Adversary-resilient distributed and decentralized statistical inference and machine learning: An overview of recent advances under the Byzantine threat model

Z Yang, A Gang, WU Bajwa - IEEE Signal Processing …, 2020 - ieeexplore.ieee.org
Statistical inference and machine-learning algorithms have traditionally been developed for
data available at a single location. Unlike this centralized setting, modern data sets are …

DDoS attacks with randomized traffic innovation: Botnet identification challenges and strategies

V Matta, M Di Mauro, M Longo - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an
“army” of compromised nodes hidden in the network. Inferential tools for DDoS mitigation …

Cooperative spectrum sensing with M-ary quantized data in cognitive radio networks under SSDF attacks

H Chen, M Zhou, L **e, J Li - IEEE transactions on wireless …, 2017 - ieeexplore.ieee.org
In this paper, we address the challenging and important cooperative spectrum sensing
(CSS) problem with M-ary quantized data under spectrum sensing data falsification (SSDF) …

Distributed detection of sparse stochastic signals with 1-bit data in tree-structured sensor networks

C Li, G Li, PK Varshney - IEEE Transactions on Signal …, 2020 - ieeexplore.ieee.org
In this paper, we consider the problem of detection of sparse stochastic signals based on 1-
bit data with tree-structured sensor networks (TSNs). In the literature, distributed detection of …

Adversarial Kendall's model towards containment of distributed cyber-threats

P Addesso, M Barni, M Di Mauro… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This work examines propagation of cyber-threats over networks under an adversarial
formulation. Exploiting Kendall's birth-death-immigration model, we propose an analytical …

Distributed detection over blockchain-aided Internet of Things in the presence of attacks

Y Jiang, J Zhang - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
Distributed detection over a blockchain-aided Internet of Things (BIoT) network in the
presence of attacks is considered, where the integrated blockchain is employed to secure …

Byzantine attacker identification in collaborative spectrum sensing: A robust defense framework

L Zhang, G Nie, G Ding, Q Wu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The problem of Byzantine attack in collaborative spectrum sensing (CSS) is considered in
this paper. To defend against Byzantine attack, a robust defense framework is proposed to …

Distributed detection of sparse signals with censoring sensors in clustered sensor networks

C Li, G Li, PK Varshney - Information Fusion, 2022 - Elsevier
In this paper, we explore the distributed detection of sparse signals in energy-limited
clustered sensor networks (CSNs). For this problem, the centralized detector based on …

Byzantine defense in collaborative spectrum sensing via Bayesian learning

G Nie, G Ding, L Zhang, Q Wu - IEEE Access, 2017 - ieeexplore.ieee.org
Collaborative spectrum sensing (CSS) enables secondary users in cognitive radio networks
to collaboratively explore spectrum holes as well as protecting the primary user from being …

Defending against byzantine attack in cooperative spectrum sensing: Defense reference and performance analysis

L Zhang, G Ding, Q Wu, F Song - IEEE Access, 2016 - ieeexplore.ieee.org
Cooperative spectrum sensing (CSS) has been well recognized as an effective method to
improve spectrum sensing accuracy and decrease sensing devices' complexity. However …