LEADER 03385nam 22005895 450 001 9910484226603321 005 20221004212420.0 010 $a981-329-001-3 024 7 $a10.1007/978-981-32-9001-3 035 $a(CKB)4100000011343438 035 $a(DE-He213)978-981-32-9001-3 035 $a(MiAaPQ)EBC6272240 035 $a(PPN)262173956 035 $a(EXLCZ)994100000011343438 100 $a20200714d2021 f| 0 101 0 $aeng 135 $aurnn#---mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIInformation fusion in distributed sensor networks with Byzantines /$fAndrea Abrardo [et al.] 205 $a1st edition 2021. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2021. 215 $a1 online resource (XIX, 109 p. 26 illus., 15 illus. in color.) 225 1 $aSignals and Communication Technology,$x1860-4862 311 $a981-329-000-5 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- Preliminaries -- Security attacks and defenses in distributed sensor networks -- A Heuristic defense: A soft isolation algorithm for adversarial decision fusion -- Optimum decision fusion in the presence of Byzantines -- Nearly optimum decision fusion via message passing -- Decision fusion of hidden-Markov observations with synchronized attacks -- Decision fusion with unbalanced priors -- Decision fusion game with incomplete knowledge in a Bayesian setup -- Conclusions. 330 $aThis book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and the corresponding payoffs are derived, shedding new light on the achievable performance level and the impact that the presence of the Byzantines has on the accuracy of decisions made by the Fusion Center. Accordingly, the book offers a simple yet effective introduction to the emerging field of adversarial information fusion, providing a wealth of intuitive take-home lessons for practitioners interested in applying the most basic notions to the design of practical systems, while at the same time introducing researchers and other readers to the mathematical details behind the theory. 410 0$aSignals and Communication Technology,$x1860-4862 606 $aSignal processing 606 $aImage processing 606 $aSpeech processing systems 606 $aComputer security 606 $aSystem safety 615 0$aSignal processing. 615 0$aImage processing. 615 0$aSpeech processing systems. 615 0$aComputer security. 615 0$aSystem safety. 676 $a006.25 700 $aAbrardo$b Andrea$4aut$4http://id.loc.gov/vocabulary/relators/aut$01225719 702 $aBarni$b Mauro$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aKallas$b Kassem$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aTondi$b Benedetta$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484226603321 996 $aIInformation fusion in distributed sensor networks with Byzantines$92918856 997 $aUNINA