Location Privacy in Cognitive Radio Networks: A Survey
暂无分享,去创建一个
[1] Sudharman K. Jayaweera,et al. A Survey on Machine-Learning Techniques in Cognitive Radios , 2013, IEEE Communications Surveys & Tutorials.
[2] Ying-Chang Liang,et al. Joint power control and beamforming for cognitive radio networks , 2008, IEEE Transactions on Wireless Communications.
[3] B. R. Badrinath,et al. Ad hoc positioning system (APS) , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[4] Jacques Palicot,et al. Cyclostatilonarilty-Based Test for Detection of Vacant Frequency Bands , 2006, 2006 1st International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[5] Jun Zhao,et al. Distributed coordination in dynamic spectrum allocation networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[6] Bechir Hamdaoui,et al. Achieving optimal elastic traffic rewards in dynamic multichannel access , 2011, 2011 International Conference on High Performance Computing & Simulation.
[7] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[8] Dingde Jiang,et al. An effective dynamic spectrum access algorithm for multi-hop cognitive wireless networks , 2015, Comput. Networks.
[9] Qingqi Pei,et al. Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks , 2016 .
[10] Paramvir Bahl,et al. SenseLess: A database-driven white spaces network , 2011, 2011 IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN).
[11] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[12] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[13] Syed Ali Jafar,et al. COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - The Throughput Potential of Cognitive Radio: A Theoretical Perspective , 2007, IEEE Communications Magazine.
[14] Özgür B. Akan,et al. Cognitive radio sensor networks , 2009, IEEE Network.
[15] Ian F. Akyildiz,et al. Spectrum management in cognitive radio ad hoc networks , 2009, IEEE Network.
[16] Divyakant Agrawal,et al. Generalizing PIR for Practical Private Retrieval of Public Data , 2010, DBSec.
[17] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.
[18] Athanasios V. Vasilakos,et al. TRAC: Truthful auction for location-aware collaborative sensing in mobile crowdsourcing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[19] Ali Farhadi,et al. Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks , 2011, NDSS.
[20] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[21] A. Agrawala,et al. WSN16-5: Distributed Formation of Overlapping Multi-hop Clusters in Wireless Sensor Networks , 2006, IEEE Globecom 2006.
[22] Elaine Shi,et al. Towards Practical Oblivious RAM , 2011, NDSS.
[23] Mohsen Guizani,et al. Adaptive service function for system reward maximization under elastic traffic model , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[24] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[25] Shivakant Mishra,et al. Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[26] Erik D. Demaine,et al. Anchor-Free Distributed Localization in Sensor Networks , 2003 .
[27] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[28] Spiridon Bakiras,et al. Efficient Location Privacy for Moving Clients in Database-Driven Dynamic Spectrum Access , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).
[29] Konstantinos Psounis,et al. Can the privacy of primary networks in shared spectrum be protected? , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[30] Bechir Hamdaoui,et al. Enabling opportunistic and dynamic spectrum access through learning techniques , 2011, Wirel. Commun. Mob. Comput..
[31] Amir Ghasemi,et al. Spectrum sensing in cognitive radio networks: requirements, challenges and design trade-offs , 2008, IEEE Communications Magazine.
[32] Xinbing Wang,et al. Spectrum Sharing in Cognitive Radio Networks—An Auction-Based Approach , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[33] Yiwei Thomas Hou,et al. Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[34] Bin Fan,et al. Cuckoo Filter: Practically Better Than Bloom , 2014, CoNEXT.
[35] Wade Trappe,et al. Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.
[36] Stefan Mangold,et al. Managing location privacy in cellular networks with femtocell deployments , 2011, 2011 International Symposium of Modeling and Optimization of Mobile, Ad Hoc, and Wireless Networks.
[37] Mauro Conti,et al. Providing Source Location Privacy in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[38] Georgios B. Giannakis,et al. A Wavelet Approach to Wideband Spectrum Sensing for Cognitive Radios , 2006, 2006 1st International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[39] Michele Zorzi,et al. A Neural Network Based Cognitive Controller for Dynamic Channel Selection , 2009, 2009 IEEE International Conference on Communications.
[40] Guihai Chen,et al. A General Privacy-Preserving Auction Mechanism for Secondary Spectrum Markets , 2016, IEEE/ACM Transactions on Networking.
[41] Jung Hee Cheon,et al. Fully Homomophic Encryption over the Integers Revisited , 2015, EUROCRYPT.
[42] Marko Höyhtyä,et al. Spectrum Occupancy Measurements: A Survey and Use of Interference Maps , 2016, IEEE Communications Surveys & Tutorials.
[43] Florian Kerschbaum,et al. Searchable Encryption with Secure and Efficient Updates , 2014, CCS.
[44] Mohsen Guizani,et al. Optimal power allocation for smart-grid powered point-to-point cognitive radio system , 2014, 2014 IEEE Computers, Communications and IT Applications Conference.
[45] Long Bao Le,et al. Channel Assignment With Access Contention Resolution for Cognitive Radio Networks , 2012, IEEE Transactions on Vehicular Technology.
[46] Rui Zhang,et al. SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing , 2015, IEEE Transactions on Wireless Communications.
[47] Chi Zhang,et al. Secure crowdsourcing-based cooperative pectrum sensing , 2013, 2013 Proceedings IEEE INFOCOM.
[48] Geoffrey Ye Li,et al. Cooperative Spectrum Sensing in Cognitive Radio, Part II: Multiuser Networks , 2007, IEEE Transactions on Wireless Communications.
[49] Rong Peng,et al. Angle of Arrival Localization for Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[50] Mohsen Guizani,et al. Power allocation analysis for dynamic power utility in cognitive radio systems , 2015, 2015 IEEE International Conference on Communications (ICC).
[51] Hüseyin Arslan,et al. A survey of spectrum sensing algorithms for cognitive radio applications , 2009, IEEE Communications Surveys & Tutorials.
[52] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[53] Yasir Saleem,et al. Primary radio user activity models for cognitive radio networks: A survey , 2014, J. Netw. Comput. Appl..
[54] Kok-Lim Alvin Yau,et al. A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.
[55] Adam Wolisz,et al. COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS - Dynamic Frequency Hopping Communities for Efficient IEEE 802.22 Operation , 2007, IEEE Communications Magazine.
[56] Martin Reisslein,et al. White space , 2016 .
[57] Danda B. Rawat,et al. Advances on Security Threats and Countermeasures for Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[58] Peng Cheng,et al. Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.
[59] Qian Zhang,et al. Privacy-Preserving Collaborative Spectrum Sensing With Multiple Service Providers , 2015, IEEE Transactions on Wireless Communications.
[60] Tuna Tugcu,et al. Radio environment map as enabler for practical cognitive radio networks , 2013, IEEE Communications Magazine.
[61] Rafail Ostrovsky,et al. Searchable symmetric encryption: improved definitions and efficient constructions , 2006, CCS '06.
[62] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[63] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[64] Ben Y. Zhao,et al. Utilization and fairness in spectrum assignment for opportunistic spectrum access , 2006, Mob. Networks Appl..
[65] Adrian Perrig,et al. Using Clustering Information for Sensor Network Localization , 2005, DCOSS.
[66] Xiaocong Jin,et al. Privacy-preserving crowdsourced spectrum sensing , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[67] Björn E. Ottersten,et al. Robust Cognitive Beamforming With Bounded Channel Uncertainties , 2009, IEEE Transactions on Signal Processing.
[68] Bechir Hamdaoui,et al. Distributed resource and service management for large-scale dynamic spectrum access systems through coordinated learning , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[69] Athanasios V. Vasilakos,et al. Routing Metrics of Cognitive Radio Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[70] Bechir Hamdaoui. Adaptive spectrum assessment for opportunistic access in cognitive radio networks , 2009, IEEE Transactions on Wireless Communications.
[71] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[72] Marco Di Felice,et al. SEARCH: A routing protocol for mobile cognitive radio ad-Hoc networks , 2009, 2009 IEEE Sarnoff Symposium.
[73] Ioannis Lambadaris,et al. Privacy-preserving distributed cooperative spectrum sensing in multi-channel cognitive radio MANETs , 2015, 2015 IEEE International Conference on Communications (ICC).
[74] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[75] Mohsen Guizani,et al. Large-scale cognitive cellular systems: resource management overview , 2015, IEEE Communications Magazine.
[76] Hae-Young Bae,et al. Location Positioning and Privacy Preservation Methods in Location-based Service , 2015 .
[77] Hugo Krawczyk,et al. Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation , 2014, NDSS.
[78] Martin Reisslein,et al. Cognitive Radio for Smart Grids: Survey of Architectures, Spectrum Sensing Mechanisms, and Networking Protocols , 2016, IEEE Communications Surveys & Tutorials.
[79] R.W. Brodersen,et al. Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[80] Christos Faloutsos,et al. On packing R-trees , 1993, CIKM '93.
[81] Zhenfu Cao,et al. Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures , 2013, 2013 Proceedings IEEE INFOCOM.
[82] Mohsen Guizani,et al. Implementation and Analysis of Reward Functions Under Different Traffic Models for Distributed DSA Systems , 2015, IEEE Transactions on Wireless Communications.
[83] Martin Vossiek,et al. Wireless local positioning - concepts, solutions, applications , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.
[84] Jorge Guajardo,et al. Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware , 2015, SAC.
[85] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[86] Moshe T. Masonta,et al. Spectrum Decision in Cognitive Radio Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[87] Mohsen Guizani,et al. Resources allocation for large-scale dynamic spectrum access system using particle filtering , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[88] G. Ganesan,et al. Cooperative spectrum sensing in cognitive radio networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[89] He Chen,et al. Spectrum handoff scheme based on recommended channel sensing sequence , 2013, China Communications.
[90] Chung-Ju Chang,et al. Modeling and Analysis for Spectrum Handoffs in Cognitive Radio Networks , 2012, IEEE Transactions on Mobile Computing.
[91] Vipin Kumar,et al. Conflict Graph Based Channel Allocation in Cognitive Radio Networks , 2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW).
[92] Wei Cheng,et al. Spectrum prediction in cognitive radio networks , 2013, IEEE Wireless Communications.
[93] Weisong Shi,et al. Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[94] Victor C. M. Leung,et al. A Coalition Formation Game for Energy-Efficient Cooperative Spectrum Sensing in Cognitive Radio Networks with Multiple Channels , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[95] H. Vincent Poor,et al. Collaborative Cyclostationary Spectrum Sensing for Cognitive Radio Systems , 2009, IEEE Transactions on Signal Processing.
[96] Martin Haenggi,et al. Stochastic Geometry for Modeling, Analysis, and Design of Multi-Tier and Cognitive Cellular Wireless Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[97] Sharifah Kamilah Syed Yusof,et al. Proactive integrated handoff management in cognitive radio mobile ad hoc networks , 2013, EURASIP J. Wirel. Commun. Netw..
[98] Symeon Chatzinotas,et al. Application of Compressive Sensing in Cognitive Radio Communications: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[99] Cristina Comaniciu,et al. A Game Theoretic Approach to Interference Management in Cognitive Networks , 2007 .
[100] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[101] Alexandros G. Fragkiadakis,et al. A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks , 2013, IEEE Communications Surveys & Tutorials.
[102] Yi-Ming Chen,et al. Safe Distance Based Location Privacy in Vehicular Networks , 2010, 2010 IEEE 71st Vehicular Technology Conference.
[103] Anant Sahai,et al. Some Fundamental Limits on Cognitive Radio , 2004 .
[104] Ying Zhang,et al. Localization from mere connectivity , 2003, MobiHoc '03.
[105] Azzedine Boukerche,et al. Algorithms and Protocols for Wireless Sensor Networks , 2008, Wiley series on parallel and distributed computing.
[106] Ben Y. Zhao,et al. Towards commoditized real-time spectrum monitoring , 2014, HotWireless@MobiCom.
[107] Brian D. O. Anderson,et al. Path loss exponent estimation for wireless sensor network localization , 2007, Comput. Networks.
[108] Haythem Bany Salameh,et al. Throughput-oriented channel assignment for opportunistic spectrum access networks , 2011, Math. Comput. Model..
[109] Tim Roughgarden,et al. Algorithmic Game Theory , 2007 .
[110] Ekram Hossain,et al. Dynamic Spectrum Access and Management in Cognitive Radio Networks: Introduction , 2009 .
[111] Rong Du,et al. Location Privacy Preserving Dynamic Spectrum Auction in Cognitive Radio Network , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.
[112] Ossama Younis,et al. MAC Protocol for Opportunistic Cognitive Radio Networks with Soft Guarantees , 2009, IEEE Transactions on Mobile Computing.
[113] L. Ma,et al. Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[114] Xuemin Shen,et al. HC-MAC: A Hardware-Constrained Cognitive MAC for Efficient Spectrum Management , 2008, IEEE Journal on Selected Areas in Communications.
[115] Ekram Hossain,et al. Dynamic Spectrum Access and Management in Cognitive Radio Networks , 2009 .
[116] Ian F. Akyildiz,et al. Spectrum-Aware Mobility Management in Cognitive Radio Cellular Networks , 2012, IEEE Transactions on Mobile Computing.
[117] Dong In Kim,et al. Joint rate and power allocation for cognitive radios in dynamic spectrum access environment , 2008, IEEE Transactions on Wireless Communications.
[118] A. Wolisz,et al. Reliable link maintenance in cognitive radio systems , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[119] Lei Tang,et al. Privacy-preserving secure relative localization in vehicular networks , 2008, Secur. Commun. Networks.
[120] R. Michael Buehrer,et al. Handbook of Position Location: Theory, Practice and Advances , 2011 .
[121] Lei Yang,et al. Privacy-Preserving Database Assisted Spectrum Access: A Socially-Aware Distributed Learning Approach , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[122] Ilyong Chung,et al. Spectrum mobility in cognitive radio networks , 2012, IEEE Communications Magazine.
[123] Moe Z. Win,et al. Cooperative Localization in Wireless Networks , 2009, Proceedings of the IEEE.
[124] Ekram Hossain,et al. Cellular OFDMA Cognitive Radio Networks: Generalized Spectral Footprint Minimization , 2015, IEEE Transactions on Vehicular Technology.
[125] Jeffrey H. Reed,et al. Network Support: The Radio Environment Map , 2009 .
[126] Liang Zhang,et al. Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[127] Mohsen Guizani,et al. Distributed Learning-Based Cross-Layer Technique for Energy-Efficient Multicarrier Dynamic Spectrum Access With Adaptive Power Allocation , 2016, IEEE Transactions on Wireless Communications.
[128] Ying-Chang Liang,et al. Joint Beamforming and Power Allocation for Multiple Access Channels in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[129] Wahidah Hashim,et al. Clustering algorithms for Cognitive Radio networks: A survey , 2014, J. Netw. Comput. Appl..
[130] Zhu Han,et al. Joint Pricing and Load Balancing for Cognitive Spectrum Access: Non-Cooperation Versus Cooperation , 2015, IEEE Journal on Selected Areas in Communications.
[131] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[132] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[133] Naima Kaabouch,et al. A survey on compressive sensing techniques for cognitive radio networks , 2016, Phys. Commun..
[134] Yaling Yang,et al. Location spoofing attack and its countermeasures in database-driven cognitive radio networks , 2014, 2014 IEEE Conference on Communications and Network Security.
[135] Andris Ambainis,et al. On Lower Bounds for the Communication Complexity of Private Information Retrieval ∗ , 2000 .
[136] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[137] Li-Chun Wang,et al. Spectrum Handoff for Cognitive Radio Networks: Reactive-Sensing or Proactive-Sensins? , 2008, 2008 IEEE International Performance, Computing and Communications Conference.
[138] K. J. Ray Liu,et al. Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.
[139] Amy C. Malady,et al. Clustering methods for distributed spectrum sensing in cognitive radio systems , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[140] Lei Ding,et al. Distributed Routing, Relay Selection, and Spectrum Allocation in Cognitive and Cooperative Ad Hoc Networks , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[141] Mohsen Guizani,et al. Distributed Fair Spectrum Assignment for Large-Scale Wireless DSA Networks , 2015, CrownCom.
[142] Sheng Zhong,et al. Protecting Location Information in Collaborative Sensing of Cognitive Radio Networks , 2015, MSWiM.
[143] Mohsen Guizani,et al. Maximizing Secondary-User Satisfaction in Large-Scale DSA Systems Through Distributed Team Cooperation , 2012, IEEE Transactions on Wireless Communications.
[144] Alhussein A. Abouzeid,et al. Auction-based spectrum sharing in cognitive radio networks with heterogeneous channels , 2013, 2013 Information Theory and Applications Workshop (ITA).
[145] B. Scheers,et al. Data fusion schemes for cooperative spectrum sensing in cognitive radio networks , 2012, 2012 Military Communications and Information Systems Conference (MCC).
[146] Erik D. Demaine,et al. Poster abstract: anchor-free distributed localization in sensor networks , 2003, SenSys '03.
[147] Andy Parrish,et al. Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups , 2010, ISC.
[148] Balasubramaniam Natarajan,et al. Modeling and Forecasting Secondary User Activity in Cognitive Radio Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.
[149] Saswati Sarkar,et al. Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks , 2010, IEEE/ACM Transactions on Networking.
[150] Andrea Giorgetti,et al. Cognitive Radio Techniques: Spectrum Sensing, Interference Mitigation, and Localization , 2012 .
[151] N. Hoven,et al. Power scaling for cognitive radio , 2005, 2005 International Conference on Wireless Networks, Communications and Mobile Computing.
[152] Yunfei Chen,et al. A Survey of Measurement-Based Spectrum Occupancy Modeling for Cognitive Radios , 2016, IEEE Communications Surveys & Tutorials.
[153] Mubashir Husain Rehmani,et al. A Survey of Channel Bonding for Wireless Networks and Guidelines of Channel Bonding for Futuristic Cognitive Radio Sensor Networks , 2016, IEEE Communications Surveys & Tutorials.
[154] Sudharman K. Jayaweera,et al. Optimal Channel and Power Allocation for Secondary Users in Cooperative Cognitive Radio Networks - (Invited Paper) , 2010, MOBILIGHT.
[155] Spiridon Bakiras,et al. Leveraging P2P interactions for efficient location privacy in database-driven dynamic spectrum access , 2015, Int. J. Netw. Secur..
[156] Ying-Chang Liang,et al. Maximizing Spectrum Utilization of Cognitive Radio Networks Using Channel Allocation and Power Control , 2006, IEEE Vehicular Technology Conference.
[157] Carl A. Gunter,et al. Secure Collaborative Sensing for Crowd Sourcing Spectrum Data in White Space Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).
[158] Mohamed Grissa,et al. Cuckoo filter-based location-privacy preservation in database-driven cognitive radio networks , 2015, 2015 World Symposium on Computer Networks and Information Security (WSCNIS).
[159] Jiang Xie,et al. ProSpect: A Proactive Spectrum Handoff Framework for Cognitive Radio Ad Hoc Networks without Common Control Channel , 2012, IEEE Transactions on Mobile Computing.
[160] Yan Zhang,et al. Economic Approaches for Cognitive Radio Networks: A Survey , 2011, Wirel. Pers. Commun..
[161] Shiwen Mao,et al. Overhead Analysis for Radio Environment Mapenabled Cognitive Radio Networks , 2006, 2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio Networks.
[162] Carl A. Gunter,et al. Dynamic Searchable Encryption via Blind Storage , 2014, 2014 IEEE Symposium on Security and Privacy.
[163] Fabrizio Granelli,et al. Optimizing the K-out-of-N rule for cooperative spectrum sensing in cognitive radio networks , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[164] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[165] Mohsen Guizani,et al. Survey of Security Issues in Cognitive Radio Networks , 2011 .
[166] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[167] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[168] Jie Gao,et al. Connectivity-Based Localization of Large Scale Sensor Networks with Complex Shape , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[169] Yi Li,et al. Optimal strategies for defending location inference attack in database-driven CRNs , 2015, 2015 IEEE International Conference on Communications (ICC).
[170] Bechir Hamdaoui,et al. Traffic and Interference Aware Scheduling for Multiradio Multichannel Wireless Mesh Networks , 2011, IEEE Transactions on Vehicular Technology.
[171] Álvaro Araujo,et al. Security in cognitive wireless sensor networks. Challenges and open problems , 2012, EURASIP Journal on Wireless Communications and Networking.
[172] Jiming Chen,et al. Energy-efficient cooperative spectrum sensing in sensor-aided cognitive radio networks , 2012, IEEE Wireless Communications.
[173] Jeffrey H. Reed,et al. Chapter 11 – Network Support: The Radio Environment Map , 2006 .
[174] Lili Yang,et al. A Historical-Information-Based Algorithm in Dynamic Spectrum Allocation , 2009, 2009 International Conference on Communication Software and Networks.
[175] Geoffrey Ye Li,et al. Cooperative Spectrum Sensing in Cognitive Radio, Part I: Two User Networks , 2007, IEEE Transactions on Wireless Communications.
[176] Craig Gentry,et al. Single-Database Private Information Retrieval with Constant Communication Rate , 2005, ICALP.
[177] Deborah Estrin,et al. Localization in sensor networks , 2004 .
[178] Timothy J. O'Shea,et al. Applications of Machine Learning to Cognitive Radio Networks , 2007, IEEE Wireless Communications.
[179] Mohsen Guizani,et al. Radio and Medium Access Contention Aware Routing for Lifetime Maximization in Multichannel Sensor Networks , 2012, IEEE Transactions on Wireless Communications.
[180] Mohamed Grissa,et al. An efficient technique for protecting location privacy of cooperative spectrum sensing users , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[181] Sherali Zeadally,et al. Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey , 2013, IEEE Communications Surveys & Tutorials.
[182] Özgür B. Akan,et al. Spectrum-aware and cognitive sensor networks for smart grid applications , 2012, IEEE Communications Magazine.
[183] Jianfeng Wang,et al. Emerging cognitive radio applications: A survey , 2011, IEEE Communications Magazine.
[184] Mohsen Guizani,et al. Distributed dynamic spectrum access with adaptive power allocation: Energy efficiency and cross-layer awareness , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[185] Paramvir Bahl,et al. White space networking with wi-fi like connectivity , 2009, SIGCOMM '09.
[186] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[187] Bechir Hamdaoui,et al. Aligning Spectrum-User Objectives for Maximum Inelastic-Traffic Reward , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[188] Cristina Comaniciu,et al. Adaptive Channel Allocation Spectrum Etiquette for Cognitive Radio Networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..
[189] Edith C. H. Ngai,et al. On providing location privacy for mobile sinks in wireless sensor networks , 2009, MSWiM '09.
[190] John G. Proakis. Intersymbol Interference in Digital Communication Systems , 2003 .
[191] Frederik Vercauteren,et al. Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.
[192] Dusit Niyato,et al. Spectrum trading in cognitive radio networks: A market-equilibrium-based approach , 2008, IEEE Wirel. Commun..
[193] David E. Culler,et al. A practical evaluation of radio signal strength for ranging-based localization , 2007, MOCO.
[194] Ossama Younis,et al. Distance- and Traffic-Aware Channel Assignment in Cognitive Radio Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[195] Cyrus Shahabi,et al. Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services , 2009, Privacy in Location-Based Applications.
[196] Prathima Agrawal,et al. Synchronized MAC Protocol For Multi-Hop Cognitive Radio Networks , 2008, 2008 IEEE International Conference on Communications.
[197] Ekram Hossain,et al. Resource allocation for spectrum underlay in cognitive radio networks , 2008, IEEE Transactions on Wireless Communications.
[198] Bechir Hamdaoui,et al. Efficient Objective Functions for Coordinated Learning in Large-Scale Distributed OSA Systems , 2013, IEEE Transactions on Mobile Computing.
[199] S. Frick,et al. Compressed Sensing , 2014, Computer Vision, A Reference Guide.
[200] Hong Jiang,et al. Modeling of Learning Inference and Decision-Making Engine in Cognitive Radio , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.
[201] Erik G. Larsson,et al. Spectrum Sensing for Cognitive Radio : State-of-the-Art and Recent Advances , 2012, IEEE Signal Processing Magazine.
[202] Theodore S. Rappaport,et al. Wireless communications - principles and practice , 1996 .
[203] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[204] Won-Yeol Lee,et al. A Spectrum Decision Framework for Cognitive Radio Networks , 2011, IEEE Transactions on Mobile Computing.
[205] Qin Xin,et al. Joint QoS-aware admission control, channel assignment, and power allocation for cognitive radio cellular networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[206] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[207] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[208] Zhu Han,et al. Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks , 2009, IEEE INFOCOM 2009.
[209] Hyundong Shin,et al. Cognitive Network Interference , 2011, IEEE Journal on Selected Areas in Communications.
[210] Jie Gao,et al. Connectivity-Based Sensor Network Localization with Incremental Delaunay Refinement Method , 2009, IEEE INFOCOM 2009.
[211] Azzedine Boukerche,et al. Localization systems for wireless sensor networks , 2007, IEEE Wireless Communications.
[212] Alex X. Liu,et al. SafeQ: Secure and Efficient Query Processing in Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[213] Shuai Li,et al. Location privacy preservation in collaborative spectrum sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[214] Mohamed Grissa,et al. Preserving the Location Privacy of Secondary Users in Cooperative Spectrum Sensing , 2017, IEEE Transactions on Information Forensics and Security.
[215] Qiang Ni,et al. Application of reinforcement learning for security enhancement in cognitive radio networks , 2015, Appl. Soft Comput..
[216] Hui Zang,et al. Anonymization of location data does not work: a large-scale measurement study , 2011, MobiCom.
[217] Qihui Wu,et al. Decentralized sensor selection for cooperative spectrum sensing based on unsupervised learning , 2012, 2012 IEEE International Conference on Communications (ICC).
[218] Andrea J. Goldsmith,et al. Breaking Spectrum Gridlock With Cognitive Radios: An Information Theoretic Perspective , 2009, Proceedings of the IEEE.
[219] Mohsen Guizani,et al. Dynamic power pricing using distributed resource allocation for large-scale DSA systems , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[220] Gaurav S. Sukhatme,et al. Robomote: enabling mobility in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[221] M. H. Rehmani,et al. White space : De fi nitional perspectives and their role in exploiting spectrum opportunities , 2016 .
[222] Mohamed Grissa,et al. LPOS: Location Privacy for Optimal Sensing in Cognitive Radio Networks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[223] Shamik Sengupta,et al. Vulnerabilities in cognitive radio networks: A survey , 2013, Comput. Commun..
[224] Jonathan Katz,et al. Limits of Computational Differential Privacy in the Client/Server Setting , 2011, TCC.
[225] Ying Zhang,et al. Localization from connectivity in sensor networks , 2004, IEEE Transactions on Parallel and Distributed Systems.
[226] Jan M. Rabaey,et al. Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks , 2002, USENIX Annual Technical Conference, General Track.
[227] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[228] Helen J. Wang,et al. Preserving location privacy in wireless lans , 2007, MobiSys '07.
[229] Jiandong Li,et al. Optimal Power Control for Cognitive Radio Networks Under Coupled Interference Constraints: A Cooperative Game-Theoretic Perspective , 2010, IEEE Transactions on Vehicular Technology.
[230] Nitesh Saxena,et al. On the limitations of query obfuscation techniques for location privacy , 2011, UbiComp '11.
[231] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[232] Husheng Li,et al. Multi-agent Q-learning of channel selection in multi-user cognitive radio systems: A two by two case , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.
[233] Suman Nath,et al. Differentially private aggregation of distributed time-series with transformation and encryption , 2010, SIGMOD Conference.
[234] Ian F. Akyildiz,et al. Cooperative spectrum sensing in cognitive radio networks: A survey , 2011, Phys. Commun..
[235] Behnam Bahrak,et al. Security of Spectrum Learning in Cognitive Radios , 2013, ArXiv.
[236] Fumiyuki Adachi,et al. Modeling and Analysis for Reactive-Decision Spectrum Handoff in Cognitive Radio Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[237] Maria-Gabriella Di Benedetto,et al. A Survey on MAC Strategies for Cognitive Radio Networks , 2012, IEEE Communications Surveys & Tutorials.
[238] Kang G. Shin,et al. OS-MAC: An Efficient MAC Protocol for Spectrum-Agile Wireless Networks , 2008, IEEE Transactions on Mobile Computing.
[239] Harold W. Kuhn,et al. The Hungarian method for the assignment problem , 1955, 50 Years of Integer Programming.
[240] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[241] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[242] Andreas Heinemann,et al. Survey on Location Privacy in Pervasive Computing , 2005 .
[243] Zhu Han,et al. Optimal Pricing for Duopoly in Cognitive Radio Networks: Cooperate or not Cooperate? , 2014, IEEE Transactions on Wireless Communications.
[244] Khaled Ben Letaief,et al. Cooperative Communications for Cognitive Radio Networks , 2009, Proceedings of the IEEE.
[245] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[246] Arun Prakash,et al. Spectrum handoff in cognitive radio networks: A classification and comprehensive survey , 2016, J. Netw. Comput. Appl..
[247] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[248] Ian F. Akyildiz,et al. CRAHNs: Cognitive radio ad hoc networks , 2009, Ad Hoc Networks.
[249] Behnam Bahrak,et al. Protecting the primary users' operational privacy in spectrum sharing , 2014, 2014 IEEE International Symposium on Dynamic Spectrum Access Networks (DYSPAN).
[250] Bechir Hamdaoui,et al. Coordinating Secondary-User Behaviors for Inelastic Traffic Reward Maximization in Large-Scale \osa Networks , 2012, IEEE Transactions on Network and Service Management.
[251] Biing-Hwang Juang,et al. Signal Processing in Cognitive Radio , 2009, Proceedings of the IEEE.
[252] Lijun Qian,et al. Power Control for Cognitive Radio Ad Hoc Networks , 2007, 2007 15th IEEE Workshop on Local & Metropolitan Area Networks.