Machine Learning-Based Malicious User Detection in Energy Harvested Cognitive Radio-Internet of Things

Our simulation data is generated from energy vector using ED technique.