Secure networked inference with unreliable data sources. (2018)
- Record Type:
- Book
- Title:
- Secure networked inference with unreliable data sources. (2018)
- Main Title:
- Secure networked inference with unreliable data sources
- Further Information:
- Note: Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney.
- Authors:
- Vempaty, Aditya
Kailkhura, Bhavya
Varshney, Pramod K - Contents:
- Intro; Preface; Acknowledgements; Contents; 1 Introduction; 1.1 Distributed Inference Networks; 1.2 Motivation: Byzantine Generals' Problem; 1.3 Distributed Inference in the Presence of Byzantines: Two Viewpoints; 1.3.1 Analysis from the Attacker's Perspective; 1.3.2 Analysis from the Network Designer's Perspective; 1.4 Outline; References; 2 Background; 2.1 Foundational Concepts of Inference; 2.1.1 Binary Hypothesis Testing; 2.1.2 M-Ary Hypothesis Testing; 2.1.3 Parameter Estimation; 2.1.4 Asymptotic Performance Metrics; 2.2 Distributed Inference; 2.2.1 Network Topologies 2.2.2 Practical Concerns2.3 Taxonomy of Results; 2.3.1 Fundamental Limits; 2.3.2 Mitigation Schemes; References; 3 Distributed Detection with Unreliable Data Sources; 3.1 Distributed Bayesian Detection with Byzantines: Parallel Networks; 3.1.1 System Model; 3.1.2 Analysis from Attacker's Perspective; 3.1.3 Analysis from Network Designer's Perspective; 3.2 Distributed Neyman-Pearson Detection with Byzantine Data: Parallel Networks; 3.2.1 System Model; 3.2.2 Analysis from Attacker's Perspective; 3.2.3 Analysis from Network Designer's Perspective; 3.2.4 Covert Byzantine Attacks 3.3 Distributed Detection with Unlabeled Byzantine Data: Multi-hop Networks3.3.1 System Model; 3.3.2 Analysis from Attacker's Perspective; 3.3.3 Analysis from Network Designer's Perspective; 3.4 Distributed Detection with Labeled Byzantine Data: Multi-hop Networks; 3.4.1 System Model; 3.4.2 Analysis from Attacker's Perspective; 3.4.3Intro; Preface; Acknowledgements; Contents; 1 Introduction; 1.1 Distributed Inference Networks; 1.2 Motivation: Byzantine Generals' Problem; 1.3 Distributed Inference in the Presence of Byzantines: Two Viewpoints; 1.3.1 Analysis from the Attacker's Perspective; 1.3.2 Analysis from the Network Designer's Perspective; 1.4 Outline; References; 2 Background; 2.1 Foundational Concepts of Inference; 2.1.1 Binary Hypothesis Testing; 2.1.2 M-Ary Hypothesis Testing; 2.1.3 Parameter Estimation; 2.1.4 Asymptotic Performance Metrics; 2.2 Distributed Inference; 2.2.1 Network Topologies 2.2.2 Practical Concerns2.3 Taxonomy of Results; 2.3.1 Fundamental Limits; 2.3.2 Mitigation Schemes; References; 3 Distributed Detection with Unreliable Data Sources; 3.1 Distributed Bayesian Detection with Byzantines: Parallel Networks; 3.1.1 System Model; 3.1.2 Analysis from Attacker's Perspective; 3.1.3 Analysis from Network Designer's Perspective; 3.2 Distributed Neyman-Pearson Detection with Byzantine Data: Parallel Networks; 3.2.1 System Model; 3.2.2 Analysis from Attacker's Perspective; 3.2.3 Analysis from Network Designer's Perspective; 3.2.4 Covert Byzantine Attacks 3.3 Distributed Detection with Unlabeled Byzantine Data: Multi-hop Networks3.3.1 System Model; 3.3.2 Analysis from Attacker's Perspective; 3.3.3 Analysis from Network Designer's Perspective; 3.4 Distributed Detection with Labeled Byzantine Data: Multi-hop Networks; 3.4.1 System Model; 3.4.2 Analysis from Attacker's Perspective; 3.4.3 Analysis from Network Designer's Perspective; 3.5 Distributed Detection with Byzantine Data: Peer-to-Peer Networks; 3.5.1 System Model; 3.5.2 Analysis from Attacker's Perspective; 3.5.3 Analysis from Network Designer's Perspective; 3.6 Summary; References 4 Distributed Estimation and Target Localization4.1 Target Localization with Byzantine Data: Parallel Networks; 4.1.1 System Model; 4.1.2 Analysis from Attacker's Perspective; 4.1.3 Analysis from Network Designer's Perspective; 4.2 Distributed Parameter Estimation with Multiple Attack Strategies: Parallel Networks; 4.2.1 System Model; 4.2.2 Identification and Categorization of Sensors; 4.2.3 Joint Estimation Including Attack Parameters; 4.3 Distributed Parameter Estimation with Adversaries: Peer-to-Peer Networks; 4.3.1 System Model; 4.3.2 Analysis from Network Designer's Perspective 4.4 SummaryReferences; 5 Some Additional Topics on Distributed Inference; 5.1 Distributed Inference with M-ary Quantized Byzantine Data; 5.1.1 System Model; 5.1.2 Analysis from Attacker's Perspective; 5.2 Target Tracking with Quantized Byzantine Data; 5.2.1 System Model; 5.2.2 Analysis from Attacker's Perspective; 5.2.3 Analysis from Network Designer's Perspective; 5.3 Summary; References; 6 Distributed Inference with Unreliable Data: Some Unconventional Directions; 6.1 Friendly Byzantines to Improve Secrecy; 6.1.1 Collaborative Compressive Detection … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource
- Subjects:
- 004.6/5
Computer science
Computer network architectures
Electronic data processing -- Distributed processing
COMPUTERS / Computer Literacy
COMPUTERS / Computer Science
COMPUTERS / Data Processing
COMPUTERS / Hardware / General
COMPUTERS / Information Technology
COMPUTERS / Machine Theory
COMPUTERS / Reference
Computers -- Security -- General
Technology & Engineering -- Telecommunications
Technology & Engineering -- Electronics -- General
Computers -- Information Theory
Computers -- Mathematical & Statistical Software
Computer security
Communications engineering / telecommunications
Imaging systems & technology
Coding theory & cryptology
Maths for computer scientists
Computer Communication Networks
Data protection
Telecommunication
Coding theory
Computers -- Hardware -- Network Hardware
Network hardware
Electronic books - Languages:
- English
- ISBNs:
- 9789811323126
9811323127 - Related ISBNs:
- 9789811323119
- Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (SpringerLink, viewed September 6, 2018). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.326846
- Ingest File:
- 01_267.xml