21] Rick S. Blum,et al. Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.
[22] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..