Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks
暂无分享,去创建一个
[1] G. Krumpholz,et al. Power System Observability: A Practical Algorithm Using Network Topology , 1980, IEEE Transactions on Power Apparatus and Systems.
[2] Lang Tong,et al. Malicious data attack on real-time electricity market , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[3] P. J. Huber. A Robust Version of the Probability Ratio Test , 1965 .
[4] Pramod K. Varshney,et al. Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques , 2013, IEEE Transactions on Signal Processing.
[5] Pramod K. Varshney,et al. False Discovery Rate Based Sensor Decision Rules for the Network-Wide Distributed Detection Problem , 2011, IEEE Transactions on Aerospace and Electronic Systems.
[6] Pramod K. Varshney,et al. Optimal Byzantine attacks on distributed detection in tree-based topologies , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[7] Lang Tong,et al. On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.
[8] Pramod K. Varshney,et al. Adaptive learning of Byzantines' behavior in cooperative spectrum sensing , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[9] P.K. Varshney,et al. Target Location Estimation in Sensor Networks With Quantized Data , 2006, IEEE Transactions on Signal Processing.
[10] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[11] Peng Ning,et al. A Byzantine attack defender: The Conditional Frequency Check , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.
[12] Kaigui Bian,et al. Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[13] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[14] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[15] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.
[16] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[17] Lang Tong,et al. Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.
[18] Liyan Jia,et al. On the nonlinearity effects on malicious data attack on power system , 2012, 2012 IEEE Power and Energy Society General Meeting.
[19] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[20] Pramod K Varshney,et al. Distributed inference in wireless sensor networks , 2012, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.
[21] Pramod K. Varshney,et al. False discovery rate based distributed detection in the presence of Byzantines , 2014, IEEE Transactions on Aerospace and Electronic Systems.
[22] P.K. Varshney,et al. Optimal Data Fusion in Multiple Sensor Detection Systems , 1986, IEEE Transactions on Aerospace and Electronic Systems.
[23] Hao Chen,et al. Noise Enhanced Signal Detection and Estimation , 2007, 2007 Conference Record of the Forty-First Asilomar Conference on Signals, Systems and Computers.
[24] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[25] Lang Tong,et al. Impact of Data Quality on Real-Time Locational Marginal Price , 2012, IEEE Transactions on Power Systems.