Location privacy preservation in database-driven wireless cognitive networks through encrypted probabilistic data structures

M Grissa, AA Yavuz, B Hamdaoui - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we propose new location privacy preserving schemes for database-driven
cognitive radio networks that protect secondary users'(SUs) location privacy while allowing …

Distributed learning-based cross-layer technique for energy-efficient multicarrier dynamic spectrum access with adaptive power allocation

MB Ghorbel, B Hamdaoui, M Guizani… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
This paper proposes energy and cross-layer aware resource allocation techniques that
allow dynamic spectrum access (DSA) users, by means of learning algorithms, to locate and …

Mitigating jamming attacks in mobile cognitive networks through time hopping

N Adem, B Hamdaoui, A Yavuz - … Communications and Mobile …, 2016 - Wiley Online Library
Abstract 5G wireless networks will support massive connectivity mainly due to device‐to‐
device communications. An enabling technology for device‐to‐device links is the dynamical …

Jamming resiliency and mobility management in cognitive communication networks

N Adem, B Hamdaoui - 2017 IEEE International Conference on …, 2017 - ieeexplore.ieee.org
Cognitive communication networks, or simply cognitive networks (CNs), are one of the
enabling technologies for next generation networks. Through dynamic spectrum access …

[PDF][PDF] LOCATION PRIVACY PRESERVATION IN WIRELESS COGNITIVE NETWORKS THROUGH ENCRYPTED PROBABILISTIC DATA STRUCTURES

MGD KUMAR - junikhyatjournal.in
In this paper, we propose new location privacy preserving schemes for database-driven
cognitive radio networks (CRN s) that protect secondary users'(SU s) location privacy while …

Towards Long Short Term Memory Based Proactive In-Network Caching for Cloud RANs

C Tirupathi - 2019 - ir.library.oregonstate.edu
The rapid population growth in large urban cities has led to an unprecedented increase in
both the number and the diversity of wireless devices and applications with varying quality of …

Collaborative Filtering-Based In-Network Content Placement and Caching for 5G Networks

H Alorayj - 2019 - ir.library.oregonstate.edu
As the number of wireless devices, the demand for high data rates, and the need for always-
on connectivity are growing and becoming more stringent with the evolvement and …

A Blockchains-Enabled Protocol for Distributed IoT Resource Sharing On-Demand

MA Al-kalbani - 2018 - ir.library.oregonstate.edu
In this thesis, we propose a Blockchain-based distributed protocol for enabling deployment
of dynamic, on-demand IoT networks. Specifically, the proposed protocol leverages …

Location Privacy-Preserving Strategies for Secondary Spectrum Use

M Grissa - 2018 - ir.library.oregonstate.edu
The scarcity of wireless spectrum resources and the overwhelming demand for wireless
broadband resources have prompted industry, government agencies and academia within …

Jamming Attack Resiliency and Performance Analysis of Cognitive Radio Communication Networks

N Adem - 2016 - ir.library.oregonstate.edu
Cognitive radio technology emerges as a promising solution for overcoming shortage and
inefficient use of spectrum resources. In cognitive radio networks, secondary users, which …