Bayesian mechanisms and learning for wireless networks security with QoS requirements
暂无分享,去创建一个
Holger Boche | Fei Shen | Tansu Alpcan | Eduard A. Jorswieck | Anil Kumar Chorppath | Eduard Axel Jorswieck | T. Alpcan | H. Boche | Fei Shen
[1] Holger Boche,et al. Adversarial Behavior in Network Games , 2014, Dynamic Games and Applications.
[2] Saeed Gazor,et al. Distributed Power Control in Cellular Communication Systems Concerning Inaccurate SINR Reports , 2011, IEEE Transactions on Vehicular Technology.
[3] Dongbing Gu,et al. Spatial Gaussian Process Regression With Mobile Sensor Networks , 2012, IEEE Transactions on Neural Networks and Learning Systems.
[4] Holger Boche,et al. Detecting misbehavior in distributed wireless interference networks , 2013, Wirel. Networks.
[5] Lin Gao,et al. Wireless Network Pricing , 2013, Wireless Network Pricing.
[6] George C. Polyzos,et al. A Differentiated Services QoS Scheme Preventing Malicious Flow Behavior in Mobile Ad hoc Networks , 2006 .
[7] Tansu Alpcan,et al. Learning user preferences in mechanism design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[8] Sujit Gujar,et al. Foundations of mechanism design: A tutorial Part 2-Advanced concepts and results , 2008 .
[9] Fei Shen,et al. Universal Non-Linear Cheat-Proof Pricing Framework for Wireless Multiple Access Channels , 2014, IEEE Transactions on Wireless Communications.
[10] Cem U. Saraydar,et al. Efficient power control via pricing in wireless data networks , 2002, IEEE Trans. Commun..
[11] Holger Boche,et al. Bayesian mechanisms for wireless network security , 2014, 2014 IEEE International Conference on Communications (ICC).
[12] John S. Baras,et al. An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks , 2008, TSEC.
[13] Niki Pissinou,et al. Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory , 2013, 38th Annual IEEE Conference on Local Computer Networks.
[14] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[15] Holger Boche,et al. Pricing for distributed resource allocation in MAC without SIC under QoS requirements with malicious users , 2014, 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).