In an Internet of things network, multiple sensors send information to a fusion center for it to infer a public hypothesis of interest. However, the same sensor information may be used by the fusion center to make inferences of a private nature that the sensors wish to protect. To model this, we adopt a decentralized hypothesis testing framework with binary public and private hypotheses. Each sensor makes a private observation and utilizes a local sensor decision rule or privacy mapping to summarize that observation independently of the other sensors. The local decision made by a sensor is then sent to the fusion center.Without assuming knowledge of the joint distribution of the sensor observations and hypotheses, we adopt a nonparametric ...
The democratization of computing and sensing through smart phones and embedded devices has led to wi...
Information about the system state is obtained through noisy sensor measurements. This data is coded...
Nowadays, IoT networks and devices exist in our everyday life, capturing and carrying unlimited data...
In an Internet of things network, multiple sensors send information to a fusion center for it to inf...
With a burgeoning number of Internet of Things (IoT) devices penetrating into all aspects of our liv...
In a decentralized Internet of Things (IoT) network, a fusion center receives information from multi...
We consider a decentralized detection network whose aim is to infer a public hypothesis of interest....
Thesis (Ph.D.)--University of Washington, 2014The growth of smart devices and the Internet of Things...
It is envisioned that future cyber-physical systems will provide a more convenient living and workin...
We study the eavesdropping problem in the remotely distributed sensing of a privacy-sensible hypothe...
In the activities of data sharing and decentralized processing, data belonging to a user need to be ...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
With the emergence of smart cities, Internet of Things (IoT) devices as well as deep learning techno...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
The democratization of computing and sensing through smart phones and embedded devices has led to wi...
Information about the system state is obtained through noisy sensor measurements. This data is coded...
Nowadays, IoT networks and devices exist in our everyday life, capturing and carrying unlimited data...
In an Internet of things network, multiple sensors send information to a fusion center for it to inf...
With a burgeoning number of Internet of Things (IoT) devices penetrating into all aspects of our liv...
In a decentralized Internet of Things (IoT) network, a fusion center receives information from multi...
We consider a decentralized detection network whose aim is to infer a public hypothesis of interest....
Thesis (Ph.D.)--University of Washington, 2014The growth of smart devices and the Internet of Things...
It is envisioned that future cyber-physical systems will provide a more convenient living and workin...
We study the eavesdropping problem in the remotely distributed sensing of a privacy-sensible hypothe...
In the activities of data sharing and decentralized processing, data belonging to a user need to be ...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
Privacy against an adversary (AD) that tries to detect the underlying privacy-sensitive data distrib...
With the emergence of smart cities, Internet of Things (IoT) devices as well as deep learning techno...
We address the problem of maximizing privacy of stochastic dynamical systems whose state information...
The democratization of computing and sensing through smart phones and embedded devices has led to wi...
Information about the system state is obtained through noisy sensor measurements. This data is coded...
Nowadays, IoT networks and devices exist in our everyday life, capturing and carrying unlimited data...