๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Secure Networked Inference with Unreliable Data Sources

โœ Scribed by Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney


Publisher
Springer Singapore
Year
2018
Tongue
English
Leaves
219
Edition
1st ed.
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.

โœฆ Table of Contents


Front Matter ....Pages i-xiii
Introduction (Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney)....Pages 1-6
Background (Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney)....Pages 7-16
Distributed Detection with Unreliable Data Sources (Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney)....Pages 17-74
Distributed Estimation and Target Localization (Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney)....Pages 75-135
Some Additional Topics on Distributed Inference (Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney)....Pages 137-150
Distributed Inference with Unreliable Data: Some Unconventional Directions (Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney)....Pages 151-184
Back Matter ....Pages 185-208

โœฆ Subjects


Computer Science; Computer Communication Networks; Systems and Data Security; Communications Engineering, Networks; Signal, Image and Speech Processing; Coding and Information Theory; Probability and Statistics in Computer Science


๐Ÿ“œ SIMILAR VOLUMES


Secure Data Provenance and Inference Con
โœ Bhavani Thuraisingham, Tyrone Cadenhead, Murat Kantarcioglu ๐Ÿ“‚ Library ๐Ÿ“… 2014 ๐Ÿ› Auerbach Publications ๐ŸŒ English

With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment

Secure Data Networking
โœ Michael Purser ๐Ÿ“‚ Library ๐Ÿ“… 1993 ๐Ÿ› Artech House Publishers ๐ŸŒ English

<span>This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.</span>

Network Automation with Nautobot: Adopt
โœ Jason Edelman, Glenn Matthews, Josh Vanderaa ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Packt Publishing ๐ŸŒ English

Transform the way your network teams think about and deploy enterprise network automation through the power of Nautobot's open-source platform Key Features Learn how documenting your network in Nautobot can accelerate your network automation journey Apply NetDevOps to your network by leveraging Na

Network Programming with Go Language : E
โœ Jan Newmarch; Ronald Petty ๐Ÿ“‚ Library ๐Ÿ› Apress ๐ŸŒ English

Dive into key topics in network architecture implemented with the Google-backed open source Go programming language. Networking topics such as data serialization, application level protocols, character sets and encodings are discussed and demonstrated in Go. This book has been updated to the Go vers