Detection Schemes of Illegal Spectrum Access Behaviors in Multiple Authorized Users Scenario
暂无分享,去创建一个
Hao Wu | Linyuan Zhang | Yueming Cai | Hao Fang | Tao Zhang | Yueming Cai | T. Zhang | Hao Wu | Linyuan Zhang | Hao Fang
[1] W. Gardner. Exploitation of spectral redundancy in cyclostationary signals , 1991, IEEE Signal Processing Magazine.
[2] Zhu Han,et al. Spectrum Sensing Under Spectrum Misuse Behaviors: A Multi-Hypothesis Test Perspective , 2018, IEEE Transactions on Information Forensics and Security.
[3] Yu-Dong Yao,et al. Cooperative Spectrum Sensing in Cognitive Radio Networks in the Presence of the Primary User Emulation Attack , 2011, IEEE Transactions on Wireless Communications.
[4] Steven Kay,et al. Fundamentals Of Statistical Signal Processing , 2001 .
[5] Peter Willett,et al. Generalized Rao Test for Decentralized Detection of an Uncooperative Target , 2017, IEEE Signal Processing Letters.
[6] Guoru Ding,et al. Detection of Spectrum Misuse Behavior in Satellite-Terrestrial Spectrum Sensing Based on Multi-Hypothesis Tests , 2020, IEEE Access.
[7] Yulong Gao,et al. Cooperative spectrum sensing based on the compressed sensing , 2015, 2015 IEEE 14th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC).
[8] Roberto Garello,et al. Cooperative spectrum sensing based on the limiting eigenvalue ratio distribution in wishart matrices , 2009, IEEE Communications Letters.
[9] Kenji Nakagawa,et al. Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[10] Mohamed-Slim Alouini,et al. On the Energy Detection of Unknown Signals Over Fading Channels , 2007, IEEE Transactions on Communications.
[11] Larry J. Greenstein,et al. Detecting anomalous spectrum usage in dynamic spectrum access networks , 2012, Ad Hoc Networks.
[12] Kang G. Shin,et al. Secure Cooperative Sensing in IEEE 802.22 WRANs Using Shadow Fading Correlation , 2011, IEEE Transactions on Mobile Computing.
[13] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[14] Zhu Han,et al. Defeating Primary User Emulation Attacks Using Belief Propagation in Cognitive Radio Networks , 2012, IEEE Journal on Selected Areas in Communications.