2007
DOI: 10.1561/9781601980472
|View full text |Cite
|
Sign up to set email alerts
|

Reliability Criteria in Information Theory and in Statistical Hypothesis Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
4
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 132 publications
1
4
0
Order By: Relevance
“…Construction of LAO tests sequence is realized applying "Kullback-Leibler balls" around the hypothetic distributions in the space of distributions as sets for detection of corresponding hypotheses. This concept, introduced in [16]- [17] and applied in [20]- [31] and in the present paper, conforms to the idea of "r-divergent sequences" defined in [17] and used in other works.…”
Section: Introductionsupporting
confidence: 61%
See 2 more Smart Citations
“…Construction of LAO tests sequence is realized applying "Kullback-Leibler balls" around the hypothetic distributions in the space of distributions as sets for detection of corresponding hypotheses. This concept, introduced in [16]- [17] and applied in [20]- [31] and in the present paper, conforms to the idea of "r-divergent sequences" defined in [17] and used in other works.…”
Section: Introductionsupporting
confidence: 61%
“…As was noted in introduction, our study applies the method of types, developed in information theory [7,11,13,31]. The basic notion in this method is the notion of the type Q x of the vector x ∈ X N , which is equivalent to the statistical notion of the empirical distribution of the sample x:…”
Section: Problem Presentationmentioning
confidence: 99%
See 1 more Smart Citation
“…We have to send the data through a channel that might be prone to outside attacks, the data may be corrupted or the attacker may try to imitate the data and send fake votes to the counting server. A model that addresses the attacks by an active adversary is described in [5]. Using two stage hypothesis testing, we first decide if the data is valid and has a candidate index in it, and then we decide if it is an outside attacker trying to imitate valid votes.…”
Section: G Discussionmentioning
confidence: 99%
“…The implementation of the statistical method algorithm, depending on the choice of hypothesis testing technique, has been studied in a number of works. Two-stage optimal hypothesis testing for extraction and authentication was studied in [5]. Statistical techniques were suggested using syndrome trellis codes with additive distortion function in steganography and matrix embedding with wet paper codes in [16], [17] respectively.…”
Section: Methodsmentioning
confidence: 99%