{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:20:50Z","timestamp":1743099650161,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319721491"},{"type":"electronic","value":"9783319721507"}],"license":[{"start":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T00:00:00Z","timestamp":1511740800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72150-7_57","type":"book-chapter","created":{"date-parts":[[2017,11,26]],"date-time":"2017-11-26T08:21:29Z","timestamp":1511684489000},"page":"704-716","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Social Learning Against Data Falsification in\u00a0Sensor Networks"],"prefix":"10.1007","author":[{"given":"Fernando","family":"Rosas","sequence":"first","affiliation":[]},{"given":"Kwang-Cheng","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,27]]},"reference":[{"issue":"4","key":"57_CR1","doi-asserted-by":"crossref","first-page":"1201","DOI":"10.1093\/restud\/rdr004","volume":"78","author":"D Acemoglu","year":"2011","unstructured":"Acemoglu, D., Dahleh, M.A., Lobel, I., Ozdaglar, A.: Bayesian learning in social networks. Rev. Econ. Stud. 78(4), 1201\u20131236 (2011)","journal-title":"Rev. Econ. Stud."},{"key":"57_CR2","doi-asserted-by":"crossref","unstructured":"Bahceci, I., Al-Regib, G., Altunbasak, Y.: Serial distributed detection for wireless sensor networks. In: Proceedings. International Symposium on Information Theory, 2005. ISIT 2005, pp. 830\u2013834. IEEE (2005)","DOI":"10.1109\/ISIT.2005.1523453"},{"key":"57_CR3","doi-asserted-by":"crossref","unstructured":"Barbarossa, S., Sardellitti, S., Lorenzo, P.D.: Distributed Detection and Estimation in Wireless Sensor Networks, vol.\u00a02, pp. 329\u2013408. Academic Press Library in Signal Processing, Vol. 2, Communications and Radar Signal Processing (2013)","DOI":"10.1016\/B978-0-12-396500-4.00007-7"},{"key":"57_CR4","doi-asserted-by":"publisher","unstructured":"Bertrand, A.: Applications and trends in wireless acoustic sensor networks: a signal processing perspective. In: 2011 18th IEEE Symposium on Communications and Vehicular Technology in the Benelux (SCVT), pp. 1\u20136 (2011). https:\/\/doi.org\/10.1109\/SCVT.2011.6101302","DOI":"10.1109\/SCVT.2011.6101302"},{"key":"57_CR5","doi-asserted-by":"crossref","unstructured":"Bikhchandani, S., Hirshleifer, D., Welch, I.: A theory of fads, fashion, custom, and cultural change as informational cascades. J. Polit. Econ., 992\u20131026 (1992)","DOI":"10.1086\/261849"},{"key":"57_CR6","doi-asserted-by":"crossref","unstructured":"Castro, R., Coates, M., Liang, G., Nowak, R., Yu, B.: Network tomography: recent developments. Stat. Sci., 499\u2013517 (2004)","DOI":"10.1214\/088342304000000422"},{"issue":"2","key":"57_CR7","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1109\/TSP.2002.806982","volume":"51","author":"JF Chamberland","year":"2003","unstructured":"Chamberland, J.F., Veeravalli, V.V.: Decentralized detection in sensor networks. IEEE Trans. Signal Process. 51(2), 407\u2013416 (2003)","journal-title":"IEEE Trans. Signal Process."},{"issue":"6","key":"57_CR8","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.1109\/JSAC.2004.830894","volume":"22","author":"JF Chamberland","year":"2004","unstructured":"Chamberland, J.F., Veeravalli, V.V.: Asymptotic results for decentralized detection in power constrained wireless sensor networks. IEEE J. Sel. Areas Commun. 22(6), 1007\u20131015 (2004)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"57_CR9","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MSP.2007.361598","volume":"24","author":"JF Chamberland","year":"2007","unstructured":"Chamberland, J.F., Veeravalli, V.V.: Wireless sensors in distributed detection applications. IEEE Signal Process. Mag. 24(3), 16\u201325 (2007)","journal-title":"IEEE Signal Process. Mag."},{"issue":"7","key":"57_CR10","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/TIFS.2015.2415757","volume":"10","author":"B Kailkhura","year":"2015","unstructured":"Kailkhura, B., Brahma, S., Dulek, B., Han, Y.S., Varshney, P.K.: Distributed detection in tree networks: Byzantines and mitigation techniques. IEEE Trans. Inf. Forensics Secur. 10(7), 1499\u20131512 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2415757","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"12","key":"57_CR11","doi-asserted-by":"crossref","first-page":"3208","DOI":"10.1109\/TSP.2014.2321735","volume":"62","author":"B Kailkhura","year":"2014","unstructured":"Kailkhura, B., Brahma, S., Han, Y.S., Varshney, P.K.: Distributed detection in tree topologies with byzantines. IEEE Trans. Signal Process. 62(12), 3208\u20133219 (2014)","journal-title":"IEEE Trans. Signal Process."},{"issue":"19","key":"57_CR12","doi-asserted-by":"publisher","first-page":"5250","DOI":"10.1109\/TSP.2015.2450191","volume":"63","author":"B Kailkhura","year":"2015","unstructured":"Kailkhura, B., Han, Y.S., Brahma, S., Varshney, P.K.: Distributed bayesian detection in the presence of byzantine data. IEEE Trans. Signal Process. 63(19), 5250\u20135263 (2015). https:\/\/doi.org\/10.1109\/TSP.2015.2450191","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"57_CR13","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1109\/MSP.2012.2232356","volume":"30","author":"V Krishnamurthy","year":"2013","unstructured":"Krishnamurthy, V., Poor, H.V.: Social learning and bayesian games in multiagent signal processing: how do local and global decision makers interact? IEEE Signal Process. Mag. 30(3), 43\u201357 (2013)","journal-title":"IEEE Signal Process. Mag."},{"issue":"3","key":"57_CR14","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. (TOPLAS) 4(3), 382\u2013401 (1982)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"57_CR15","doi-asserted-by":"crossref","unstructured":"Loeve, M.: Probability Theory I. Springer (1978)","DOI":"10.1007\/978-1-4612-6257-2"},{"issue":"1","key":"57_CR16","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/TSP.2008.2007335","volume":"57","author":"S Marano","year":"2009","unstructured":"Marano, S., Matta, V., Tong, L.: Distributed detection in the presence of byzantine attacks. IEEE Trans. Signal Process. 57(1), 16\u201329 (2009)","journal-title":"IEEE Trans. Signal Process."},{"issue":"10","key":"57_CR17","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TSP.2014.2314072","volume":"62","author":"VSS Nadendla","year":"2014","unstructured":"Nadendla, V.S.S., Han, Y.S., Varshney, P.K.: Distributed inference with m-ary quantized data in the presence of byzantine attacks. IEEE Trans. Signal Process. 62(10), 2681\u20132695 (2014). https:\/\/doi.org\/10.1109\/TSP.2014.2314072","journal-title":"IEEE Trans. Signal Process."},{"issue":"3","key":"57_CR18","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1109\/7.256286","volume":"28","author":"JD Papastavrou","year":"1992","unstructured":"Papastavrou, J.D., Athans, M.: Distributed detection by a large team of sensors in tandem. IEEE Trans. Aerosp. Electron. Syst. 28(3), 639\u2013653 (1992)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"key":"57_CR19","doi-asserted-by":"crossref","unstructured":"Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: 2005 IEEE Symposium on Security and Privacy (S&P\u201905), pp. 49\u201363. IEEE (2005)","DOI":"10.1109\/SP.2005.8"},{"key":"57_CR20","unstructured":"Poor, H.V.: An Introduction to Signal Detection and Estimation. Springer Science & Business Media (2013)"},{"issue":"4","key":"57_CR21","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/COMST.2006.283821","volume":"8","author":"R Rajagopalan","year":"2006","unstructured":"Rajagopalan, R., Varshney, P.K.: Data-aggregation techniques in sensor networks: A survey. IEEE Commun. Surv. Tutor. 8(4), 48\u201363 (2006). https:\/\/doi.org\/10.1109\/COMST.2006.283821","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"57_CR22","doi-asserted-by":"publisher","unstructured":"Rosas, F., Hsiao, J.H., Chen, K.C.: A technological perspective on information cascades via social learning. IEEE Access PP(99), 1\u20131 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2687422","DOI":"10.1109\/ACCESS.2017.2687422"},{"issue":"6","key":"57_CR23","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MWC.2004.1368895","volume":"11","author":"E Shi","year":"2004","unstructured":"Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wirel. Commun. 11(6), 38\u201343 (2004)","journal-title":"IEEE Wirel. Commun."},{"issue":"1","key":"57_CR24","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/7.249133","volume":"29","author":"PF Swaszek","year":"1993","unstructured":"Swaszek, P.F.: On the performance of serial networks in distributed detection. IEEE Trans. Aerosp. Electron. Syst. 29(1), 254\u2013260 (1993)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"5","key":"57_CR25","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1109\/TAC.1985.1103988","volume":"30","author":"J Tsitsiklis","year":"1985","unstructured":"Tsitsiklis, J., Athans, M.: On the complexity of decentralized decision making and detection problems. IEEE Trans. Autom. Control 30(5), 440\u2013446 (1985)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"2","key":"57_CR26","first-page":"297","volume":"2","author":"JN Tsitsiklis","year":"1993","unstructured":"Tsitsiklis, J.N., et al.: Decentralized detection. Adv. Stat. Signal Process. 2(2), 297\u2013344 (1993)","journal-title":"Adv. Stat. Signal Process."},{"issue":"1958","key":"57_CR27","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1098\/rsta.2011.0194","volume":"370","author":"VV Veeravalli","year":"2012","unstructured":"Veeravalli, V.V., Varshney, P.K.: Distributed inference in wireless sensor networks. Philos. Trans. R. Soc. Lond. A: Math. Phys. Eng. Sci. 370(1958), 100\u2013117 (2012)","journal-title":"Philos. Trans. R. Soc. Lond. A: Math. Phys. Eng. Sci."},{"issue":"5","key":"57_CR28","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/MSP.2013.2262116","volume":"30","author":"A Vempaty","year":"2013","unstructured":"Vempaty, A., Tong, L., Varshney, P.K.: Distributed inference with byzantine data: state-of-the-art review on data falsification attacks. IEEE Signal Process. Mag. 30(5), 65\u201375 (2013)","journal-title":"IEEE Signal Process. Mag."},{"issue":"4","key":"57_CR29","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1109\/7.7178","volume":"24","author":"R Viswanathan","year":"1988","unstructured":"Viswanathan, R., Thomopoulos, S.C., Tumuluri, R.: Optimal serial distributed decision fusion. IEEE Trans. Aerosp. Electron. Syst. 24(4), 366\u2013376 (1988)","journal-title":"IEEE Trans. Aerosp. Electron. Syst."},{"issue":"1","key":"57_CR30","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/5.554208","volume":"85","author":"R Viswanathan","year":"1997","unstructured":"Viswanathan, R., Varshney, P.K.: Distributed detection with multiple sensors i. fundamentals. Proc. IEEE 85(1), 54\u201363 (1997)","journal-title":"Proc. IEEE"},{"issue":"2","key":"57_CR31","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/S0016-0032(98)00024-6","volume":"336","author":"D Warren","year":"1999","unstructured":"Warren, D., Willett, P.: Optimum quantization for detector fusion: some proofs, examples, and pathology. J. Franklin Inst. 336(2), 323\u2013359 (1999)","journal-title":"J. Franklin Inst."},{"issue":"5","key":"57_CR32","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1109\/TSP.2014.2386281","volume":"63","author":"J Zhang","year":"2015","unstructured":"Zhang, J., Blum, R.S., Lu, X., Conus, D.: Asymptotically optimum distributed estimation in the presence of attacks. IEEE Trans. Signal Process. 63(5), 1086\u20131101 (2015). https:\/\/doi.org\/10.1109\/TSP.2014.2386281","journal-title":"IEEE Trans. Signal Process."}],"container-title":["Studies in Computational Intelligence","Complex Networks &amp; Their Applications VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72150-7_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T17:01:05Z","timestamp":1570381265000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72150-7_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,27]]},"ISBN":["9783319721491","9783319721507"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72150-7_57","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2017,11,27]]}}}