Jiangfan Zhang
Title
Cited by
Cited by
Year
Asymptotically optimum distributed estimation in the presence of attacks
J Zhang, RS Blum, X Lu, D Conus
IEEE Transactions on Signal Processing 63 (5), 1086-1101, 2014
832014
Functional forms of optimum spoofing attacks for vector parameter estimation in quantized sensor networks
J Zhang, RS Blum, LM Kaplan, X Lu
IEEE Transactions on Signal Processing 65 (3), 705-720, 2016
342016
Approaches to secure inference in the Internet of Things: Performance bounds, algorithms, and effective attacks on IoT sensor networks
J Zhang, RS Blum, HV Poor
IEEE Signal Processing Magazine 35 (5), 50-63, 2018
272018
Attacks on sensor network parameter estimation with quantization: Performance and asymptotically optimum processing
B Alnajjab, J Zhang, RS Blum
IEEE Transactions on Signal Processing 63 (24), 6659-6672, 2015
232015
Attack detection in sensor network target localization systems with quantized data
J Zhang, X Wang, RS Blum, LM Kaplan
IEEE Transactions on Signal Processing 66 (8), 2070-2085, 2018
202018
Ordering for reduced transmission energy detection in sensor networks testing a shift in the mean of a gaussian graphical model
J Zhang, Z Chen, RS Blum, X Lu, W Xu
IEEE Transactions on Signal Processing 65 (8), 2178-2189, 2017
132017
Testing the structure of a Gaussian graphical model with reduced transmissions in a distributed setting
Y Chen, RS Blum, BM Sadler, J Zhang
IEEE Transactions on Signal Processing 67 (20), 5391-5401, 2019
92019
Asymptotically optimal truncated multivariate Gaussian hypothesis testing with application to consensus algorithms
J Zhang, RS Blum
IEEE transactions on signal processing 62 (2), 431-442, 2013
92013
A novel 3D UAV channel model for A2G communication environments using AoD and AoA estimation algorithms
H Jiang, Z Zhang, CX Wang, J Zhang, J Dang, L Wu, H Zhang
IEEE Transactions on Communications 68 (11), 7232-7246, 2020
82020
Distributed joint spoofing attack identification and estimation in sensor networks
J Zhang, RS Blum
2015 IEEE China Summit and International Conference on Signal and …, 2015
82015
Distributed estimation in the presence of attacks for large scale sensor networks
J Zhang, RS Blum
2014 48th Annual Conference on Information Sciences and Systems (CISS), 1-6, 2014
72014
A fundamental limitation on maximum parameter dimension for accurate estimation with quantized data
J Zhang, RS Blum, LM Kaplan, X Lu
IEEE Transactions on Information Theory 64 (9), 6180-6195, 2018
62018
Cyber attacks on estimation sensor networks and iots: Impact, mitigation and implications to unattacked systems
J Zhang, RS Blum, L Kaplan
2017 IEEE International Conference on Acoustics, Speech and Signal …, 2017
52017
Quickest detection of time-varying false data injection attacks in dynamic smart grids
J Zhang
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
42019
Decentralized truncated one-sided sequential detection of a noncooperative moving target
L Hu, J Zhang, X Wang, S Wang, E Zhang
IEEE Signal Processing Letters 25 (10), 1490-1494, 2018
42018
Asymptotically optimal stochastic encryption for quantized sequential detection in the presence of eavesdroppers
J Zhang, X Wang
IEEE Transactions on Information Theory 66 (3), 1530-1548, 2019
32019
Ordering for shift-in-mean of Gauss-Markov random fields with dependent observations
J Zhang, C Wei, RS Blum
2012 IEEE 7th Sensor Array and Multichannel Signal Processing Workshop (SAM …, 2012
32012
Consensus-based distributed quickest detection of attacks with unknown parameters
J Zhang, X Wang
IEEE Transactions on Information Theory 67 (3), 1864-1885, 2020
22020
Robust time reversal focusing based on Maximin criterion in a waveguide with uncertain water depth
X Pan, N Wang, JF Zhang, W Xu, XY Gong
Science China Physics, Mechanics and Astronomy 56 (10), 1822-1832, 2013
22013
Low-complexity quickest change detection in linear systems with unknown time-varying pre-and post-change distributions
J Zhang, X Wang
IEEE Transactions on Information Theory 67 (3), 1804-1824, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20