-
1
-
-
71949106409
-
Attack-tolerant distributed sensing for dynamic spectrum access networks
-
Oct.
-
A. W. Min, K. G. Shin, and X. Hu, "Attack-tolerant distributed sensing for dynamic spectrum access networks," 2009 17th IEEE International Conference on Network Protocols, pp. 294-303, Oct. 2009.
-
(2009)
2009 17th IEEE International Conference on Network Protocols
, pp. 294-303
-
-
Min, A.W.1
Shin, K.G.2
Hu, X.3
-
2
-
-
84855787122
-
Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead
-
G. Baldini, T. Sturman, and A. R. Biswas, "Security Aspects in Software Defined Radio and Cognitive Radio Networks : A Survey and A Way Ahead," Spectrum, pp. 1-25, 2011.
-
(2011)
Spectrum
, pp. 1-25
-
-
Baldini, G.1
Sturman, T.2
Biswas, A.R.3
-
3
-
-
42649135628
-
Toward secure distributed spectrum sensing in cognitive radio networks
-
Apr.
-
R. Chen, J.-M. Park, Y. T. Hou, and J. H. Reed, "Toward secure distributed spectrum sensing in cognitive radio networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 50-55, Apr. 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 50-55
-
-
Chen, R.1
Park, J.-M.2
Hou, Y.T.3
Reed, J.H.4
-
5
-
-
84860729874
-
Security Threats to Signal Classifiers Using Self-Organizing Maps
-
T. C. Clancy and A. Khawar, "Security Threats to Signal Classifiers Using Self-Organizing Maps," Computer Engineering, no. 3, 2009.
-
(2009)
Computer Engineering
, Issue.3
-
-
Clancy, T.C.1
Khawar, A.2
-
8
-
-
79751513311
-
Defense Against Objective Function Attacks in Cognitive Radio Networks
-
Q. Pei, H. Li, J. Ma, and K. Fan, "Defense Against Objective Function Attacks in Cognitive Radio Networks," Chinese Journal of Electronics, vol. 20, no. 4, 2011.
-
(2011)
Chinese Journal of Electronics
, vol.20
, Issue.4
-
-
Pei, Q.1
Li, H.2
Ma, J.3
Fan, K.4
-
9
-
-
84860749292
-
-
Z. Chen, C. Zhang, F. Lin, J. Yu, X. Li, Y. Song, R. Ranganathan, N. Guo, and R. C. Qiu, "Towards a large-scale cognitive radio network: Testbed, intensive computing, frequency agility and security," 2011.
-
(2011)
Towards A Large-scale Cognitive Radio Network: Testbed, Intensive Computing, Frequency Agility and Security
-
-
Chen, Z.1
Zhang, C.2
Lin, F.3
Yu, J.4
Li, X.5
Song, Y.6
Ranganathan, R.7
Guo, N.8
Qiu, R.C.9
-
11
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data," in Applications of Data Mining in Computer Security, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
12
-
-
80051636899
-
USPACOR: Universial sparsity-controlling outlier rejection
-
G. B. Giannakis, G. Mateos, S. Farahmand, V. Kekatos, and H. Zhu, "USPACOR: Universial sparsity-controlling outlier rejection," in 36th International Conference on Acoustics, Speech and Signal Processing (2011ICASSP), May 2011.
-
36th International Conference on Acoustics, Speech and Signal Processing (2011ICASSP), May 2011
-
-
Giannakis, G.B.1
Mateos, G.2
Farahmand, S.3
Kekatos, V.4
Zhu, H.5
-
14
-
-
84859887571
-
-
Dec. from Carnegie Mellon University
-
L. Xiong, B. Poczos, A. Connolly, and J. Schneider, "Anomaly Detection for Astronomical Data," Dec. 2010, from Carnegie Mellon University.
-
(2010)
Anomaly Detection for Astronomical Data
-
-
Xiong, L.1
Poczos, B.2
Connolly, A.3
Schneider, J.4
-
16
-
-
77951137606
-
Robust Principal Component Analysis: Exact Recovery of Corrupted Low-Rank Matrices via Convex Optimization
-
submitted to
-
J. Wright, A. Ganesh, S. Rao, and Y. Ma, "Robust Principal Component Analysis : Exact Recovery of Corrupted Low-Rank Matrices via Convex Optimization," submitted to Journal of ACM, 2009.
-
(2009)
Journal of ACM
-
-
Wright, J.1
Ganesh, A.2
Rao, S.3
Ma, Y.4
-
17
-
-
80052508078
-
Robust PCA Based Extended Target Estimation with Interference Mitigation
-
N. Guo, S. Hou, Z. Hu, and R. Qiu, "Robust PCA Based Extended Target Estimation with Interference Mitigation," in 2011 IEEE Radar Conference, 2011.
-
(2011)
2011 IEEE Radar Conference
-
-
Guo, N.1
Hou, S.2
Hu, Z.3
Qiu, R.4
|