Distributed Inference With M-Ary Quantized Data in the Presence of Byzantine Attacks
Publisher:
Year
: 2014DOI: 10.1109/TSP.2014.2314072
Keyword(s): distributed sensors,quantisation (signal),sensor fusion,telecommunication security,Byzantine node attack,FC,M-ary quantized data,asymptotic analysis,discrete M-ary channel,distributed inference network,distributed sensor network,falsified symbol transmission,fusion center,malicious nodes,optimal Byzantine attack,optimal reputation-based scheme,quantization alphabet-set,resource-constrained Byzantine attacks,symmetric attack strategy,Equations,Estimation,Quantization (signal)
Collections
:
-
Statistics
Distributed Inference With M-Ary Quantized Data in the Presence of Byzantine Attacks
Show full item record
| contributor author | Nadendla, V. Sriram Siddhardh | |
| contributor author | Han, Yunghsiang S. | |
| contributor author | Varshney, Pramod K. | |
| date accessioned | 2020-03-12T23:54:49Z | |
| date available | 2020-03-12T23:54:49Z | |
| date issued | 2014 | |
| identifier issn | 1053-587X | |
| identifier other | 6778791.pdf | |
| identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1127852?locale-attribute=en | |
| format | general | |
| language | English | |
| publisher | IEEE | |
| title | Distributed Inference With M-Ary Quantized Data in the Presence of Byzantine Attacks | |
| type | Journal Paper | |
| contenttype | Metadata Only | |
| identifier padid | 8307866 | |
| subject keywords | distributed sensors | |
| subject keywords | quantisation (signal) | |
| subject keywords | sensor fusion | |
| subject keywords | telecommunication security | |
| subject keywords | Byzantine node attack | |
| subject keywords | FC | |
| subject keywords | M-ary quantized data | |
| subject keywords | asymptotic analysis | |
| subject keywords | discrete M-ary channel | |
| subject keywords | distributed inference network | |
| subject keywords | distributed sensor network | |
| subject keywords | falsified symbol transmission | |
| subject keywords | fusion center | |
| subject keywords | malicious nodes | |
| subject keywords | optimal Byzantine attack | |
| subject keywords | optimal reputation-based scheme | |
| subject keywords | quantization alphabet-set | |
| subject keywords | resource-constrained Byzantine attacks | |
| subject keywords | symmetric attack strategy | |
| subject keywords | Equations | |
| subject keywords | Estimation | |
| subject keywords | Quantization (signal) | |
| identifier doi | 10.1109/TSP.2014.2314072 | |
| journal title | Signal Processing, IEEE Transactions on | |
| journal volume | 62 | |
| journal issue | 10 | |
| filesize | 3154898 | |
| citations | 0 |


