{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:01:25Z","timestamp":1755799285401,"version":"3.44.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/itw44776.2019.8989062","type":"proceedings-article","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T22:18:26Z","timestamp":1581373106000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Distributed Detection with Empirically Observed Statistics"],"prefix":"10.1109","author":[{"given":"Haiyun","family":"He","sequence":"first","affiliation":[{"name":"National University of Singapore,Department of Electrical and Computer Engineering"}]},{"given":"Lin","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Michigan,Department of Electrical Engineering and Computer Science,Ann Arbor"}]},{"given":"Vincent Y. F.","family":"Tan","sequence":"additional","affiliation":[{"name":"National University of Singapore,Department of Electrical and Computer Engineering"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.857020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472883"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921889"},{"key":"ref13","article-title":"Distributed hypothesis testing with privacy constraints","author":"gilani","year":"2018","journal-title":"arXiv preprint arXiv 1806 02015"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006634"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483382"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.851769"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1093\/imaiai\/iay023","article-title":"Second-order asymptotically optimal statistical classification","author":"zhou","year":"2019","journal-title":"Information and Inference A Journal of the IMA"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ITW44776.2019.8989062"},{"journal-title":"Elements of Information Theory","year":"2006","author":"cover","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2002.806982"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.2636"},{"key":"ref6","article-title":"Anonymous heterogeneous distributed detection: Optimal decision rules, error exponents, and the price of anonymity","author":"chen","year":"2018","journal-title":"arXiv preprint arXiv 1805 03554"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2006.890821"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928240"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"4042","DOI":"10.1109\/TSP.2009.2023374","article-title":"Bayesian detection in bounded height tree networks","volume":"57","author":"tay","year":"2009","journal-title":"IEEE Transactions on Signal Processing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/BF02551407"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/18.32134"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.929032"}],"event":{"name":"2019 IEEE Information Theory Workshop (ITW)","start":{"date-parts":[[2019,8,25]]},"location":"Visby, Sweden","end":{"date-parts":[[2019,8,28]]}},"container-title":["2019 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8968650\/8988913\/08989062.pdf?arnumber=8989062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T18:11:51Z","timestamp":1755627111000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8989062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/itw44776.2019.8989062","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}