-
1
-
-
0035094468
-
Quasi-convexity and optimal binary fusion for distributed detection with identical sensors in generalized Gaussian noise
-
DOI 10.1109/18.904560, PII S001894480100582X
-
W. Shi, T. Sun, and R. Wesel, "Quasi-convexity and optimal binary fusion for distributed detection with identical sensors in generalized gaussian noise," IEEE Trans. Inf. Theory, vol. 47, no. 1, pp. 446-450, Jan. 2001. (Pubitemid 32248230)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.1
, pp. 446-450
-
-
Shi, W.1
Sun, T.W.2
Wesel, R.D.3
-
2
-
-
84872103134
-
Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes
-
Jan
-
E. Soltanmohammadi, M. Orooji, and M. Naraghi-Pour, "Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes," IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 205-215, Jan. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.1
, pp. 205-215
-
-
Soltanmohammadi, E.1
Orooji, M.2
Naraghi-Pour, M.3
-
3
-
-
58649109373
-
Distributed detection in the presence of Byzantine attacks
-
Jan
-
S. Marano, V. Matta, and L. Tong, "Distributed detection in the presence of Byzantine attacks," IEEE Trans. Signal Process., vol. 57, no. 1, pp. 16-29, Jan. 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.1
, pp. 16-29
-
-
Marano, S.1
Matta, V.2
Tong, L.3
-
4
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Apr./Jun
-
Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," Commun. Surveys Tuts., vol. 8, no. 2, pp. 2-23, Apr./Jun. 2006.
-
(2006)
Commun. Surveys Tuts.
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
-
5
-
-
0037086890
-
Wireless sensor networks: A survey
-
DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: A survey," Comput. Netw., vol. 38, no. 4, pp. 393-422, Mar. 2002. (Pubitemid 34181630)
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
7
-
-
0022604939
-
Optimal data fusion in multiple sensor detection systems
-
Z. Chair and P. Varshney, "Optimal data fusion in multiple sensor detection systems," IEEE Trans. Aerosp. Electron. Syst., vol. 22, no. 1, pp. 98-101, Jan. 1986. (Pubitemid 16572493)
-
(1986)
IEEE Transactions on Aerospace and Electronic Systems
, vol.AES-22
, Issue.1
, pp. 98-101
-
-
Chair, Z.1
Varshney, P.K.2
-
8
-
-
6344287014
-
Channel aware decision fusion in wireless sensor networks
-
Dec
-
B. Chen, R. Jiang, T. Kasetkasem, and P. Varshney, "Channel aware decision fusion in wireless sensor networks," IEEE Trans. Signal Process., vol. 52, no. 12, pp. 3454-3458, Dec. 2004.
-
(2004)
IEEE Trans. Signal Process.
, vol.52
, Issue.12
, pp. 3454-3458
-
-
Chen, B.1
Jiang, R.2
Kasetkasem, T.3
Varshney, P.4
-
9
-
-
33244488501
-
Fusion of decisions transmitted over Rayleigh fading channels in wireless sensor networks
-
DOI 10.1109/TSP.2005.863033
-
R. Niu, B. Chen, and P. Varshney, "Fusion of decisions transmitted over rayleigh fading channels in wireless sensor networks," IEEE Trans. Signal Process., vol. 54, no. 3, pp. 1018-1027, Mar. 2006. (Pubitemid 43280577)
-
(2006)
IEEE Transactions on Signal Processing
, vol.54
, Issue.3
, pp. 1018-1027
-
-
Niu, R.1
Chen, B.2
Varshney, P.K.3
-
10
-
-
79959307127
-
Secure detection in wireless sensor networks using a simple encryption method
-
Cancun, Mexico, Mar
-
M. Naraghi-Pour and V. Nadendla, "Secure detection in wireless sensor networks using a simple encryption method," in Proc. IEEE WCNC, Cancun, Mexico, Mar. 2011, pp. 114-119.
-
(2011)
Proc. IEEE WCNC
, pp. 114-119
-
-
Naraghi-Pour, M.1
Nadendla, V.2
-
11
-
-
44049101044
-
Sensor data cryptography in wireless sensor networks
-
DOI 10.1109/TIFS.2008.919119, 4470151
-
T. Aysal and K. Barner, "Sensor data cryptography in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 273-289, Jun. 2008. (Pubitemid 351709460)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.2
, pp. 273-289
-
-
Aysal, T.C.1
Barner, K.E.2
-
12
-
-
33744912851
-
Optimal distributed detection strategies for wireless sensor networks
-
Monticello, IL, USA
-
K. Liu and A. M. Sayeed, "Optimal distributed detection strategies for wireless sensor networks," in Proc. 42nd Annu. Allerton Conf. Commun., Control Comp., Monticello, IL, USA, 2004, pp. 1-11.
-
(2004)
Proc. 42nd Annu. Allerton Conf. Commun., Control Comp.
, pp. 1-11
-
-
Liu, K.1
Sayeed, A.M.2
-
13
-
-
84894160135
-
Cooperative secure transmission for distributed detection in wireless sensor networks
-
Seoul, Korea, Aug
-
H. Jeon, S. McLaughlin, and J. Ha, "Cooperative secure transmission for distributed detection in wireless sensor networks," in Proc. IEEE 54th Int. MWSCAS, Seoul, Korea, Aug. 2011, pp. 1-4.
-
(2011)
Proc. IEEE 54th Int. MWSCAS
, pp. 1-4
-
-
Jeon, H.1
McLaughlin, S.2
Ha, J.3
-
14
-
-
84875140327
-
Channel aware encryption and decision fusion for wireless sensor networks
-
Apr
-
H. Jeon, J. Choi, S. McLaughlin, and J. Ha, "Channel aware encryption and decision fusion for wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 619-625, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 619-625
-
-
Jeon, H.1
Choi, J.2
McLaughlin, S.3
Ha, J.4
-
15
-
-
80051774471
-
Secure type-based multiple access
-
Sep
-
H. Jeon, D. Hwang, J. Choi, H. Lee, and J. Ha, "Secure type-based multiple access," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 763-774, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 763-774
-
-
Jeon, H.1
Hwang, D.2
Choi, J.3
Lee, H.4
Ha, J.5
-
16
-
-
84863928823
-
Scalable PHY-layer security for distributed detection in wireless sensor networks
-
Aug
-
R. Soosahabi and M. Naraghi-Pour, "Scalable PHY-layer security for distributed detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1118-1126, Aug. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.4
, pp. 1118-1126
-
-
Soosahabi, R.1
Naraghi-Pour, M.2
-
17
-
-
65649139984
-
Distributed detection with censoring sensors under physical layer secrecy
-
May
-
S. Marano, V. Matta, and P. Willett, "Distributed detection with censoring sensors under physical layer secrecy," IEEE Trans. Signal Process., vol. 57, no. 5, pp. 1976-1986, May 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.5
, pp. 1976-1986
-
-
Marano, S.1
Matta, V.2
Willett, P.3
-
18
-
-
0030128940
-
Censoring sensors: A low-communication-rate scheme for distributed detection
-
C. Rago, P. Willett, and Y. Bar-Shalom, "Censoring sensors: A lowcommunication-rate scheme for distributed detection," IEEE Trans. Aerosp. Electron. Syst., vol. 32, no. 2, pp. 554-568, Apr. 1996. (Pubitemid 126775563)
-
(1996)
IEEE Transactions on Aerospace and Electronic Systems
, vol.32
, Issue.2
, pp. 554-568
-
-
Rago, C.1
-
19
-
-
44049083063
-
Distributed inference in the presence of Byzantine sensors
-
Pacific Grove, CA, Nov
-
S. Marano, V. Matta, and L. Tong, "Distributed inference in the presence of Byzantine sensors," in Proc. 14th ACSSC, Pacific Grove, CA, Nov. 2006, pp. 281-284.
-
(2006)
Proc. 14th ACSSC
, pp. 281-284
-
-
Marano, S.1
Matta, V.2
Tong, L.3
-
20
-
-
58649109373
-
Distributed detection in the presence of Byzantine attacks
-
Jan
-
S. Marano, V. Matta, and L. Tong, "Distributed detection in the presence of Byzantine attacks," IEEE Trans. Signal Process., vol. 57, no. 1, pp. 16-29, Jan. 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.1
, pp. 16-29
-
-
Marano, S.1
Matta, V.2
Tong, L.3
-
21
-
-
84863057306
-
Reliable data fusion in wireless sensor networks under Byzantine attacks
-
Baltimore, MD, USA, Nov
-
M. Abdelhakim, L. E. Lightfoot, and T. Li, "Reliable data fusion in wireless sensor networks under Byzantine attacks," in Proc. Mil. Commun. Conf., Baltimore, MD, USA, Nov. 2011, pp. 810-815.
-
(2011)
Proc. Mil. Commun. Conf.
, pp. 810-815
-
-
Abdelhakim, M.1
Lightfoot, L.E.2
Li, T.3
-
22
-
-
84862913450
-
On noise-enhanced distributed inference in the presence of Byzantines
-
Monticello, IL, USA, Sep
-
M. Gagrani, P. Sharma, S. Iyengar, V. Nadendla, A. Vempaty, H. Chen, et al., "On noise-enhanced distributed inference in the presence of Byzantines," in Proc. 49th Annu. Allerton Conf. Commun., Control, Comput., Monticello, IL, USA, Sep. 2011, pp. 1222-1229.
-
(2011)
Proc. 49th Annu. Allerton Conf. Commun., Control, Comput.
, pp. 1222-1229
-
-
Gagrani, M.1
Sharma, P.2
Iyengar, S.3
Nadendla, V.4
Vempaty, A.5
Chen, H.6
-
23
-
-
78049376006
-
Countering Byzantine attacks in cognitive radio networks
-
Dallas, TX, USA, Mar
-
A. Rawat, P. Anand, H. Chen, and P. Varshney, "Countering Byzantine attacks in cognitive radio networks," in Proc. IEEE ICASSP, Dallas, TX, USA, Mar. 2010, pp. 3098-3101.
-
(2010)
Proc. IEEE ICASSP
, pp. 3098-3101
-
-
Rawat, A.1
Anand, P.2
Chen, H.3
Varshney, P.4
-
24
-
-
77952180713
-
Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks
-
Bangalore, India, Jan
-
P. Anand, A. Rawat, H. Chen, and P. Varshney, "Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks," in Proc. 2nd Int. Conf. Commun. Syst. Netw., Bangalore, India, Jan. 2010, pp. 1-9.
-
(2010)
Proc. 2nd Int. Conf. Commun. Syst. Netw.
, pp. 1-9
-
-
Anand, P.1
Rawat, A.2
Chen, H.3
Varshney, P.4
-
25
-
-
80051614077
-
Cooperative sensing in cognitive networks under malicious attack
-
Prague, Czech Republic, May
-
M. Abdelhakim, L. Zhang, J. Ren, and T. Li, "Cooperative sensing in cognitive networks under malicious attack," in Proc. IEEE ICASSP, Prague, Czech Republic, May 2011, pp. 3004-3007.
-
(2011)
Proc. IEEE ICASSP
, pp. 3004-3007
-
-
Abdelhakim, M.1
Zhang, L.2
Ren, J.3
Li, T.4
-
26
-
-
77953712316
-
On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks
-
Princeton, NJ, USA, Mar
-
H. Wang, L. Lightfoot, and T. Li, "On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks," in Proc. 44th Annu. CISS, Princeton, NJ, USA, Mar. 2010, pp. 1-6.
-
(2010)
Proc. 44th Annu. CISS
, pp. 1-6
-
-
Wang, H.1
Lightfoot, L.2
Li, T.3
-
27
-
-
78651372721
-
Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks
-
Feb
-
A. Rawat, P. Anand, H. Chen, and P. Varshney, "Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks," IEEE Trans. Signal Process., vol. 59, no. 2, pp. 774-786, Feb. 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.2
, pp. 774-786
-
-
Rawat, A.1
Anand, P.2
Chen, H.3
Varshney, P.4
-
28
-
-
84863341424
-
Detecting and counteracting statistical attacks in cooperative spectrum sensing
-
Apr
-
F. Penna, Y. Sun, L. Dolecek, and D. Cabric, "Detecting and counteracting statistical attacks in cooperative spectrum sensing," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1806-1822, Apr. 2012.
-
(2012)
IEEE Trans. Signal Process.
, vol.60
, Issue.4
, pp. 1806-1822
-
-
Penna, F.1
Sun, Y.2
Dolecek, L.3
Cabric, D.4
-
29
-
-
0024701609
-
Optimum local decision space partitioning for distributed detection
-
Jul
-
C.-C. Lee and J.-J. Chao, "Optimum local decision space partitioning for distributed detection," IEEE Trans. Aerosp. Electron. Syst., vol. 25, no. 4, pp. 536-544, Jul. 1989.
-
(1989)
IEEE Trans. Aerosp. Electron. Syst.
, vol.25
, Issue.4
, pp. 536-544
-
-
Lee, C.-C.1
Chao, J.-J.2
-
32
-
-
0003663467
-
-
4th ed. New York, NY, USA: McGraw-Hill
-
A. Papoulis and S. Pillai, Probabilty, Random Variables and Stochastic Processes, 4th ed. New York, NY, USA: McGraw-Hill, 2009.
-
(2009)
Probabilty, Random Variables and Stochastic Processes
-
-
Papoulis, A.1
Pillai, S.2
-
34
-
-
65249157560
-
The divergence and Bhattacharyya distance measures in signal selection
-
Feb
-
T. Kailath, "The divergence and Bhattacharyya distance measures in signal selection," IEEE Trans. Commun. Technol., vol. 15, no. 1, pp. 52-60, Feb. 1967.
-
(1967)
IEEE Trans. Commun. Technol.
, vol.15
, Issue.1
, pp. 52-60
-
-
Kailath, T.1
-
35
-
-
67650149744
-
Detection outage and detection diversity in a homogeneous distributed sensor network
-
Jul
-
H.-S. Kim, J. Wang, P. Cai, and S. Cui, "Detection outage and detection diversity in a homogeneous distributed sensor network," IEEE Trans. Signal Process., vol. 57, no. 7, pp. 2875-2881, Jul. 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.7
, pp. 2875-2881
-
-
Kim, H.-S.1
Wang, J.2
Cai, P.3
Cui, S.4
-
39
-
-
0001033554
-
An algorithm for finding all vertices of convex polyhedral sets
-
Mar
-
M. L. Balinski, "An algorithm for finding all vertices of convex polyhedral sets," SIAM J. Appl. Math., vol. 9, no. 1, pp. 72-88, Mar. 1961.
-
(1961)
SIAM J. Appl. Math.
, vol.9
, Issue.1
, pp. 72-88
-
-
Balinski, M.L.1
-
40
-
-
65449138003
-
Optimal power allocation for distributed detection over MIMO channels in wireless sensor networks
-
Sep
-
X. Zhang, P. Vincent, and M. Chiang, "Optimal power allocation for distributed detection over MIMO channels in wireless sensor networks," IEEE Trans. Signal Process., vol. 56, no. 9, pp. 4124-4140, Sep. 2008.
-
(2008)
IEEE Trans. Signal Process.
, vol.56
, Issue.9
, pp. 4124-4140
-
-
Zhang, X.1
Vincent, P.2
Chiang, M.3
|