Coalition based Optimization of Resource Allocation with Malicious User Detection in Cognitive Radio Networks |
Huang, Xiaoge
(School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications)
Chen, Liping (School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications) Chen, Qianbin (School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications) Shen, Bin (School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications) |
1 |
A. Vempaty, K. Agrawal, H. Chen and P. Varshney, “Adaptive learning of Byzantines’ behavior in cooperative spectrum sensing,” in |
2 |
Kun Zeng, Przemyslaw Pawelczak, and Danijela Cabric, “Reputation-based cooperative spectrum sensing with trusted nodes assistance,” |
3 |
G. Ding, Q. Wu, Y. Yao, J. Wang and Y. Chen, “Kernel-based learning for statistical signal processing in cognitive radio networks: Theoretical foundations, example applications, and future directions,” |
4 |
M. Jo, L. Han and D. Kim, “Selfish attacks and detection in cognitive radio ad-hoc networks,” |
5 |
A. Min, K. Shin and X. Hu, “Secure cooperative sensing in IEEE 802.22 WRANS using shadow fading correlation,” |
6 |
P. Kaligineedi, M. Khabbazian and V. Bhargava, “Malicious user detection in a cognitive radio cooperative sensing system,” |
7 |
Changlong Chen, Min Song, ChunSheng Xin and Mansoor Alam, “A robust malicious user detection scheme in cooperative spectrum sensing,” in |
8 |
P. D. Mankar, G. Das and S.S. Pathak, “A centralized method for optimal power allocation in cognitive radio networks,” in |
9 |
F. Ahmed, O. Tirkkonen, AA. Dowhuszko and M. Juntti, “Distributed power allocation in cognitive radio networks under network power constraint,” in |
10 |
Xiaoge Huang, Baltasar Beferull-Lozano and Carmen Botella, “Quasi-Nash Equilibria for Non-Convex Distributed Power Allocation Games in Cognitive Radios,” |
11 |
Xiaoge Huang, Fan Zhu, Yongxu Zou and Qianbin Chen, “Dynamic Base Station Assignment and Resource Allocation in MIMO CR Small-cell Networks,” in |
12 |
L. Anselin, “Local indicators of spatial association—LISA,” |
13 |
Y.-C. Liang, Y. Zeng, E. C. Y. Peh and A. T. Hoang, “Sensing throughput tradeoff for cognitive radio networks,” |
14 |
Q. Yan, M. Li, T. Jiang, W. Lou, and Y. Hou, “Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks,” in |
15 |
Xiaoge Huang and Baltasar Beferull-Lozano, “Non-cooperative power allocation game with imperfect sensing information for cognitive radio,” in |
16 |
C. S. Hyder, B. Grebur, LiXiao, M. Ellison, “ARC: Adaptive Reputation based Clustering Against Spectrum Sensing Data Falsification Attacks,” |
17 |
E. Björnson, L. Sanguinetti, J. Hoydis, and M. Debbah, “Optimal design of energy-efficient multi-user MIMO systems: Is massive MIMO the answer?” |
18 |
W. Saad, Z. Han, M. Debbah, A. Hjorungnes and T. Basar, “Coalitional game theory for communication networks,” |
19 |
W. Saad, Z. Han, M. Debbah and A. Hjorungnes, “Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks,” in |
20 |
K. Apt and A. Witzel, “A generic approach to coalition formation,” |
21 |
S. Singh, P. Teal, P. Dmochowski and A. Coulson, “Interference management in cognitive radio systems —A convex optimization approach,” in |
22 |
L. Zhang, G. Ding, Q. Wu, Y. Zou, Z. Han and J. Wang, “Byzantine Attack and Defense in Cognitive Radio Networks: A Survey,” |
23 |
Xu Yongjun and Zhao Xiaohui, “Optimal power allocation for multiuser underlay cognitive radio networks under QoS and interference temperature constraints,” |
24 |
|
25 |
Xiaoge Huang, Liping Chen, Qianbin Chen and Bin Shen, “Coalition formation based malicious user detection scheme in cognitive radio networks,” in |
26 |
A. G. Fragkiadakis, E. Z. Tragos and I. G. Askoxylakis, “A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks,” |
27 |
H. Redwan, A. Suwon and K. Kim, “Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks,” in |
28 |
R. Chen, J. M. Park and J. H. Reed, “Defense against primary user emulation attacks in cognitive radio networks,” |