{"title":"回避主动假设检验","authors":"Meng-Che Chang, M. Bloch","doi":"10.1109/ISIT44484.2020.9174021","DOIUrl":null,"url":null,"abstract":"We consider an active hypothesis testing scenario in which an adversary obtains observations while legitimate parties engage in a sequential adaptive control policy to estimate an unknown parameter. The objective is for the legitimate parties to evade the adversary by controlling the risk of their test while minimizing the detection ability of the adversary, measured in terms of its error exponent. We develop bounds on the adversary’s error exponent that offer insight into how legitimate adversaries can best evade the adversary’s detection. We illustrate the results in a wireless transmission detection example.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Evasive Active Hypothesis Testing\",\"authors\":\"Meng-Che Chang, M. Bloch\",\"doi\":\"10.1109/ISIT44484.2020.9174021\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider an active hypothesis testing scenario in which an adversary obtains observations while legitimate parties engage in a sequential adaptive control policy to estimate an unknown parameter. The objective is for the legitimate parties to evade the adversary by controlling the risk of their test while minimizing the detection ability of the adversary, measured in terms of its error exponent. We develop bounds on the adversary’s error exponent that offer insight into how legitimate adversaries can best evade the adversary’s detection. We illustrate the results in a wireless transmission detection example.\",\"PeriodicalId\":159311,\"journal\":{\"name\":\"2020 IEEE International Symposium on Information Theory (ISIT)\",\"volume\":\"129 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE International Symposium on Information Theory (ISIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIT44484.2020.9174021\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Symposium on Information Theory (ISIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT44484.2020.9174021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We consider an active hypothesis testing scenario in which an adversary obtains observations while legitimate parties engage in a sequential adaptive control policy to estimate an unknown parameter. The objective is for the legitimate parties to evade the adversary by controlling the risk of their test while minimizing the detection ability of the adversary, measured in terms of its error exponent. We develop bounds on the adversary’s error exponent that offer insight into how legitimate adversaries can best evade the adversary’s detection. We illustrate the results in a wireless transmission detection example.