Learning Optimal Sniffer Channel Assignment for Small Cell Cognitive Radio Networks
暂无分享,去创建一个
Pan Zhou | Lixing Chen | Zhuo Lu | Jie Xu
[1] Miguel R. D. Rodrigues,et al. Secrecy Capacity of Wireless Channels , 2006, 2006 IEEE International Symposium on Information Theory.
[2] Valentin Rakovic,et al. Medium Access Control Protocols in Cognitive Radio Networks: Overview and General Classification , 2014, IEEE Communications Surveys & Tutorials.
[3] Saurabh Bagchi,et al. Optimal monitoring in multi-channel multi-radio wireless mesh networks , 2009, MobiHoc '09.
[4] José Marinho,et al. Cognitive radio: survey on communication protocols, spectrum decision issues, and future research directions , 2011, Wireless Networks.
[5] Jan Vondrák,et al. Maximizing a Monotone Submodular Function Subject to a Matroid Constraint , 2011, SIAM J. Comput..
[6] Tao Jiang,et al. Distributed Learning for Multi-Channel Selection in Wireless Network Monitoring , 2016, 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[7] Rong Zheng,et al. Sequential learning for optimal monitoring of multi-channel wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[8] Dan Wang,et al. Intelligent Cognitive Radio in 5G: AI-Based Hierarchical Cognitive Cellular Networks , 2019, IEEE Wireless Communications.
[9] Peter C. Mason,et al. Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[10] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[11] Prasant Mohapatra,et al. Efficient data capturing for network forensics in cognitive radio networks , 2011, 2011 19th IEEE International Conference on Network Protocols.
[12] Chang-Tien Lu,et al. Non-parametric passive traffic monitoring in cognitive radio networks , 2013, 2013 Proceedings IEEE INFOCOM.
[13] Guoliang Xing,et al. Passive interference measurement in Wireless Sensor Networks , 2010, The 18th IEEE International Conference on Network Protocols.
[14] Vera Stavroulaki,et al. 5G on the Horizon: Key Challenges for the Radio-Access Network , 2013, IEEE Vehicular Technology Magazine.
[15] W. Hoeffding. Probability Inequalities for sums of Bounded Random Variables , 1963 .
[16] Mingyan Liu,et al. Sniffer Channel Assignment With Imperfect Monitoring for Cognitive Radio Networks , 2016, IEEE Transactions on Wireless Communications.
[17] Andreas Krause,et al. Interactive Submodular Bandit , 2017, NIPS.
[18] Rong Zheng,et al. On Quality of Monitoring for Multichannel Wireless Infrastructure Networks , 2014, IEEE Trans. Mob. Comput..
[19] Wei Chu,et al. A contextual-bandit approach to personalized news article recommendation , 2010, WWW '10.
[20] Geoffrey Ye Li,et al. Joint User Association and Spectrum Allocation for Small Cell Networks With Wireless Backhauls , 2016, IEEE Wireless Communications Letters.
[21] Mingyan Liu,et al. Secondary User Data Capturing for Cognitive Radio Network Forensics under Capturing Uncertainty , 2014, 2014 IEEE Military Communications Conference.
[22] Jie Xu,et al. Contextual Combinatorial Multi-armed Bandits with Volatile Arms and Submodular Reward , 2018, NeurIPS.
[23] Rajdeep Niyogi,et al. Network forensic frameworks: Survey and research challenges , 2010, Digit. Investig..
[24] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[25] Prasant Mohapatra,et al. Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space , 2013, IEEE Transactions on Mobile Computing.
[26] Rong Zheng,et al. Sequential Learning for Multi-Channel Wireless Network Monitoring With Channel Switching Costs , 2014, IEEE Transactions on Signal Processing.
[27] T. L. Lai Andherbertrobbins. Asymptotically Efficient Adaptive Allocation Rules , 2022 .
[28] Geng Wu,et al. 5G Network Capacity: Key Elements and Technologies , 2014, IEEE Vehicular Technology Magazine.
[29] Chunxiao Jiang,et al. Resource Allocation for Cognitive Small Cell Networks: A Cooperative Bargaining Game Theoretic Approach , 2015, IEEE Transactions on Wireless Communications.
[30] Jie Xu,et al. Task Replication for Vehicular Cloud: Contextual Combinatorial Bandit with Delayed Feedback , 2018, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.
[31] Carlo Fischione,et al. Millimeter Wave Cellular Networks: A MAC Layer Perspective , 2015, IEEE Transactions on Communications.
[32] Cornelis H. Slump,et al. Cognitive Small Cell Networks: Energy Efficiency and Trade-Offs , 2013, IEEE Transactions on Communications.