Defending against Byzantine attack in cooperative spectrum sensing relying on a reliable reference
暂无分享,去创建一个
[1] Zhu Han,et al. Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[2] P.K. Varshney,et al. Optimal Data Fusion in Multiple Sensor Detection Systems , 1986, IEEE Transactions on Aerospace and Electronic Systems.
[3] Fan Ye,et al. Mobile crowdsensing: current state and future challenges , 2011, IEEE Communications Magazine.
[4] Yuping Zhao,et al. A New Cooperative Detection Technique with Malicious User Suppression , 2009, 2009 IEEE International Conference on Communications.
[5] Fabrizio Granelli,et al. Identification and Punishment Policies for Spectrum Sensing Data Falsification Attackers Using Delivery-Based Assessment , 2016, IEEE Transactions on Vehicular Technology.
[6] Qihui Wu,et al. Performance analysis of probabilistic soft SSDF attack in cooperative spectrum sensing , 2014, EURASIP J. Adv. Signal Process..
[7] Zhu Han,et al. Catch Me if You Can: An Abnormality Detection Approach for Collaborative Spectrum Sensing in Cognitive Radio Networks , 2010, IEEE Transactions on Wireless Communications.
[8] Yunghsiang Sam Han,et al. Distributed Detection in Tree Topologies With Byzantines , 2013, IEEE Transactions on Signal Processing.
[9] Ian F. Akyildiz,et al. Cooperative spectrum sensing in cognitive radio networks: A survey , 2011, Phys. Commun..
[10] Yunghsiang Sam Han,et al. Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques , 2014, IEEE Transactions on Information Forensics and Security.
[11] Qun Li,et al. Defending Against Cooperative Attacks in Cooperative Spectrum Sensing , 2013, IEEE Transactions on Wireless Communications.
[12] Danijela Cabric,et al. Reputation-based cooperative spectrum sensing with trusted nodes assistance , 2010, IEEE Communications Letters.
[13] Qihui Wu,et al. Robust Spectrum Sensing With Crowd Sensors , 2014, IEEE Trans. Commun..
[14] K. B. Letaief,et al. Optimization of cooperative spectrum sensing with energy detection in cognitive radio networks , 2009, IEEE Transactions on Wireless Communications.
[15] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[16] Yonghong Zeng,et al. Sensing-Throughput Tradeoff for Cognitive Radio Networks , 2008, IEEE Trans. Wirel. Commun..
[17] Majid Khabbazian,et al. Malicious User Detection in a Cognitive Radio Cooperative Sensing System , 2010, IEEE Transactions on Wireless Communications.
[18] Peng Ning,et al. A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check , 2013, IEEE Transactions on Wireless Communications.
[19] Do-Hoon Kim,et al. Selfish attacks and detection in cognitive radio Ad-Hoc networks , 2013, IEEE Network.
[20] Kaigui Bian,et al. Robust Distributed Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[21] Yunghsiang Sam Han,et al. Distributed Bayesian Detection in the Presence of Byzantine Data , 2013, IEEE Transactions on Signal Processing.
[22] Peng Ning,et al. HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing , 2013, IEEE Journal on Selected Areas in Communications.
[23] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2011, IEEE Trans. Signal Process..
[24] Qihui Wu,et al. Kernel-Based Learning for Statistical Signal Processing in Cognitive Radio Networks: Theoretical Foundations, Example Applications, and Future Directions , 2013, IEEE Signal Processing Magazine.
[25] H. Urkowitz. Energy detection of unknown deterministic signals , 1967 .
[26] Pramod K. Varshney,et al. Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.