Author of the publication

Decision Fusion with Unbalanced Priors under Synchronized Byzantine Attacks: a Message-Passing Approach.

, , , and . APSIPA, page 1160-1167. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Fusion in Distributed Sensor Networks with Byzantines, , , and . Springer, (2021)Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach., , , and . CDC, page 505-510. IEEE, (2014)CNN Detection of GAN-Generated Face Images based on Cross-Band Co-occurrences Analysis., , , and . WIFS, page 1-6. IEEE, (2020)Optimum Fusion of Possibly Corrupted Reports for Distributed Detection in Multi-Sensor Networks., , , and . CoRR, (2015)A Message Passing Approach for Decision Fusion in Adversarial Multi-Sensor Networks., , , and . CoRR, (2017)Deep Learning for Radar Signal Detection in the 3.5 GHz CBRS Band., , , , and . DySPAN, page 1-8. IEEE, (2021)Deep Learning for Path Loss Prediction in the 3.5 GHz CBRS Spectrum Band., , , and . WCNC, page 1665-1670. IEEE, (2022)A Comprehensive Survey on Backdoor Attacks and Their Defenses in Face Recognition Systems., , , and . IEEE Access, (2024)A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines., , , and . CoRR, (2015)Consensus Algorithm with Censored Data for Distributed Detection with Corrupted Measurements: A Game-Theoretic Approach., , , and . GameSec, volume 9996 of Lecture Notes in Computer Science, page 455-466. Springer, (2016)