Abstract: Secure distributed estimation algorithms aim to be resilient against adversaries in a network. By deploying a single attacker with sufficiently large attack vectors in the network, the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results