A nonmonetary QoS-aware auction framework toward secure communications for cognitive radio networks

X Wang, Y Ji, H Zhou, J Li - IEEE Transactions on Vehicular …, 2015 - ieeexplore.ieee.org
This paper investigates the secure communication issue for cognitive radio networks with
nonaltruistic users. The design objective is to improve the secrecy rate of the primary user …

Collaborative and incremental learning for modulation classification with heterogeneous local dataset in cognitive IoT

P Qi, X Zhou, Y Ding, S Zheng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Among 6G high-density connection applications, the cognitive Internet of Things (IoT) is
considered to be an effective means to cope with the problem of spectrum resource shortage …

[HTML][HTML] Flexible and lightweight access control for online healthcare social networks in the context of the internet of things

Z Qin, J Sun, D Chen, H Xiong - Mobile Information Systems, 2017 - hindawi.com
Online healthcare social networks (OHSNs) play an essential role in sharing information
among medical experts and patients who are equipped with similar experiences. To access …

A cooperative matching approach for resource management in dynamic spectrum access networks

H Zhou, B Liu, Y Liu, N Zhang, L Gui… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Dynamic spectrum access (DSA) can be leveraged by introducing external spectrum
sensing for secondary users (SUs) to overcome the hidden primary users (PUs) problem …

A novel secure relay selection strategy for energy-harvesting-enabled Internet of things

Y Huo, M Xu, X Fan, T Jing - EURASIP Journal on Wireless …, 2018 - Springer
In this article, we focus on the problem of relay selection for the cooperative cognitive radio-
based Internet of things. In such systems, a pair of primary user devices (PUs) can only …

Secure cooperative spectrum sharing in full-duplex multi-antenna cognitive radio networks with jamming

Z Mobini - AEU-International Journal of Electronics and …, 2021 - Elsevier
We consider a secure overlay cognitive radio network with an eavesdropper wherein a multi-
antenna secondary transmitter performs transmission in primary spectrum, on the condition …

Passive localization of signal source based on wireless sensor network in the air

P Wan, Y Ni, B Hao, Z Li… - International Journal of …, 2018 - journals.sagepub.com
Passive localization of the wireless signal source attracts a considerable level of research
interest for its wide applications in modern wireless communication systems. To accurately …

Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber–Physical Systems

H Wang, K Fan, K Zhang, Z Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Research on mobile cyber–physical systems (MCPSs) that have the superiorities of cyber–
physical systems (CPSs) and expand their application range has become a trend in recent …

Secure cooperative transmission against jamming-aided eavesdropper for ARQ based wireless networks

D Wang, P Ren, Q Du, Y Wang, L Sun - IEEE Access, 2017 - ieeexplore.ieee.org
Secure the cooperative transmission is studied for an automatic repeat request (ARQ)-based
wireless network against a jamming-aided eavesdropper. The eavesdropper utilizes the …

UAVs-assisted QoS guarantee scheme of IoT applications for reliable mobile edge computing

X Li, P Xiao, D Tang, X Li, Q Wang, D Chen - Computer Communications, 2024 - Elsevier
Unmanned aerial vehicles (UAVs) assisted mobile edge computing (MEC) is an emerging
network architecture that has been considered as a promising transformative service …