Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Secure Networked Inference with Unre...
~
Varshney, Pramod K.
Secure Networked Inference with Unreliable Data Sources
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Secure Networked Inference with Unreliable Data Sources/ by Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney.
Author:
Vempaty, Aditya.
other author:
Kailkhura, Bhavya.
Description:
XIII, 208 p. 74 illus., 71 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Computer communication systems. -
Online resource:
https://doi.org/10.1007/978-981-13-2312-6
ISBN:
9789811323126
Secure Networked Inference with Unreliable Data Sources
Vempaty, Aditya.
Secure Networked Inference with Unreliable Data Sources
[electronic resource] /by Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney. - 1st ed. 2018. - XIII, 208 p. 74 illus., 71 illus. in color.online resource.
Chapter 1 Introduction -- Chapter 2 Conventional Inference theories -- Chapter 3 Distributed Detection in Networks -- Chapter 4 Distributed Estimation and Target Localization -- Chapter 5 Distributed Classification and Target Tracking -- Chapter 6 New Research Directions Discussion and conclusions.
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.
ISBN: 9789811323126
Standard No.: 10.1007/978-981-13-2312-6doiSubjects--Topical Terms:
1115394
Computer communication systems.
LC Class. No.: TK5105.5-5105.9
Dewey Class. No.: 004.6
Secure Networked Inference with Unreliable Data Sources
LDR
:02338nam a22003975i 4500
001
989082
003
DE-He213
005
20200703114858.0
007
cr nn 008mamaa
008
201225s2018 si | s |||| 0|eng d
020
$a
9789811323126
$9
978-981-13-2312-6
024
7
$a
10.1007/978-981-13-2312-6
$2
doi
035
$a
978-981-13-2312-6
050
4
$a
TK5105.5-5105.9
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
004.6
$2
23
100
1
$a
Vempaty, Aditya.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1208259
245
1 0
$a
Secure Networked Inference with Unreliable Data Sources
$h
[electronic resource] /
$c
by Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney.
250
$a
1st ed. 2018.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2018.
300
$a
XIII, 208 p. 74 illus., 71 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1 Introduction -- Chapter 2 Conventional Inference theories -- Chapter 3 Distributed Detection in Networks -- Chapter 4 Distributed Estimation and Target Localization -- Chapter 5 Distributed Classification and Target Tracking -- Chapter 6 New Research Directions Discussion and conclusions.
520
$a
The book presents theory and algorithms for secure networked inference in the presence of Byzantines. It derives fundamental limits of networked inference in the presence of Byzantine data and designs robust strategies to ensure reliable performance for several practical network architectures. In particular, it addresses inference (or learning) processes such as detection, estimation or classification, and parallel, hierarchical, and fully decentralized (peer-to-peer) system architectures. Furthermore, it discusses a number of new directions and heuristics to tackle the problem of design complexity in these practical network architectures for inference.
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computer security.
$3
557122
650
0
$a
Electrical engineering.
$3
596380
650
0
$a
Signal processing.
$3
561459
650
0
$a
Image processing.
$3
557495
650
0
$a
Speech processing systems.
$3
564428
650
0
$a
Coding theory.
$3
561460
650
0
$a
Information theory.
$3
595305
650
0
$a
Mathematical statistics.
$3
527941
650
1 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Communications Engineering, Networks.
$3
669809
650
2 4
$a
Signal, Image and Speech Processing.
$3
670837
650
2 4
$a
Coding and Information Theory.
$3
669784
650
2 4
$a
Probability and Statistics in Computer Science.
$3
669886
700
1
$a
Kailkhura, Bhavya.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1208260
700
1
$a
Varshney, Pramod K.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1208261
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811323119
776
0 8
$i
Printed edition:
$z
9789811323133
776
0 8
$i
Printed edition:
$z
9789811347658
856
4 0
$u
https://doi.org/10.1007/978-981-13-2312-6
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login