1 |
A. Vempaty, K. Agrawal, H. Chen and P. Varshney, “Adaptive learning of Byzantines’ behavior in cooperative spectrum sensing,” in Proc. of 2011 IEEE Wireless Communications and Networking Conference, pp.1310-1315, March 28-31, 2011. Article (CrossRef Link)
|
2 |
Kun Zeng, Przemyslaw Pawelczak, and Danijela Cabric, “Reputation-based cooperative spectrum sensing with trusted nodes assistance,” IEEE Communications Letters, vol. 14, no. 3, pp. 226-228, March, 2010. Article (CrossRef Link)
DOI
|
3 |
G. Ding, Q. Wu, Y. Yao, J. Wang and Y. Chen, “Kernel-based learning for statistical signal processing in cognitive radio networks: Theoretical foundations, example applications, and future directions,” IEEE Signal Processing Magazine, vol. 30, no. 4, pp. 126–136, July, 2013. Article (CrossRef Link)
DOI
|
4 |
M. Jo, L. Han and D. Kim, “Selfish attacks and detection in cognitive radio ad-hoc networks,” IEEE Network, vol. 27, no. 3, pp. 46-50, May, 2013. Article (CrossRef Link)
DOI
|
5 |
A. Min, K. Shin and X. Hu, “Secure cooperative sensing in IEEE 802.22 WRANS using shadow fading correlation,” IEEE Transactions on Mobile Computing, vol. 10, no. 10, pp. 1434-1447, October, 2011. Article (CrossRef Link)
DOI
|
6 |
P. Kaligineedi, M. Khabbazian and V. Bhargava, “Malicious user detection in a cognitive radio cooperative sensing system,” IEEE Transactions on Wireless Communications, vol. 9, no. 8, pp. 2488-2497, August, 2010. Article (CrossRef Link)
DOI
|
7 |
Changlong Chen, Min Song, ChunSheng Xin and Mansoor Alam, “A robust malicious user detection scheme in cooperative spectrum sensing,” in Proc. of 2012 IEEE Global Communications Conference, pp. 4856-4861, December 3-7, 2012. Article (CrossRef Link)
|
8 |
P. D. Mankar, G. Das and S.S. Pathak, “A centralized method for optimal power allocation in cognitive radio networks,” in Proc. of 2013 IEEE Globecom Workshop, pp. 385-390, December 9-13, 2013. Article (CrossRef Link)
|
9 |
F. Ahmed, O. Tirkkonen, AA. Dowhuszko and M. Juntti, “Distributed power allocation in cognitive radio networks under network power constraint,” in Proc. of 2014 9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications, pp. 492-497, June 2-4, 2014. Article (CrossRef Link)
|
10 |
Xiaoge Huang, Baltasar Beferull-Lozano and Carmen Botella, “Quasi-Nash Equilibria for Non-Convex Distributed Power Allocation Games in Cognitive Radios,” IEEE Transactions on Wireless Communications. vol. 12, no. 7, pp. 3326-3337, July, 2013. Article (CrossRef Link)
DOI
|
11 |
Xiaoge Huang, Fan Zhu, Yongxu Zou and Qianbin Chen, “Dynamic Base Station Assignment and Resource Allocation in MIMO CR Small-cell Networks,” in Proc. Of 2014 14th International Symposium on Conmunications and Information Technologies, pp. 61-65, September 24-26, 2014. Article (CrossRef Link)
|
12 |
L. Anselin, “Local indicators of spatial association—LISA,” GEOGRAPHICAL ANALYSIS, vol. 27, no. 2, pp. 93-115, April 1995. Article (CrossRef Link)
DOI
|
13 |
Y.-C. Liang, Y. Zeng, E. C. Y. Peh and A. T. Hoang, “Sensing throughput tradeoff for cognitive radio networks,” IEEE Transactions on Wireless Communications. vol. 7, no. 4, pp. 1326-1337, April, 2008. Article (CrossRef Link)
DOI
|
14 |
Q. Yan, M. Li, T. Jiang, W. Lou, and Y. Hou, “Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks,” in Proc. of 2012 31st IEEE International Conference on Computer Communications, pp. 900-908, March 25-30, 2012. Article (CrossRef Link)
|
15 |
Xiaoge Huang and Baltasar Beferull-Lozano, “Non-cooperative power allocation game with imperfect sensing information for cognitive radio,” in Proc. of 2012 IEEE International Conference on Communications, pp. 1666-1671, June 10-15, 2012. Article (CrossRef Link)
|
16 |
C. S. Hyder, B. Grebur, LiXiao, M. Ellison, “ARC: Adaptive Reputation based Clustering Against Spectrum Sensing Data Falsification Attacks,” IEEE Transactions on Mobile Computing, vol. 13, no.8, pp.1707-1719, August, 2014. Article (CrossRef Link)
DOI
|
17 |
E. Björnson, L. Sanguinetti, J. Hoydis, and M. Debbah, “Optimal design of energy-efficient multi-user MIMO systems: Is massive MIMO the answer?” IEEE Transactions on Wireless Communications, vol. 14, no. 6, pp. 3059-3075, June, 2015. Article (CrossRef Link)
DOI
|
18 |
W. Saad, Z. Han, M. Debbah, A. Hjorungnes and T. Basar, “Coalitional game theory for communication networks,” IEEE Signal Processing Magazine, vol. 26, no. 5, pp. 77–97, September, 2009. Article (CrossRef Link)
DOI
|
19 |
W. Saad, Z. Han, M. Debbah and A. Hjorungnes, “Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks,” in Proc. of 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, pp. 2114-2122, April 19-25, 2009. Article (CrossRef Link)
|
20 |
K. Apt and A. Witzel, “A generic approach to coalition formation,” International Game Theory Review, vol. 11, no. 3, pp. 347-367, September, 2009. Article (CrossRef Link)
DOI
|
21 |
S. Singh, P. Teal, P. Dmochowski and A. Coulson, “Interference management in cognitive radio systems —A convex optimization approach,” in Proc. of 2012 IEEE International Conference on Communications, pp. 1884-1889, June 10-15, 2012. Article (CrossRef Link)
|
22 |
L. Zhang, G. Ding, Q. Wu, Y. Zou, Z. Han and J. Wang, “Byzantine Attack and Defense in Cognitive Radio Networks: A Survey,” IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1342-1363, August, 2015. Article (CrossRef Link)
DOI
|
23 |
Xu Yongjun and Zhao Xiaohui, “Optimal power allocation for multiuser underlay cognitive radio networks under QoS and interference temperature constraints,” China Communications, vol. 10, no. 10, pp. 91-100, October, 2013. Article (CrossRef Link)
DOI
|
24 |
J. Mitola and G. Q. Maguire, “Cognitive radio: Making software radios more personal,” IEEE Personal Communications, vol. 6, no.4, pp. 13-18, August 1999. Article (CrossRef Link) ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
DOI
|
25 |
Xiaoge Huang, Liping Chen, Qianbin Chen and Bin Shen, “Coalition formation based malicious user detection scheme in cognitive radio networks,” in Proc. of 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, pp.1415-1419, August 30-September 2, 2015. Article (CrossRef Link)
|
26 |
A. G. Fragkiadakis, E. Z. Tragos and I. G. Askoxylakis, “A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks,” IEEE Communications Surveys and Tutorials, vol. 15, no.1, pp. 428-445, February, 2013. Article (CrossRef Link)
DOI
|
27 |
H. Redwan, A. Suwon and K. Kim, “Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks,” in Proc. of 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology, pp. 3-9, December 27-28, 2008. Article (CrossRef Link)
|
28 |
R. Chen, J. M. Park and J. H. Reed, “Defense against primary user emulation attacks in cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 1, pp. 25-37, January, 2008. Article (CrossRef Link)
DOI
|