2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers 2010
DOI: 10.1109/acssc.2010.5757773
|View full text |Cite
|
Sign up to set email alerts
|

Secure distributed detection in the presence of eavesdroppers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
23
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(24 citation statements)
references
References 6 publications
1
23
0
Order By: Relevance
“…The first two terms in (8) are constants and lead to the upper bound of the privacy metric c min E ≤ min{c 1 E , c 2 E }.…”
Section: A Privacy Metricmentioning
confidence: 99%
See 3 more Smart Citations
“…The first two terms in (8) are constants and lead to the upper bound of the privacy metric c min E ≤ min{c 1 E , c 2 E }.…”
Section: A Privacy Metricmentioning
confidence: 99%
“…In [8], the privacy risk is measured in the information theoretic perspective. In this work, we propose a novel detection operational privacy metric.…”
Section: Privacy In Distributed Bayesian Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…For the practical resource constraints and the serious security issues in front of WSN, secure distributed detection schemes under energy constraints are necessary for the development of an efficient IoT. Various secure strategies for distributed detection have been proposed under different assumptions on the eavesdroppers and transmission channels [8,9,10,23,24,25,26,27,28,29]. However, these studies focused on either the local detection at sensors or the information transmission from sensors to the FC.…”
Section: Introductionmentioning
confidence: 99%