Robust Spectrum Sensing with Crowd Sensors
暂无分享,去创建一个
Qihui Wu | Jinlong Wang | Guoru Ding | Fei Song | YuLong Zou | Linyuan Zhang | Shuo Feng | Jinlong Wang | Qi-hui Wu | Guoru Ding | Yulong Zou | Yu-dong Yao | Linyuan Zhang | Yingying Chen
[1] H. Vincent Poor,et al. Wideband Spectrum Sensing in Cognitive Radio Networks , 2008, 2008 IEEE International Conference on Communications.
[2] Joseph Mitola,et al. Accelerating 5G QoE via public-private spectrum sharing , 2014, IEEE Communications Magazine.
[3] Qihui Wu,et al. Spatial-Temporal Opportunity Detection for Spectrum-Heterogeneous Cognitive Radio Networks: Two-Dimensional Sensing , 2013, IEEE Transactions on Wireless Communications.
[4] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[5] Abhay Parekh,et al. Spectrum sharing for unlicensed bands , 2005, IEEE Journal on Selected Areas in Communications.
[6] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2008, ISIT.
[7] Fan Ye,et al. Mobile crowdsensing: current state and future challenges , 2011, IEEE Communications Magazine.
[8] Giorgio Taricco. On the Accuracy of the Gaussian Approximation With Linear Cooperative Spectrum Sensing Over Rician Fading Channels , 2010, IEEE Signal Processing Letters.
[9] Yonghong Zeng,et al. Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Trans. Wirel. Commun..
[10] Danijela Cabric,et al. Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.
[11] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[12] Michael J. Neely,et al. Opportunistic Cooperation in Cognitive Femtocell Networks , 2011, IEEE Journal on Selected Areas in Communications.
[13] S. El-Rabaie,et al. Proposed relay selection scheme for physical layer security in cognitive radio networks , 2012, IET Commun..
[14] Carl A. Gunter,et al. Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[15] Jack Yurkiewicz,et al. Constrained optimization and Lagrange multiplier methods, by D. P. Bertsekas, Academic Press, New York, 1982, 395 pp. Price: $65.00 , 1985, Networks.
[16] Geoffrey Ye Li,et al. Soft Combination and Detection for Cooperative Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[17] Xianbin Wang,et al. Optimal Relay Selection for Physical-Layer Security in Cooperative Wireless Networks , 2013, IEEE Journal on Selected Areas in Communications.
[18] Shuguang Cui,et al. Optimal Linear Cooperation for Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE Journal of Selected Topics in Signal Processing.
[19] A. Lee Swindlehurst,et al. Robust Beamforming for Security in MIMO Wiretap Channels With Imperfect CSI , 2010, IEEE Transactions on Signal Processing.
[20] Yu-Dong Yao,et al. Cooperative relay techniques for cognitive radio systems: Spectrum sensing and secondary user transmissions , 2012, IEEE Communications Magazine.
[21] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[22] Donald Goldfarband Shiqian. CONVERGENCE OF FIXED POINT CONTINUATION ALGORITHMS FOR MATRIX RANK MINIMIZATION , 2010 .
[23] Kaigui Bian,et al. Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[24] S. Kay. Fundamentals of statistical signal processing: estimation theory , 1993 .
[25] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[26] Zhu Han,et al. Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks , 2010, EURASIP J. Adv. Signal Process..
[27] Stephen P. Boyd,et al. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..
[28] Mounir Ghogho,et al. Outage Probability Based Power Distribution Between Data and Artificial Noise for Physical Layer Security , 2012, IEEE Signal Processing Letters.
[29] Fernando Casadevall,et al. Spectrum Usage Models for the Analysis, Design and Simulation of Cognitive Radio Networks , 2012 .
[30] Pramod K. Varshney,et al. Fusion of decisions transmitted over Rayleigh fading channels in wireless sensor networks , 2006, IEEE Transactions on Signal Processing.
[31] Qun Li,et al. Defending Against Cooperative Attacks in Cooperative Spectrum Sensing , 2013, IEEE Transactions on Wireless Communications.
[32] Mingyan Liu,et al. Mining Spectrum Usage Data: A Large-Scale Spectrum Measurement Study , 2009, IEEE Transactions on Mobile Computing.
[33] Xianbin Wang,et al. Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks , 2013, IEEE Transactions on Communications.
[34] Lizhong Zheng,et al. Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels , 2003, IEEE Trans. Inf. Theory.
[35] Xi Fang,et al. Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing , 2012, Mobicom '12.
[36] Emmanuel J. Candès,et al. Matrix Completion With Noise , 2009, Proceedings of the IEEE.
[37] Yiyang Pei,et al. Secure Communication in Multiantenna Cognitive Radio Networks With Imperfect Channel State Information , 2011, IEEE Transactions on Signal Processing.
[38] Ying-Chang Liang,et al. On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009 .
[39] Helena Rifà-Pous,et al. Review of Robust Cooperative Spectrum Sensing Techniques for Cognitive Radio Networks , 2012, Wirel. Pers. Commun..
[40] Shlomo Shamai,et al. Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.
[41] Pierluigi Salvo Rossi,et al. Channel-Aware Decision Fusion in Distributed MIMO Wireless Sensor Networks: Decode-and-Fuse vs. Decode-then-Fuse , 2012, IEEE Transactions on Wireless Communications.
[42] Qihui Wu,et al. Kernel-Based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions , 2013, IEEE Signal Processing Magazine.
[43] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[44] Yiyang Pei,et al. Energy-Efficient Design of Sequential Channel Sensing in Cognitive Radio Networks: Optimal Sensing Strategy, Power Allocation, and Sensing Order , 2011, IEEE Journal on Selected Areas in Communications.
[45] Pierluigi Salvo Rossi,et al. Orthogonality and Cooperation in Collaborative Spectrum Sensing through MIMO Decision Fusion , 2013, IEEE Transactions on Wireless Communications.
[46] Janne J. Lehtomäki,et al. Efficient Decision Fusion for Cooperative Spectrum Sensing Based on OR-rule , 2012, IEEE Transactions on Wireless Communications.
[47] Jeffrey G. Andrews,et al. Outage Probability of Cognitive Relay Networks with Interference Constraints , 2011, IEEE Transactions on Wireless Communications.
[48] Kang G. Shin,et al. Detection of Small-Scale Primary Users in Cognitive Radio Networks , 2011, IEEE Journal on Selected Areas in Communications.
[49] Kang G. Shin,et al. Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation , 2011, IEEE Transactions on Mobile Computing.
[50] Erik G. Larsson,et al. Spectrum Sensing for Cognitive Radio : State-of-the-Art and Recent Advances , 2012, IEEE Signal Processing Magazine.
[51] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[52] Ekram Hossain,et al. Two-Tier HetNets with Cognitive Femtocells: Downlink Performance Modeling and Analysis in a Multichannel Environment , 2014, IEEE Transactions on Mobile Computing.
[53] Shuguang Cui,et al. On the relationship between the multi-antenna secrecy communications and cognitive radio communications , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[54] Huiming Wang,et al. Distributed Beamforming for Physical-Layer Security of Two-Way Relay Networks , 2012, IEEE Transactions on Signal Processing.
[55] Shiqian Ma,et al. Convergence of Fixed-Point Continuation Algorithms for Matrix Rank Minimization , 2009, Found. Comput. Math..
[56] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[57] Ian F. Akyildiz,et al. Cooperative spectrum sensing in cognitive radio networks: A survey , 2011, Phys. Commun..
[58] Mohamed Deriche,et al. Unveiling the Hidden Assumptions of Energy Detector Based Spectrum Sensing for Cognitive Radios , 2014, IEEE Communications Surveys & Tutorials.
[59] Prasant Mohapatra,et al. Trusted collaborative spectrum sensing for mobile cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.
[60] Giorgio Taricco,et al. Optimization of Linear Cooperative Spectrum Sensing for Cognitive Radio Networks , 2011, IEEE Journal of Selected Topics in Signal Processing.
[61] Khaled Ben Letaief,et al. Cooperative Communications for Cognitive Radio Networks , 2009, Proceedings of the IEEE.
[62] Daniel Benevides da Costa,et al. Cognitive Amplify-and-Forward Relay Networks Over Nakagami- $m$ Fading , 2012, IEEE Transactions on Vehicular Technology.
[63] Young-June Choi,et al. Opportunistic Access of TV Spectrum Using Cognitive-Radio-Enabled Cellular Networks , 2011, IEEE Transactions on Vehicular Technology.
[64] Qihui Wu,et al. Robust Spectrum Sensing With Crowd Sensors , 2014, IEEE Trans. Commun..
[65] Qihui Wu,et al. Cellular-Base-Station-Assisted Device-to-Device Communications in TV White Space , 2015, IEEE Journal on Selected Areas in Communications.
[66] Pramod K. Varshney,et al. Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.
[67] Constantine Caramanis,et al. Robust PCA via Outlier Pursuit , 2010, IEEE Transactions on Information Theory.
[68] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[69] Emmanuel J. Candès,et al. A Singular Value Thresholding Algorithm for Matrix Completion , 2008, SIAM J. Optim..
[70] Santosh Pandey,et al. IEEE 802.11af: a standard for TV white space spectrum sharing , 2013, IEEE Communications Magazine.
[71] J. I. Mararm,et al. Energy Detection of Unknown Deterministic Signals , 2022 .
[72] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[73] Shuguang Cui,et al. Collaborative wideband sensing for cognitive radios , 2008, IEEE Signal Processing Magazine.
[74] Mohamed-Slim Alouini,et al. Outage Analysis for Underlay Cognitive Networks Using Incremental Regenerative Relaying , 2013, IEEE Transactions on Vehicular Technology.
[75] Xiaodong Li,et al. Stable Principal Component Pursuit , 2010, 2010 IEEE International Symposium on Information Theory.