We consider a decentralized detection network whose aim is to infer a public hypothesis of interest. However, the raw sensor observations also allow the fusion center to infer private hypotheses that we wish to protect. We consider the case where there are an uncountable number of private hypotheses belonging to an uncertainty set, and develop local privacy mappings at every sensor so that the sanitized sensor information minimizes the Bayes error of detecting the public hypothesis at the fusion center while achieving information privacy for all private hypotheses. We introduce the concept of a most favorable hypothesis (MFH) and show how to find an MFH in the set of private hypotheses. By protecting the information privacy of the MFH, info...
Each agent in a network makes a local observation that is linearly related to a set of public and pr...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
With a burgeoning number of Internet of Things (IoT) devices penetrating into all aspects of our liv...
In an Internet of things network, multiple sensors send information to a fusion center for it to inf...
In a decentralized Internet of Things (IoT) network, a fusion center receives information from multi...
We study the eavesdropping problem in the remotely distributed sensing of a privacy-sensible hypothe...
In the activities of data sharing and decentralized processing, data belonging to a user need to be ...
In this paper, the differential privacy problem in parallel distributed detections is studied in the...
In this paper, the privacy problem of a tandem distributed detection system vulnerable to an eavesdr...
It is envisioned that future cyber-physical systems will provide a more convenient living and workin...
The data collected by sensor networks often contain sensitive information and care must be taken to ...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
Each agent in a network makes a local observation that is linearly related to a set of public and pr...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
With a burgeoning number of Internet of Things (IoT) devices penetrating into all aspects of our liv...
In an Internet of things network, multiple sensors send information to a fusion center for it to inf...
In a decentralized Internet of Things (IoT) network, a fusion center receives information from multi...
We study the eavesdropping problem in the remotely distributed sensing of a privacy-sensible hypothe...
In the activities of data sharing and decentralized processing, data belonging to a user need to be ...
In this paper, the differential privacy problem in parallel distributed detections is studied in the...
In this paper, the privacy problem of a tandem distributed detection system vulnerable to an eavesdr...
It is envisioned that future cyber-physical systems will provide a more convenient living and workin...
The data collected by sensor networks often contain sensitive information and care must be taken to ...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
Each agent in a network makes a local observation that is linearly related to a set of public and pr...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...