Secure networked inference with unreliable data sources /
نام عام مواد
[Book]
نام نخستين پديدآور
Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney.
وضعیت نشر و پخش و غیره
محل نشرو پخش و غیره
Singapore :
نام ناشر، پخش کننده و غيره
Springer,
تاریخ نشرو بخش و غیره
2018.
مشخصات ظاهری
نام خاص و کميت اثر
1 online resource
یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references.
یادداشتهای مربوط به مندرجات
متن يادداشت
Intro; Preface; Acknowledgements; Contents; 1 Introduction; 1.1 Distributed Inference Networks; 1.2 Motivation: Byzantine Generals' Problem; 1.3 Distributed Inference in the Presence of Byzantines: Two Viewpoints; 1.3.1 Analysis from the Attacker's Perspective; 1.3.2 Analysis from the Network Designer's Perspective; 1.4 Outline; References; 2 Background; 2.1 Foundational Concepts of Inference; 2.1.1 Binary Hypothesis Testing; 2.1.2 M-Ary Hypothesis Testing; 2.1.3 Parameter Estimation; 2.1.4 Asymptotic Performance Metrics; 2.2 Distributed Inference; 2.2.1 Network Topologies.
متن يادداشت
2.2.2 Practical Concerns2.3 Taxonomy of Results; 2.3.1 Fundamental Limits; 2.3.2 Mitigation Schemes; References; 3 Distributed Detection with Unreliable Data Sources; 3.1 Distributed Bayesian Detection with Byzantines: Parallel Networks; 3.1.1 System Model; 3.1.2 Analysis from Attacker's Perspective; 3.1.3 Analysis from Network Designer's Perspective; 3.2 Distributed Neyman-Pearson Detection with Byzantine Data: Parallel Networks; 3.2.1 System Model; 3.2.2 Analysis from Attacker's Perspective; 3.2.3 Analysis from Network Designer's Perspective; 3.2.4 Covert Byzantine Attacks.
متن يادداشت
3.3 Distributed Detection with Unlabeled Byzantine Data: Multi-hop Networks3.3.1 System Model; 3.3.2 Analysis from Attacker's Perspective; 3.3.3 Analysis from Network Designer's Perspective; 3.4 Distributed Detection with Labeled Byzantine Data: Multi-hop Networks; 3.4.1 System Model; 3.4.2 Analysis from Attacker's Perspective; 3.4.3 Analysis from Network Designer's Perspective; 3.5 Distributed Detection with Byzantine Data: Peer-to-Peer Networks; 3.5.1 System Model; 3.5.2 Analysis from Attacker's Perspective; 3.5.3 Analysis from Network Designer's Perspective; 3.6 Summary; References.
متن يادداشت
4 Distributed Estimation and Target Localization4.1 Target Localization with Byzantine Data: Parallel Networks; 4.1.1 System Model; 4.1.2 Analysis from Attacker's Perspective; 4.1.3 Analysis from Network Designer's Perspective; 4.2 Distributed Parameter Estimation with Multiple Attack Strategies: Parallel Networks; 4.2.1 System Model; 4.2.2 Identification and Categorization of Sensors; 4.2.3 Joint Estimation Including Attack Parameters; 4.3 Distributed Parameter Estimation with Adversaries: Peer-to-Peer Networks; 4.3.1 System Model; 4.3.2 Analysis from Network Designer's Perspective.
متن يادداشت
4.4 SummaryReferences; 5 Some Additional Topics on Distributed Inference; 5.1 Distributed Inference with M-ary Quantized Byzantine Data; 5.1.1 System Model; 5.1.2 Analysis from Attacker's Perspective; 5.2 Target Tracking with Quantized Byzantine Data; 5.2.1 System Model; 5.2.2 Analysis from Attacker's Perspective; 5.2.3 Analysis from Network Designer's Perspective; 5.3 Summary; References; 6 Distributed Inference with Unreliable Data: Some Unconventional Directions; 6.1 Friendly Byzantines to Improve Secrecy; 6.1.1 Collaborative Compressive Detection.
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.
یادداشتهای مربوط به سفارشات
منبع سفارش / آدرس اشتراک
Springer Nature
شماره انبار
com.springer.onix.9789811323126
ویراست دیگر از اثر در قالب دیگر رسانه
عنوان
Secure networked inference with unreliable data sources.
شماره استاندارد بين المللي کتاب و موسيقي
9789811323119
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer network architectures.
موضوع مستند نشده
Electronic data processing-- Distributed processing.
موضوع مستند نشده
Coding theory & cryptology.
موضوع مستند نشده
Communications engineering-- telecommunications.
موضوع مستند نشده
Computer network architectures.
موضوع مستند نشده
Computer security.
موضوع مستند نشده
COMPUTERS-- Computer Literacy.
موضوع مستند نشده
COMPUTERS-- Computer Science.
موضوع مستند نشده
COMPUTERS-- Data Processing.
موضوع مستند نشده
COMPUTERS-- Hardware-- General.
موضوع مستند نشده
COMPUTERS-- Information Technology.
موضوع مستند نشده
COMPUTERS-- Machine Theory.
موضوع مستند نشده
COMPUTERS-- Reference.
موضوع مستند نشده
Electronic data processing-- Distributed processing.
موضوع مستند نشده
Imaging systems & technology.
موضوع مستند نشده
Maths for computer scientists.
موضوع مستند نشده
Network hardware.
مقوله موضوعی
موضوع مستند نشده
COM-- 013000
موضوع مستند نشده
COM-- 014000
موضوع مستند نشده
COM-- 018000
موضوع مستند نشده
COM-- 032000
موضوع مستند نشده
COM-- 037000
موضوع مستند نشده
COM-- 052000
موضوع مستند نشده
COM-- 067000
موضوع مستند نشده
UKN
موضوع مستند نشده
UKN
رده بندی ديویی
شماره
004
.
6/5
ويراست
23
رده بندی کنگره
شماره رده
TK5105
.
5
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )