On Distributed Optimization in the Presence of Malicious Agents
暂无分享,去创建一个
[1] John S. Baras,et al. Trust is the Cure to Distributed Consensus with Adversaries , 2019, 2019 27th Mediterranean Conference on Control and Automation (MED).
[2] Shreyas Sundaram,et al. Secure local filtering algorithms for distributed optimization , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[3] Mark Maybury,et al. Detecting Malicious Insiders in Military Networks , 2006 .
[4] Jianhua Zhang,et al. A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods , 2014, GameSec.
[5] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[6] Anna Scaglione,et al. A Case of Distributed Optimization in Adversarial Environment , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[7] Albert S. Berahas,et al. Balancing Communication and Computation in Distributed Optimization , 2017, IEEE Transactions on Automatic Control.
[8] Yurii Nesterov,et al. Introductory Lectures on Convex Optimization - A Basic Course , 2014, Applied Optimization.
[9] Guang-Hong Yang,et al. Distributed Secure State Estimation in the Presence of Malicious Agents , 2021, IEEE Transactions on Automatic Control.
[10] Qing-Guo Wang,et al. Resilient distributed optimization algorithm against adversary attacks , 2017, 2017 13th IEEE International Conference on Control & Automation (ICCA).
[11] Stephen P. Boyd,et al. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..
[12] Ming Li,et al. Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.
[13] Pramod K. Varshney,et al. Consensus based Detection in the Presence of Data Falsification Attacks , 2015, ArXiv.
[14] Lang Tong,et al. Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.