Secure Networked Inference with Unreliable Data Sources

The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In pa...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Vempaty, Aditya (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Kailkhura, Bhavya (http://id.loc.gov/vocabulary/relators/aut), Varshney, Pramod K. (http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Singapore : Springer Singapore : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03682nam a2200613 4500
001 978-981-13-2312-6
003 DE-He213
005 20191220130841.0
007 cr nn 008mamaa
008 180830s2018 si | s |||| 0|eng d
020 |a 9789811323126  |9 978-981-13-2312-6 
024 7 |a 10.1007/978-981-13-2312-6  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
072 7 |a UKN  |2 thema 
082 0 4 |a 004.6  |2 23 
100 1 |a Vempaty, Aditya.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Secure Networked Inference with Unreliable Data Sources  |h [electronic resource] /  |c by Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney. 
250 |a 1st ed. 2018. 
264 1 |a Singapore :  |b Springer Singapore :  |b Imprint: Springer,  |c 2018. 
300 |a XIII, 208 p. 74 illus., 71 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Chapter 1 Introduction -- Chapter 2 Conventional Inference theories -- Chapter 3 Distributed Detection in Networks -- Chapter 4 Distributed Estimation and Target Localization -- Chapter 5 Distributed Classification and Target Tracking -- Chapter 6 New Research Directions Discussion and conclusions. 
520 |a The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Electrical engineering. 
650 0 |a Signal processing. 
650 0 |a Image processing. 
650 0 |a Speech processing systems. 
650 0 |a Coding theory. 
650 0 |a Information theory. 
650 0 |a Mathematical statistics. 
650 1 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Communications Engineering, Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/T24035 
650 2 4 |a Signal, Image and Speech Processing.  |0 http://scigraph.springernature.com/things/product-market-codes/T24051 
650 2 4 |a Coding and Information Theory.  |0 http://scigraph.springernature.com/things/product-market-codes/I15041 
650 2 4 |a Probability and Statistics in Computer Science.  |0 http://scigraph.springernature.com/things/product-market-codes/I17036 
700 1 |a Kailkhura, Bhavya.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Varshney, Pramod K.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9789811323119 
776 0 8 |i Printed edition:  |z 9789811323133 
776 0 8 |i Printed edition:  |z 9789811347658 
856 4 0 |u https://doi.org/10.1007/978-981-13-2312-6  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)