A Game-Theoretic Approach for Adversarial Information Fusion in Distributed Sensor Networks (2017)
Theoretical Foundations of Adversarial Detection and Applications to Multimedia Forensics
Every day we share our personal information with digital systems which are constantly exposed to threats. Security-oriented disciplines of signal processing have then received increasing attention in the last decades: multimedia forensics, digital watermarking, biometrics, network intrusion detection, steganography and steganalysis are just a few examples. Even though each of these fields has its own peculiarities, they all have to deal with a common problem: the presence of adversaries aiming at making the system fail. It is the purpose of Adversarial Signal Processing to lay the basis of a general theory that takes into account the impact of an adversary on the design of effective signal processing tools. By focusing on the most prominent problem of Adversarial Signal Processing, namely binary detection or Hypothesis Testing, we contribute to the above mission with a general theoretical framework for the binary detection ...
Tondi, Benedetta — University of Siena
Decentralized Estimation Under Communication Constraints
In this thesis, we consider the problem of decentralized estimation under communication constraints in the context of Collaborative Signal and Information Processing. Motivated by sensor network applications, a high volume of data collected at distinct locations and possibly in diverse modalities together with the spatially distributed nature and the resource limitations of the underlying system are of concern. Designing processing schemes which match the constraints imposed by the system while providing a reasonable accuracy has been a major challenge in which we are particularly interested in the tradeoff between the estimation performance and the utilization of communications subject to energy and bandwidth constraints. One remarkable approach for decentralized inference in sensor networks is to exploit graphical models together with message passing algorithms. In this framework, after the so-called information graph of the problem is constructed, it is mapped onto the ...
Uney, Murat — Middle East Technical University
Advances in graph signal processing: Graph filtering and network identification
To the surprise of most of us, complexity in nature spawns from simplicity. No matter how simple a basic unit is, when many of them work together, the interactions among these units lead to complexity. This complexity is present in the spreading of diseases, where slightly different policies, or conditions,might lead to very different results; or in biological systems where the interactions between elements maintain the delicate balance that keep life running. Fortunately, despite their complexity, current advances in technology have allowed us to have more than just a sneak-peak at these systems. With new views on how to observe such systems and gather data, we aimto understand the complexity within. One of these new views comes from the field of graph signal processing which provides models and tools to understand and process data coming from such complex systems. With ...
Coutino, Mario — Delft University of Technology
In Wireless Sensor Networks (WSN), the ability of sensor nodes to know its position is an enabler for a wide variety of applications for monitoring, control, and automation. Often, sensor data is meaningful only if its position can be determined. Many WSN are deployed indoors or in areas where Global Navigation Satellite System (GNSS) signal coverage is not available, and thus GNSS positioning cannot be guaranteed. In these scenarios, WSN may be relied upon to achieve a satisfactory degree of positioning accuracy. Typically, batteries power sensor nodes in WSN. These batteries are costly to replace. Therefore, power consumption is an important aspect, being performance and lifetime ofWSN strongly relying on the ability to reduce it. It is crucial to design effective strategies to maximize battery lifetime. Optimization of power consumption can be made at different layers. For example, at the ...
Moragrega, Ana — Universitat Politecnica de Catalunya
Robust Game-Theoretic Algorithms for Distributed Resource Allocation in Wireless Communications
The predominant game-theoretic solutions for distributed rate-maximization algorithms in Gaussian interference channels through optimal power control require perfect channel knowledge, which is not possible in practice due to various reasons, such as estimation errors, feedback quantization and latency between channel estimation and signal transmission. This thesis therefore aims at addressing this issue through the design and analysis of robust game-theoretic algorithms for rate-maximization in Gaussian interference channels in the presence of bounded channel uncertainty. A robust rate-maximization game is formulated for the single-antenna frequency-selective Gaussian interference channel under bounded channel uncertainty. The robust-optimization equilibrium solution for this game is independent of the probability distribution of the channel uncertainty. The existence and uniqueness of the equilibrium are studied and sufficient conditions for the uniqueness of the equilibrium are provided. Distributed algorithms to compute the equilibrium solution are presented and shown to ...
Anandkumar, Amod Jai Ganesh — Loughborough University
Statistical Signal Processing for Data Fusion
In this dissertation we focus on statistical signal processing for Data Fusion, with a particular focus on wireless sensor networks. Six topics are studied: (i) Data Fusion for classification under model uncertainty; (ii) Decision Fusion over coherent MIMO channels; (iii) Performance analysis of Maximum Ratio Combining in MIMO decision fusion; (iv) Decision Fusion over non-coherent MIMO channels; (v) Decision Fusion for distributed classification of multiple targets; (vi) Data Fusion for inverse localization problems, with application to wideband passive sonar platform estimation. The first topic of this thesis addresses the problem of lack of knowledge of the prior distribution in classification problems that operate on small data sets that may make the application of Bayes' rule questionable. Uniform or arbitrary priors may provide classification answers that, even in simple examples, may end up contradicting our common sense about the problem. Entropic ...
Ciuonzo, Domenico — Second University of Naples
Convergence Analysis of Distributed Consensus Algorithms
Inspired by new emerging technologies and networks of devices with high collective computational power, I focus my work on the problematics of distributed algorithms. While each device runs a relatively simple algorithm with low complexity, the group of interconnected units (agents) determines a behavior of high complexity. Typically, such units have their own memory and processing unit, and are interconnected and capable to exchange information with each other. More specifically, this work is focused on the distributed consensus algorithms. Such algorithms allow the agents to coordinate their behaviour and to distributively find a common agreement (consensus). To understand and analyze their behaviour, it is necessary to analyze the convergence of the consensus algorithm, i.e., under which conditions the algorithm reaches a consensus and under which it does not. Naturally, the communication channel can change and the agents may function asynchronously ...
Sluciak, Ondrej — Vienna University of Technology
Decentralized Parameter and Random Field Estimation with Wireless Sensor Netwoks
In recent years, research on Wireless Sensor Networks (WSN) has attracted considerable attention. This is in part motivated by the large number of applications in which WSNs are called to play a pivotal role, such as parameter estimation (namely, moisture, temperature), event detection (leakage of pollutants, earthquakes, fires), or localization and tracking (for e.g. border control, inventory tracking), to name a few. This PhD dissertation is focused on the design of decentralized estimation schemes for wireless sensor networks. In this context, sensors observe a given phenomenon of interest (e.g. temperature). Consequently, sensor observations are conveyed over the wireless medium to a Fusion Center (FC) for further processing. The ultimate goal of the WSN is the estimation or reconstruction of the phenomenon with minimum distortion. The problem is addressed from a signal processing and information-theoretical perspective. However, the interplay with some ...
Javier Matamoros Morcillo — Centre Tecnològic de Telecomuniacions de Catalunya (CTTC)
GRAPH-TIME SIGNAL PROCESSING: FILTERING AND SAMPLING STRATEGIES
The necessity to process signals living in non-Euclidean domains, such as signals de- fined on the top of a graph, has led to the extension of signal processing techniques to the graph setting. Among different approaches, graph signal processing distinguishes it- self by providing a Fourier analysis of these signals. Analogously to the Fourier transform for time and image signals, the graph Fourier transform decomposes the graph signals in terms of the harmonics provided by the underlying topology. For instance, a graph signal characterized by a slow variation between adjacent nodes has a low frequency content. Along with the graph Fourier transform, graph filters are the key tool to alter the graph frequency content of a graph signal. This thesis focuses on graph filters that are performed distributively in the node domain–that is, each node needs to exchange in- formation ...
Elvin Isufi — Delft University of Technology
Security/Privacy Analysis of Biometric Hashing and Template Protection for Fingerprint Minutiae
This thesis has two main parts. The first part deals with security and privacy analysis of biometric hashing. The second part introduces a method for fixed-length feature vector extraction and hash generation from fingerprint minutiae. The upsurge of interest in biometric systems has led to development of biometric template protection methods in order to overcome security and privacy problems. Biometric hashing produces a secure binary template by combining a personal secret key and the biometric of a person, which leads to a two factor authentication method. This dissertation analyzes biometric hashing both from a theoretical point of view and in regards to its practical application. For theoretical evaluation of biohashes, a systematic approach which uses estimated entropy based on degree of freedom of a binomial distribution is outlined. In addition, novel practical security and privacy attacks against face image hashing ...
Berkay Topcu — Sabanci University
Robust Network Topology Inference and Processing of Graph Signals
The abundance of large and heterogeneous systems is rendering contemporary data more pervasive, intricate, and with a non-regular structure. With classical techniques facing troubles to deal with the irregular (non-Euclidean) domain where the signals are defined, a popular approach at the heart of graph signal processing (GSP) is to: (i) represent the underlying support via a graph and (ii) exploit the topology of this graph to process the signals at hand. In addition to the irregular structure of the signals, another critical limitation is that the observed data is prone to the presence of perturbations, which, in the context of GSP, may affect not only the observed signals but also the topology of the supporting graph. Ignoring the presence of perturbations, along with the couplings between the errors in the signal and the errors in their support, can drastically hinder ...
Rey, Samuel — King Juan Carlos University
Sensing physical fields: Inverse problems for the diffusion equation and beyond
Due to significant advances made over the last few decades in the areas of (wireless) networking, communications and microprocessor fabrication, the use of sensor networks to observe physical phenomena is rapidly becoming commonplace. Over this period, many aspects of sensor networks have been explored, yet a thorough understanding of how to analyse and process the vast amounts of sensor data collected remains an open area of research. This work, therefore, aims to provide theoretical, as well as practical, advances this area. In particular, we consider the problem of inferring certain underlying properties of the monitored phenomena, from our sensor measurements. Within mathematics, this is commonly formulated as an inverse problem; whereas in signal processing, it appears as a (multidimensional) sampling and reconstruction problem. Indeed it is well known that inverse problems are notoriously ill-posed and very demanding to solve; meanwhile ...
Murray-Bruce, John — Imperial College London
Robust Signal Processing in Distributed Sensor Networks
Statistical robustness and collaborative inference in a distributed sensor network are two challenging requirements posed on many modern signal processing applications. This dissertation aims at solving these tasks jointly by providing generic algorithms that are applicable to a wide variety of real-world problems. The first part of the thesis is concerned with sequential detection---a branch of detection theory that is focused on decision-making based on as few measurements as possible. After reviewing some fundamental concepts of statistical hypothesis testing, a general formulation of the Consensus+Innovations Sequential Probability Ratio Test for sequential binary hypothesis testing in distributed networks is derived. In a next step, multiple robust versions of the algorithm based on two different robustification paradigms are developed. The functionality of the proposed detectors is verified in simulations, and their performance is examined under different network conditions and outlier concentrations. Subsequently, ...
Leonard, Mark Ryan — Technische Universität Darmstadt
Distributed Stochastic Optimization in Non-Differentiable and Non-Convex Environments
The first part of this dissertation considers distributed learning problems over networked agents. The general objective of distributed adaptation and learning is the solution of global, stochastic optimization problems through localized interactions and without information about the statistical properties of the data. Regularization is a useful technique to encourage or enforce structural properties on the resulting solution, such as sparsity or constraints. A substantial number of regularizers are inherently non-smooth, while many cost functions are differentiable. We propose distributed and adaptive strategies that are able to minimize aggregate sums of objectives. In doing so, we exploit the structure of the individual objectives as sums of differentiable costs and non-differentiable regularizers. The resulting algorithms are adaptive in nature and able to continuously track drifts in the problem; their recursions, however, are subject to persistent perturbations arising from the stochastic nature of ...
Vlaski, Stefan — University of California, Los Angeles
Bayesian data fusion for distributed learning
This dissertation explores the intersection of data fusion, federated learning, and Bayesian methods, with a focus on their applications in indoor localization, GNSS, and image processing. Data fusion involves integrating data and knowledge from multiple sources. It becomes essential when data is only available in a distributed fashion or when different sensors are used to infer a quantity of interest. Data fusion typically includes raw data fusion, feature fusion, and decision fusion. In this thesis, we will concentrate on feature fusion. Distributed data fusion involves merging sensor data from different sources to estimate an unknown process. Bayesian framework is often used because it can provide an optimal and explainable feature by preserving the full distribution of the unknown given the data, called posterior, over the estimated process at each agent. This allows for easy and recursive merging of sensor data ...
Peng Wu — Northeastern University
The current layout is optimized for mobile phones. Page previews, thumbnails, and full abstracts will remain hidden until the browser window grows in width.
The current layout is optimized for tablet devices. Page previews and some thumbnails will remain hidden until the browser window grows in width.