-
1
-
-
0029513526
-
Gambling in a rigged casino: The adversarial multi-armed bandit problem
-
P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire, "Gambling in a rigged casino: The adversarial multi-armed bandit problem," in Proc. of the 36rd IEEE Annual Symposium on Foundations of Computer Science (FOCS), 1995.
-
Proc. of the 36rd IEEE Annual Symposium on Foundations of Computer Science (FOCS), 1995
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
-
4
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
Jan.
-
R. Chen, J.-M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE J. on Select. Areas in Commun. Special Issue on Cognitive Radio Theory and Applications, Vol. 26, No. 1, Jan. 2008.
-
(2008)
IEEE J. on Select. Areas in Commun. Special Issue on Cognitive Radio Theory and Applications
, vol.26
, Issue.1
-
-
Chen, R.1
Park, J.-M.2
Reed, J.H.3
-
7
-
-
46649107735
-
Opportunistic spectrum access in fading channels through collaborative sensing
-
March
-
A. Ghasemi and E. S. Sousa, "Opportunistic spectrum access in fading channels through collaborative sensing," Journal of Communications (JCM), Vol. 2, pp. 71-82, March 2007.
-
(2007)
Journal of Communications (JCM)
, vol.2
, pp. 71-82
-
-
Ghasemi, A.1
Sousa, E.S.2
-
8
-
-
34547750388
-
Cooperative spectrum sensing in cognitive radio: Part I: two user networks
-
G. June
-
G. Ghurumuruhan and Y. (G.) Li, "Cooperative spectrum sensing in cognitive radio: Part I: two user networks," IEEE Trans. on Wireless Commun., Vol.6, pp. 2204-2213, June 2007.
-
(2007)
IEEE Trans. on Wireless Commun.
, vol.6
, pp. 2204-2213
-
-
Ghurumuruhan, G.1
Li, Y.2
-
9
-
-
34547776253
-
Cooperative spectrum sensing in cognitive radio: Part II: multiuser networks
-
(G.) June
-
G. Ghurumuruhan and Y. (G.) Li, "Cooperative spectrum sensing in cognitive radio: Part II: multiuser networks," IEEE Trans. on Wireless Commun., Vol.6, pp. 2214-2222, June 2007.
-
(2007)
IEEE Trans. on Wireless Commun.
, vol.6
, pp. 2214-2222
-
-
Ghurumuruhan, G.1
Li, Y.2
-
16
-
-
77955364168
-
Blind dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems with unknown channel statistics
-
accepted by
-
H. Li and Z. Han, "Blind dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems with unknown channel statistics," accepted by IEEE International Conference on Communications (ICC), 2010.
-
IEEE International Conference on Communications (ICC), 2010
-
-
Li, H.1
Han, Z.2
-
21
-
-
77951594186
-
CatchIt: Detect malicious nodes in collaborative spectrum sensing
-
W. Wang, H. Li, Y. Sun, and Z. Han, "CatchIt: Detect malicious nodes in collaborative spectrum sensing," in Proc. of IEEE Conference on Global Communications (Globecom), 2009.
-
Proc. of IEEE Conference on Global Communications (Globecom), 2009
-
-
Wang, W.1
Li, H.2
Sun, Y.3
Han, Z.4
-
22
-
-
43849098907
-
A trust based framework for secure data aggregation in wireless sensor networks
-
W. Zhang, S. K. Das and Y. Liu, "A trust based framework for secure data aggregation in wireless sensor networks," in Proc. of IEEE Conference on Sensor, Mesh and Ad hoc Communications and Networks (SECON), 2006.
-
Proc. of IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2006
-
-
Zhang, W.1
Das, S.K.2
Liu, Y.3
|