LEADER 04118nam 22007575 450 001 9910349472503321 005 20200703114858.0 010 $a9789811323126 010 $a981-13-2312-7 024 7 $a10.1007/978-981-13-2312-6 035 $a(CKB)4100000008525703 035 $a(MiAaPQ)EBC5504974 035 $a(DE-He213)978-981-13-2312-6 035 $a(PPN)229913903 035 $a(EXLCZ)994100000008525703 100 $a20180830d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecure Networked Inference with Unreliable Data Sources$b[electronic resource] /$fby Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney 205 $a1st ed. 2018. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2018. 215 $a1 online resource (XIII, 208 p. 74 illus., 71 illus. in color.) 311 $a981-13-2311-9 327 $aChapter 1 Introduction -- Chapter 2 Conventional Inference theories -- Chapter 3 Distributed Detection in Networks -- Chapter 4 Distributed Estimation and Target Localization -- Chapter 5 Distributed Classification and Target Tracking -- Chapter 6 New Research Directions Discussion and conclusions. 330 $aThe book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference. 606 $aComputer communication systems 606 $aComputer security 606 $aElectrical engineering 606 $aSignal processing 606 $aImage processing 606 $aSpeech processing systems 606 $aCoding theory 606 $aInformation theory 606 $aMathematical statistics 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aSignal, Image and Speech Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/T24051 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aProbability and Statistics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17036 615 0$aComputer communication systems. 615 0$aComputer security. 615 0$aElectrical engineering. 615 0$aSignal processing. 615 0$aImage processing. 615 0$aSpeech processing systems. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aMathematical statistics. 615 14$aComputer Communication Networks. 615 24$aSystems and Data Security. 615 24$aCommunications Engineering, Networks. 615 24$aSignal, Image and Speech Processing. 615 24$aCoding and Information Theory. 615 24$aProbability and Statistics in Computer Science. 676 $a004.6 700 $aVempaty$b Aditya$4aut$4http://id.loc.gov/vocabulary/relators/aut$0933173 702 $aKailkhura$b Bhavya$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aVarshney$b Pramod K$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910349472503321 996 $aSecure Networked Inference with Unreliable Data Sources$92100371 997 $aUNINA