The Internet of Things: Secure Distributed Inference
暂无分享,去创建一个
[1] Pramod K. Varshney,et al. Data Falsification Attacks on Consensus-Based Detection Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[2] Song Tan,et al. Survey of Security Advances in Smart Grid: A Data Driven Approach , 2017, IEEE Communications Surveys & Tutorials.
[3] Shreyas Sundaram,et al. Consensus-based distributed optimization with malicious nodes , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[4] Antonio Bicchi,et al. Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.
[5] Soummya Kar,et al. Consensus + innovations distributed inference over networks: cooperation and sensing in networked systems , 2013, IEEE Signal Processing Magazine.
[6] Tao Zhang,et al. Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.
[7] Hossam S. Hassanein,et al. Towards a Practical Crowdsensing System for Road Surface Conditions Monitoring , 2018, IEEE Internet of Things Journal.
[8] Ivana Tomić,et al. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.
[9] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[10] Xuemin Shen,et al. Connected Vehicles: Solutions and Challenges , 2014, IEEE Internet of Things Journal.
[11] Fan Ye,et al. Mobile crowdsensing: current state and future challenges , 2011, IEEE Communications Magazine.
[12] Pramod K. Varshney,et al. A unified approach to the design of decentralized detection systems , 1995 .
[13] Soummya Kar,et al. Resilient Distributed Estimation: Sensor Attacks , 2017, IEEE Transactions on Automatic Control.
[14] Soummya Kar,et al. Resilient Distributed Estimation Through Adversary Detection , 2017, IEEE Transactions on Signal Processing.
[15] Stephen P. Boyd,et al. Fast linear iterations for distributed averaging , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[16] Firas Hassan,et al. Resilient distributed parameter estimation in heterogeneous time-varying networks , 2014, HiCoNS.
[17] John N. Tsitsiklis,et al. Decentralized detection by a large number of sensors , 1988, Math. Control. Signals Syst..
[18] Peter D. Barnes,et al. Byzantine-Resilient locally optimum detection using collaborative autonomous networks , 2017, 2017 IEEE 7th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).
[19] Fan Chung,et al. Spectral Graph Theory , 1996 .
[20] Soummya Kar,et al. Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.
[21] Michele Zorzi,et al. The internet of energy: a web-enabled smart grid system , 2012, IEEE Network.
[22] Xiaohua Ge,et al. Distributed Secure Estimation Over Wireless Sensor Networks Against Random Multichannel Jamming Attacks , 2017, IEEE Access.
[23] Shreyas Sundaram,et al. Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.
[24] J. Tsitsiklis. Decentralized Detection' , 1993 .
[25] Ling Shi,et al. Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.
[26] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[27] José M. F. Moura,et al. Detection in Sensor Networks: The Saddlepoint Approximation , 2007, IEEE Transactions on Signal Processing.
[28] Hokeun Kim,et al. Authentication and Authorization for the Internet of Things , 2017, IT Professional.
[29] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[30] John N. Tsitsiklis,et al. Distributed Asynchronous Deterministic and Stochastic Gradient Optimization Algorithms , 1984, 1984 American Control Conference.
[31] Jaganathan Venkatesh,et al. Modular and Personalized Smart Health Application Design in a Smart City Environment , 2018, IEEE Internet of Things Journal.
[32] Ali H. Sayed,et al. Diffusion strategies for adaptation and learning over networks: an examination of distributed strategies and network behavior , 2013, IEEE Signal Processing Magazine.
[33] Waheed Uz Zaman Bajwa,et al. ByRDiE: Byzantine-Resilient Distributed Coordinate Descent for Decentralized Learning , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[34] Yunghsiang Sam Han,et al. Distributed Bayesian Detection in the Presence of Byzantine Data , 2013, IEEE Transactions on Signal Processing.
[35] Nitin H. Vaidya,et al. Fault-Tolerant Multi-Agent Optimization: Optimal Iterative Distributed Algorithms , 2016, PODC.
[36] Biao Chen,et al. Quantized Consensus by the ADMM: Probabilistic Versus Deterministic Quantizers , 2015, IEEE Transactions on Signal Processing.
[37] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.
[38] Waheed Uz Zaman Bajwa,et al. RD-SVM: A resilient distributed support vector machine , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[39] Tze Meng Low,et al. High-Assurance SPIRAL: End-to-End Guarantees for Robot and Car Control , 2017, IEEE Control Systems.
[40] Shreyas Sundaram,et al. Resilient Asymptotic Consensus in Robust Networks , 2013, IEEE Journal on Selected Areas in Communications.
[41] Marco Stolpe,et al. The Internet of Things: Opportunities and Challenges for Distributed Data Analysis , 2016, SIGKDD Explor..
[42] Lang Tong,et al. Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.
[43] Rick S. Blum,et al. Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.
[44] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.