2010
DOI: 10.1109/tsp.2010.2041275
|View full text |Cite
|
Sign up to set email alerts
|

Bounds on the Number of Identifiable Outliers in Source Localization by Linear Programming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…However, if the attackers do not revise the measured distances randomly, but make the modified distances be consistent, the strategy mentioned above will be failed under this scenario. In literature [ 15 ], linear equations are used to describe the localization problem. Hence, the norm and linear programming are applied to detect the outliers and avoid the wild measurements in the final solution.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, if the attackers do not revise the measured distances randomly, but make the modified distances be consistent, the strategy mentioned above will be failed under this scenario. In literature [ 15 ], linear equations are used to describe the localization problem. Hence, the norm and linear programming are applied to detect the outliers and avoid the wild measurements in the final solution.…”
Section: Related Workmentioning
confidence: 99%
“…However, facing with the undetected small outliers, the method would lose efficacy. In summary, based on the detection target, the literatures [ 14 , 15 , 16 , 17 ] mentioned above ignore the influence of anchor outliers. Therefore, these methods are one-sided.…”
Section: Related Workmentioning
confidence: 99%
“…[ 26 ] proposed a robust structure total least-squares algorithm for BOSL by using the improved Danish weight function to suppress the impact of outlier data on the localization performance. In addition to the M-estimator, there are other algorithms that can handle outlier data, such as outlier detection [ 27 ], clustering [ 28 ] and game theoretic techniques [ 29 ]. The outlier detection method [ 27 ] is to detect suspected outlier data first, and separate it from the original data set.…”
Section: Introductionmentioning
confidence: 99%
“…As an example of attackresistant localization, [4] resorts to a cooperative approach, using optimization with dedicated Huber loss function. Using linear equations to describe the localization problem with an l 1 norm, linear programming can be used to avoid outliers measurements in the agent location estimation [5]. Alternatively, since the effect of outliers can be treated as errors in the transmitted data, error correcting codes have also been proposed [6], where iteratively, the region of interest is split into regions and a hypothesis test is performed at the fusion center, which receives data from each sensor.…”
Section: Introductionmentioning
confidence: 99%