{"title":"Evasive Active Hypothesis Testing","authors":"Meng-Che Chang, M. Bloch","doi":"10.1109/ISIT44484.2020.9174021","DOIUrl":null,"url":null,"abstract":"We consider an active hypothesis testing scenario in which an adversary obtains observations while legitimate parties engage in a sequential adaptive control policy to estimate an unknown parameter. The objective is for the legitimate parties to evade the adversary by controlling the risk of their test while minimizing the detection ability of the adversary, measured in terms of its error exponent. We develop bounds on the adversary’s error exponent that offer insight into how legitimate adversaries can best evade the adversary’s detection. We illustrate the results in a wireless transmission detection example.","PeriodicalId":159311,"journal":{"name":"2020 IEEE International Symposium on Information Theory (ISIT)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Symposium on Information Theory (ISIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT44484.2020.9174021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
We consider an active hypothesis testing scenario in which an adversary obtains observations while legitimate parties engage in a sequential adaptive control policy to estimate an unknown parameter. The objective is for the legitimate parties to evade the adversary by controlling the risk of their test while minimizing the detection ability of the adversary, measured in terms of its error exponent. We develop bounds on the adversary’s error exponent that offer insight into how legitimate adversaries can best evade the adversary’s detection. We illustrate the results in a wireless transmission detection example.