Secure Networked Inference with Unreliable Data Sources
โ Scribed by Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney
- Publisher
- Springer Singapore
- Year
- 2018
- Tongue
- English
- Leaves
- 219
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.
โฆ Table of Contents
Front Matter ....Pages i-xiii
Introduction (Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney)....Pages 1-6
Background (Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney)....Pages 7-16
Distributed Detection with Unreliable Data Sources (Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney)....Pages 17-74
Distributed Estimation and Target Localization (Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney)....Pages 75-135
Some Additional Topics on Distributed Inference (Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney)....Pages 137-150
Distributed Inference with Unreliable Data: Some Unconventional Directions (Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney)....Pages 151-184
Back Matter ....Pages 185-208
โฆ Subjects
Computer Science; Computer Communication Networks; Systems and Data Security; Communications Engineering, Networks; Signal, Image and Speech Processing; Coding and Information Theory; Probability and Statistics in Computer Science
๐ SIMILAR VOLUMES
With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment
<span>This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.</span>
Transform the way your network teams think about and deploy enterprise network automation through the power of Nautobot's open-source platform Key Features Learn how documenting your network in Nautobot can accelerate your network automation journey Apply NetDevOps to your network by leveraging Na
Dive into key topics in network architecture implemented with the Google-backed open source Go programming language. Networking topics such as data serialization, application level protocols, character sets and encodings are discussed and demonstrated in Go. This book has been updated to the Go vers