-
1
-
-
77951729734
-
A survey of game theory as applied to network security
-
Honolulu, HI, Jan
-
S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu, "A survey of game theory as applied to network security, " in Proc. IEEE HICSS, Honolulu, HI, Jan. 2010.
-
(2010)
Proc. IEEE HICSS
-
-
Roy, S.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Shandilya, V.5
Wu, Q.6
-
2
-
-
84873690107
-
Game theory for network security
-
Feb
-
X. Liang and Y. Xiao, "Game theory for network security, " IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 472-486, Feb. 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.1
, pp. 472-486
-
-
Liang, X.1
Xiao, Y.2
-
3
-
-
84894671595
-
Reincarnation in the ambiance: Devices and networks with energy harvesting
-
Feb
-
R. Prasad, S. Devasenapathy, V. Rao, and J. Vazifehdan, "Reincarnation in the ambiance: Devices and networks with energy harvesting, " IEEE Commun. Surveys Tuts., vol. 16, no. 1, pp. 195-213, Feb. 2014.
-
(2014)
IEEE Commun. Surveys Tuts.
, vol.16
, Issue.1
, pp. 195-213
-
-
Prasad, R.1
Devasenapathy, S.2
Rao, V.3
Vazifehdan, J.4
-
4
-
-
33745648091
-
Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey
-
I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, "Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey, " Computer Networks, vol. 50, no. 13, pp. 2127-2159, 2006.
-
(2006)
Computer Networks
, vol.50
, Issue.13
, pp. 2127-2159
-
-
Akyildiz, I.F.1
Lee, W.-Y.2
Vuran, M.C.3
Mohanty, S.4
-
5
-
-
40949147745
-
A comprehensive survey of multiagent reinforcement learning
-
L. Busoniu, R. Babuska, and B. De Schutter, "A comprehensive survey of multiagent reinforcement learning, " IEEE Trans. Syst., Man, Cybern. C, vol. 38, no. 2, pp. 156-172, 2008.
-
(2008)
IEEE Trans. Syst., Man, Cybern. C
, vol.38
, Issue.2
, pp. 156-172
-
-
Busoniu, L.1
Babuska, R.2
De Schutter, B.3
-
6
-
-
80051717392
-
Jamming games in wireless networks with incomplete information
-
Y. E. Sagduyu, R. A. Berry, and A. Ephremides, "Jamming games in wireless networks with incomplete information, " IEEE Commun. Mag., vol. 49, no. 8, pp. 112-118, 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.8
, pp. 112-118
-
-
Sagduyu, Y.E.1
Berry, R.A.2
Ephremides, A.3
-
8
-
-
0036531878
-
Multiagent learning using a variable learning rate
-
M. Bowling and M. Veloso, "Multiagent learning using a variable learning rate, " Artificial Intelligence, vol. 136, no. 2, pp. 215-250, 2002.
-
(2002)
Artificial Intelligence
, vol.136
, Issue.2
, pp. 215-250
-
-
Bowling, M.1
Veloso, M.2
-
9
-
-
84954488113
-
-
Supplemental document. [Online]. Available: https: //www. dropbox. com/ s/oyb4ev8mo79mmvj/supplement. pdf
-
Supplemental Document
-
-
-
10
-
-
38149046958
-
Defense against primary user emulation attacks in cognitive radio networks
-
R. Chen, J.-M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks, " IEEE J. Sel. Areas Commun., vol. 26, no. 1, pp. 25-37, 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.1
, pp. 25-37
-
-
Chen, R.1
Park, J.-M.2
Reed, J.H.3
-
11
-
-
34247229185
-
Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework
-
Q. Zhao, L. Tong, A. Swami, and Y. Chen, "Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: A POMDP framework, " IEEE J. Sel. Areas Commun., vol. 25, no. 3, pp. 589-600, 2007.
-
(2007)
IEEE J. Sel. Areas Commun.
, vol.25
, Issue.3
, pp. 589-600
-
-
Zhao, Q.1
Tong, L.2
Swami, A.3
Chen, Y.4
-
12
-
-
79953200186
-
An anti-jamming stochastic game for cognitive radio networks
-
B. Wang, Y. Wu, K. R. Liu, and T. C. Clancy, "An anti-jamming stochastic game for cognitive radio networks, " IEEE J. Sel. Areas Commun., vol. 29, no. 4, pp. 877-889, 2011.
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.4
, pp. 877-889
-
-
Wang, B.1
Wu, Y.2
Liu, K.R.3
Clancy, T.C.4
-
13
-
-
37149048467
-
A jamming game in wireless networks with transmission cost
-
Springer
-
E. Altman, K. Avrachenkov, and A. Garnaev, "A jamming game in wireless networks with transmission cost, " in Network Control and Optimization. Springer, 2007, pp. 1-12.
-
(2007)
Network Control and Optimization
, pp. 12
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
14
-
-
84883287296
-
Coping with a smart jammer in wireless networks: A stackelberg game approach
-
D. Yang, G. Xue, J. Zhang, A. Richa, and X. Fang, "Coping with a smart jammer in wireless networks: A stackelberg game approach, " IEEE Trans. Wireless Commun., vol. 12, no. 8, pp. 4038-4047, 2013.
-
(2013)
IEEE Trans. Wireless Commun.
, vol.12
, Issue.8
, pp. 4038-4047
-
-
Yang, D.1
Xue, G.2
Zhang, J.3
Richa, A.4
Fang, X.5
-
15
-
-
84872001756
-
Multiagent jamming-resilient control channel game for cognitive radio ad hoc networks
-
London, UK
-
B. F. Lo and I. F. Akyildiz, "Multiagent jamming-resilient control channel game for cognitive radio ad hoc networks, " in Proc. IEEE ICC, London, UK, 2012.
-
(2012)
Proc. IEEE ICC
-
-
Lo, B.F.1
Akyildiz, I.F.2
-
16
-
-
84855466075
-
Anti-jamming games in multichannel cognitive radio networks
-
Y. Wu, B. Wang, K. Liu, and T. Clancy, "Anti-jamming games in multichannel cognitive radio networks, " IEEE J. Sel. Areas Commun., vol. 30, no. 1, pp. 4-15, 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.1
, pp. 4-15
-
-
Wu, Y.1
Wang, B.2
Liu, K.3
Clancy, T.4
-
17
-
-
78449306498
-
Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, part I: Known channel statistics
-
H. Li and Z. Han, "Dogfight in spectrum: Combating primary user emulation attacks in cognitive radio systems, part I: Known channel statistics, " IEEE Trans. Wireless Commun., vol. 9, no. 11, pp. 3566-3577, 2010.
-
(2010)
IEEE Trans. Wireless Commun
, vol.9
, Issue.11
, pp. 3566-3577
-
-
Li, H.1
Han, Z.2
-
18
-
-
84855425212
-
Towards optimal adaptive UFH-based anti-jamming wireless communication
-
Q. Wang, P. Xu, K. Ren, and X.-Y. Li, "Towards optimal adaptive UFH-based anti-jamming wireless communication, " IEEE J. Sel. Areas Commun., vol. 30, no. 1, pp. 16-30, 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.1
, pp. 16-30
-
-
Wang, Q.1
Xu, P.2
Ren, K.3
Li, X.-Y.4
-
19
-
-
81455148130
-
Fast reinforcement learning for energy-efficient wireless communication
-
N. Mastronarde and M. van der Schaar, "Fast reinforcement learning for energy-efficient wireless communication, " IEEE Trans. Signal Process., vol. 59, no. 12, pp. 6262-6266, 2011.
-
(2011)
IEEE Trans. Signal Process.
, vol.59
, Issue.12
, pp. 6262-6266
-
-
Mastronarde, N.1
Schaar Der M.Van2
-
20
-
-
84873711287
-
A survey on security threats and detection techniques in cognitive radio networks
-
A. G. Fragkiadakis, E. Z. Tragos, and I. G. Askoxylakis, "A survey on security threats and detection techniques in cognitive radio networks, " IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 428-445, 2013.
-
(2013)
IEEE Commun. Surveys Tuts.
, vol.15
, Issue.1
, pp. 428-445
-
-
Fragkiadakis, A.G.1
Tragos, E.Z.2
Askoxylakis, I.G.3
-
21
-
-
84897823215
-
Secrecy wireless information and power transfer with MISO beamforming
-
L. Liu, R. Zhang, and K. Chua, "Secrecy wireless information and power transfer with MISO beamforming, " IEEE Trans. Signal Process., vol. 62, no. 7, pp. 1850-1863, 2014.
-
(2014)
IEEE Trans. Signal Process.
, vol.62
, Issue.7
, pp. 1850-1863
-
-
Liu, L.1
Zhang, R.2
Chua, K.3
-
22
-
-
84893261106
-
Multi-objective beamforming for secure communication in systems with wireless information and power transfer
-
London, UK, Sept
-
D. W. K. Ng, L. Xiang, and R. Schober, "Multi-objective beamforming for secure communication in systems with wireless information and power transfer, " in Proc. IEEE PIMRC, London, UK, Sept. 2013.
-
(2013)
Proc. IEEE PIMRC
-
-
Ng, D.W.K.1
Xiang, L.2
Schober, R.3
-
23
-
-
84954569200
-
Deploying multi-antenna energyharvesting cooperative jammers in the MIMO wiretap channel
-
Pacific Grove, CA, Nov
-
A. Mukherjee and J. Huang, "Deploying multi-antenna energyharvesting cooperative jammers in the MIMO wiretap channel, " in Proc. IEEE ASILOMAR, Pacific Grove, CA, Nov. 2012.
-
(2012)
Proc. IEEE ASILOMAR
-
-
Mukherjee, A.1
Huang, J.2
-
24
-
-
84880229460
-
Increasing smart meter privacy through energy harvesting and storage devices
-
Jul
-
O. Tan, D. Gunduz, and H. V. Poor, "Increasing smart meter privacy through energy harvesting and storage devices, " IEEE J. Sel. Areas Commun., vol. 31, no. 7, pp. 1331-1341, Jul. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.7
, pp. 1331-1341
-
-
Tan, O.1
Gunduz, D.2
Poor, H.V.3
|