Adversary-resilient distributed and decentralized statistical inference and machine learning: An overview of recent advances under the Byzantine threat model
Statistical inference and machine-learning algorithms have traditionally been developed for
data available at a single location. Unlike this centralized setting, modern data sets are …
data available at a single location. Unlike this centralized setting, modern data sets are …
DDoS attacks with randomized traffic innovation: Botnet identification challenges and strategies
Distributed Denial-of-Service (DDoS) attacks are usually launched through the botnet, an
“army” of compromised nodes hidden in the network. Inferential tools for DDoS mitigation …
“army” of compromised nodes hidden in the network. Inferential tools for DDoS mitigation …
Cooperative spectrum sensing with M-ary quantized data in cognitive radio networks under SSDF attacks
In this paper, we address the challenging and important cooperative spectrum sensing
(CSS) problem with M-ary quantized data under spectrum sensing data falsification (SSDF) …
(CSS) problem with M-ary quantized data under spectrum sensing data falsification (SSDF) …
Distributed detection of sparse stochastic signals with 1-bit data in tree-structured sensor networks
In this paper, we consider the problem of detection of sparse stochastic signals based on 1-
bit data with tree-structured sensor networks (TSNs). In the literature, distributed detection of …
bit data with tree-structured sensor networks (TSNs). In the literature, distributed detection of …
Adversarial Kendall's model towards containment of distributed cyber-threats
This work examines propagation of cyber-threats over networks under an adversarial
formulation. Exploiting Kendall's birth-death-immigration model, we propose an analytical …
formulation. Exploiting Kendall's birth-death-immigration model, we propose an analytical …
Distributed detection over blockchain-aided Internet of Things in the presence of attacks
Distributed detection over a blockchain-aided Internet of Things (BIoT) network in the
presence of attacks is considered, where the integrated blockchain is employed to secure …
presence of attacks is considered, where the integrated blockchain is employed to secure …
Byzantine attacker identification in collaborative spectrum sensing: A robust defense framework
The problem of Byzantine attack in collaborative spectrum sensing (CSS) is considered in
this paper. To defend against Byzantine attack, a robust defense framework is proposed to …
this paper. To defend against Byzantine attack, a robust defense framework is proposed to …
Distributed detection of sparse signals with censoring sensors in clustered sensor networks
In this paper, we explore the distributed detection of sparse signals in energy-limited
clustered sensor networks (CSNs). For this problem, the centralized detector based on …
clustered sensor networks (CSNs). For this problem, the centralized detector based on …
Byzantine defense in collaborative spectrum sensing via Bayesian learning
Collaborative spectrum sensing (CSS) enables secondary users in cognitive radio networks
to collaboratively explore spectrum holes as well as protecting the primary user from being …
to collaboratively explore spectrum holes as well as protecting the primary user from being …
Defending against byzantine attack in cooperative spectrum sensing: Defense reference and performance analysis
Cooperative spectrum sensing (CSS) has been well recognized as an effective method to
improve spectrum sensing accuracy and decrease sensing devices' complexity. However …
improve spectrum sensing accuracy and decrease sensing devices' complexity. However …