Skip to main content

Showing 1–5 of 5 results for author: Han, Y S

Searching in archive eess. Search in all archives.
.
  1. arXiv:2304.14467  [pdf, other

    eess.SP

    Distributed Quantized Detection of Sparse Signals Under Byzantine Attacks

    Authors: Chen Quan, Yunghsiang S. Han, Baocheng Geng, Pramod K. Varshney

    Abstract: This paper investigates distributed detection of sparse stochastic signals with quantized measurements under Byzantine attacks. Under this type of attack, sensors in the networks might send falsified data to degrade system performance. The Bernoulli-Gaussian (BG) distribution in terms of the sparsity degree of the stochastic signal is utilized for modeling the sparsity of signals. Several detector… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

  2. arXiv:2301.10815  [pdf, other

    eess.SP

    Human-machine Hierarchical Networks for Decision Making under Byzantine Attacks

    Authors: Chen Quan, Baocheng Geng, Yunghsiang S. Han, Pramod K. Varshney

    Abstract: This paper proposes a belief-updating scheme in a human-machine collaborative decision-making network to combat Byzantine attacks. A hierarchical framework is used to realize the network where local decisions from physical sensors act as reference decisions to improve the quality of human sensor decisions. During the decision-making process, the belief that each physical sensor is malicious is upd… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

  3. Efficient Ordered-Transmission Based Distributed Detection under Data Falsification Attacks

    Authors: Chen Quan, Nandan Sriranga, Haodong Yang, Yunghsiang S. Han, Baocheng Geng, Pramod K. Varshney

    Abstract: In distributed detection systems, energy-efficient ordered transmission (EEOT) schemes are able to reduce the number of transmissions required to make a final decision. In this work, we investigate the effect of data falsification attacks on the performance of EEOT-based systems. We derive the probability of error for an EEOT-based system under attack and find an upper bound (UB) on the expected n… ▽ More

    Submitted 18 July, 2022; originally announced July 2022.

  4. arXiv:2204.07212  [pdf, other

    cs.CR eess.SP

    Reputation and Audit Bit Based Distributed Detection in the Presence of Byzantine

    Authors: Chen Quan, Yunghsiang S. Han, Baocheng Geng, Pramod K. Varshney

    Abstract: In this paper, two reputation based algorithms called Reputation and audit based clustering (RAC) algorithm and Reputation and audit based clustering with auxiliary anchor node (RACA) algorithm are proposed to defend against Byzantine attacks in distributed detection networks when the fusion center (FC) has no prior knowledge of the attacking strategy of Byzantine nodes. By updating the reputation… ▽ More

    Submitted 14 April, 2022; originally announced April 2022.

  5. arXiv:2109.13325  [pdf, other

    cs.CR eess.SP

    Enhanced Audit Bit Based Distributed Bayesian Detection in the Presence of Strategic Attacks

    Authors: Chen Quan, Baocheng Geng, Yunghsiang S. Han, Pramod K. Varshney

    Abstract: This paper employs an audit bit based mechanism to mitigate the effect of Byzantine attacks. In this framework, the optimal attacking strategy for intelligent attackers is investigated for the traditional audit bit based scheme (TAS) to evaluate the robustness of the system. We show that it is possible for an intelligent attacker to degrade the performance of TAS to the system without audit bits.… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.