Document Type
|
:
|
BL
|
Record Number
|
:
|
890161
|
Main Entry
|
:
|
Vempaty, Aditya
|
Title & Author
|
:
|
Secure networked inference with unreliable data sources /\ Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney.
|
Publication Statement
|
:
|
Singapore :: Springer,, 2018.
|
Page. NO
|
:
|
1 online resource
|
ISBN
|
:
|
9789811323126
|
|
:
|
: 9789811323133
|
|
:
|
: 9789811347658
|
|
:
|
: 9811323127
|
|
:
|
: 9811323135
|
|
:
|
: 9811347654
|
|
:
|
9789811323119
|
|
:
|
9811323119
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references.
|
Contents
|
:
|
Intro; Preface; Acknowledgements; Contents; 1 Introduction; 1.1 Distributed Inference Networks; 1.2 Motivation: Byzantine Generals' Problem; 1.3 Distributed Inference in the Presence of Byzantines: Two Viewpoints; 1.3.1 Analysis from the Attacker's Perspective; 1.3.2 Analysis from the Network Designer's Perspective; 1.4 Outline; References; 2 Background; 2.1 Foundational Concepts of Inference; 2.1.1 Binary Hypothesis Testing; 2.1.2 M-Ary Hypothesis Testing; 2.1.3 Parameter Estimation; 2.1.4 Asymptotic Performance Metrics; 2.2 Distributed Inference; 2.2.1 Network Topologies.
|
|
:
|
2.2.2 Practical Concerns2.3 Taxonomy of Results; 2.3.1 Fundamental Limits; 2.3.2 Mitigation Schemes; References; 3 Distributed Detection with Unreliable Data Sources; 3.1 Distributed Bayesian Detection with Byzantines: Parallel Networks; 3.1.1 System Model; 3.1.2 Analysis from Attacker's Perspective; 3.1.3 Analysis from Network Designer's Perspective; 3.2 Distributed Neyman-Pearson Detection with Byzantine Data: Parallel Networks; 3.2.1 System Model; 3.2.2 Analysis from Attacker's Perspective; 3.2.3 Analysis from Network Designer's Perspective; 3.2.4 Covert Byzantine Attacks.
|
|
:
|
3.3 Distributed Detection with Unlabeled Byzantine Data: Multi-hop Networks3.3.1 System Model; 3.3.2 Analysis from Attacker's Perspective; 3.3.3 Analysis from Network Designer's Perspective; 3.4 Distributed Detection with Labeled Byzantine Data: Multi-hop Networks; 3.4.1 System Model; 3.4.2 Analysis from Attacker's Perspective; 3.4.3 Analysis from Network Designer's Perspective; 3.5 Distributed Detection with Byzantine Data: Peer-to-Peer Networks; 3.5.1 System Model; 3.5.2 Analysis from Attacker's Perspective; 3.5.3 Analysis from Network Designer's Perspective; 3.6 Summary; References.
|
|
:
|
4 Distributed Estimation and Target Localization4.1 Target Localization with Byzantine Data: Parallel Networks; 4.1.1 System Model; 4.1.2 Analysis from Attacker's Perspective; 4.1.3 Analysis from Network Designer's Perspective; 4.2 Distributed Parameter Estimation with Multiple Attack Strategies: Parallel Networks; 4.2.1 System Model; 4.2.2 Identification and Categorization of Sensors; 4.2.3 Joint Estimation Including Attack Parameters; 4.3 Distributed Parameter Estimation with Adversaries: Peer-to-Peer Networks; 4.3.1 System Model; 4.3.2 Analysis from Network Designer's Perspective.
|
|
:
|
4.4 SummaryReferences; 5 Some Additional Topics on Distributed Inference; 5.1 Distributed Inference with M-ary Quantized Byzantine Data; 5.1.1 System Model; 5.1.2 Analysis from Attacker's Perspective; 5.2 Target Tracking with Quantized Byzantine Data; 5.2.1 System Model; 5.2.2 Analysis from Attacker's Perspective; 5.2.3 Analysis from Network Designer's Perspective; 5.3 Summary; References; 6 Distributed Inference with Unreliable Data: Some Unconventional Directions; 6.1 Friendly Byzantines to Improve Secrecy; 6.1.1 Collaborative Compressive Detection.
|
Abstract
|
:
|
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.
|
Subject
|
:
|
Computer network architectures.
|
Subject
|
:
|
Electronic data processing-- Distributed processing.
|
Subject
|
:
|
Coding theory cryptology.
|
Subject
|
:
|
Communications engineering-- telecommunications.
|
Subject
|
:
|
Computer network architectures.
|
Subject
|
:
|
Computer security.
|
Subject
|
:
|
COMPUTERS-- Computer Literacy.
|
Subject
|
:
|
COMPUTERS-- Computer Science.
|
Subject
|
:
|
COMPUTERS-- Data Processing.
|
Subject
|
:
|
COMPUTERS-- Hardware-- General.
|
Subject
|
:
|
COMPUTERS-- Information Technology.
|
Subject
|
:
|
COMPUTERS-- Machine Theory.
|
Subject
|
:
|
COMPUTERS-- Reference.
|
Subject
|
:
|
Electronic data processing-- Distributed processing.
|
Subject
|
:
|
Imaging systems technology.
|
Subject
|
:
|
Maths for computer scientists.
|
Subject
|
:
|
Network hardware.
|
Dewey Classification
|
:
|
004.6/5
|
LC Classification
|
:
|
TK5105.5
|
Added Entry
|
:
|
Kailkhura, Bhavya
|
|
:
|
Varshney, Pramod K.
|