The Internet of Things (IoT) improves pervasive sensing and control capabilities via the aid of modern digital communication, signal processing, and massive deployment of sensors but presents severe security challenges. Attackers can modify the data entering or communicated from the IoT sensors, which can have a serious impact on any algorithm using these data for inference. This article describes how to provide tight bounds (with sufficient data) on the performance of the best unbiased algorithms estimating a parameter from the attacked data and communications under any assumed statistical model describing how the sensor data depends on the parameter before attack. The results hold regardless of the unbiased estimation algorithm adopted, w...
Security is a key requirement in the context of the internet of things (IoT). The IoT is connecting ...
The Internet of Things (IoT) has emerged as a technology capable of connecting heterogeneous nodes/o...
The rapid development of deep learning (DL) enables resource-constrained systems and devices [e.g., ...
As the world keeps advancing, the need for automated interconnected devices has started to gain sign...
The Internet of Things brings about many applications where networks of devices collectively gather ...
Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Int...
Estimation of an unknown deterministic vector from quantized sensor data is considered in the presen...
The concept of Internet of Things has materialize the vision of a society where users, computing sys...
Byzantine attacks on sensor systems estimating the value of an unknown deterministic parameter based...
Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration...
Artificial intelligence and ubiquitous sensor systems have seen tremendous advances in recent times,...
The Internet of Things (IoT) shares the idea of an autonomous system responsible for transforming ph...
Internet-of-Things is a set of sensing, communication, and computation technologies to connect physi...
The internet of things (IoT) is the interconnection of things around us to make our daily process mo...
The expansion of the Internet of Things (IoT) paradigm has brought with it the challenge of promptly...
Security is a key requirement in the context of the internet of things (IoT). The IoT is connecting ...
The Internet of Things (IoT) has emerged as a technology capable of connecting heterogeneous nodes/o...
The rapid development of deep learning (DL) enables resource-constrained systems and devices [e.g., ...
As the world keeps advancing, the need for automated interconnected devices has started to gain sign...
The Internet of Things brings about many applications where networks of devices collectively gather ...
Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Int...
Estimation of an unknown deterministic vector from quantized sensor data is considered in the presen...
The concept of Internet of Things has materialize the vision of a society where users, computing sys...
Byzantine attacks on sensor systems estimating the value of an unknown deterministic parameter based...
Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration...
Artificial intelligence and ubiquitous sensor systems have seen tremendous advances in recent times,...
The Internet of Things (IoT) shares the idea of an autonomous system responsible for transforming ph...
Internet-of-Things is a set of sensing, communication, and computation technologies to connect physi...
The internet of things (IoT) is the interconnection of things around us to make our daily process mo...
The expansion of the Internet of Things (IoT) paradigm has brought with it the challenge of promptly...
Security is a key requirement in the context of the internet of things (IoT). The IoT is connecting ...
The Internet of Things (IoT) has emerged as a technology capable of connecting heterogeneous nodes/o...
The rapid development of deep learning (DL) enables resource-constrained systems and devices [e.g., ...