Byzantine attack and defense in cognitive radio networks: A survey

L Zhang, G Ding, Q Wu, Y Zou, Z Han… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …

Exclusive use spectrum access trading models in cognitive radio networks: A survey

MR Hassan, GC Karmakar… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Spectrum frequency is a valuable resource for wireless communication but very limited in its
availability. Due to the extensive use and ever increasing demand of spectrum bands by …

A secure mobile crowdsensing game with deep reinforcement learning

L Xiao, Y Li, G Han, H Dai… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Mobile crowdsensing (MCS) is vulnerable to faked sensing attacks, as selfish smartphone
users sometimes provide faked sensing results to the MCS server to save their sensing costs …

IoT network security from the perspective of adversarial deep learning

YE Sagduyu, Y Shi, T Erpek - 2019 16th Annual IEEE …, 2019 - ieeexplore.ieee.org
Machine learning finds rich applications in Internet of Things (IoT) networks such as
information retrieval, traffic management, spectrum sensing, and signal authentication. While …

TIDCS: A dynamic intrusion detection and classification system based feature selection

Z Chkirbene, A Erbad, R Hamila, A Mohamed… - IEEE …, 2020 - ieeexplore.ieee.org
Machine learning techniques are becoming mainstream in intrusion detection systems as
they allow real-time response and have the ability to learn and adapt. By using a …

[图书][B] Reinforcement learning for cyber-physical systems: with cybersecurity case studies

C Li, M Qiu - 2019 - taylorfrancis.com
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was
inspired by recent developments in the fields of reinforcement learning (RL) and cyber …

[HTML][HTML] Remote monitoring system using slow-fast deep convolution neural network model for identifying anti-social activities in surveillance applications

EM Onyema, S Balasubaramanian, C Iwendi… - Measurement …, 2023 - Elsevier
Remote monitoring is the process that monitors and observes information from a distance
utilizing sensors or electronic types of equipment. Remote monitoring is used in real-time …

Towards data poisoning attacks in crowd sensing systems

C Miao, Q Li, H Xiao, W Jiang, M Huai… - Proceedings of the …, 2018 - dl.acm.org
With the proliferation of sensor-rich mobile devices, crowd sensing has emerged as a new
paradigm of collecting information from the physical world. However, the sensory data …

When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing

Z Luo, S Zhao, Z Lu, J Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Defense strategies have been well studied to combat Byzantine attacks that aim to disrupt
cooperative spectrum sensing by sending falsified versions of spectrum sensing data to a …

Joint sensing duration adaptation, user matching, and power allocation for cognitive OFDM-NOMA systems

W Xu, X Li, CH Lee, M Pan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, the non-orthogonal multiple access (NOMA) technology is integrated into
cognitive orthogonal frequency-division multiplexing (OFDM) systems, called cognitive …