Byzantine attack and defense in cognitive radio networks: A survey

L Zhang, G Ding, Q Wu, Y Zou, Z Han… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …

Advances on security threats and countermeasures for cognitive radio networks: A survey

RK Sharma, DB Rawat - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Cognitive radio (CR) is regarded as an emerging technology, which equips wireless devices
with the capability to adapt their operating parameters on the fly based on the radio …

Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems

M Li, Y Sun, H Lu, S Maharjan… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Crowdsensing systems collect various types of data from sensors embedded on mobile
devices owned by individuals. These individuals are commonly referred to as workers that …

[PDF][PDF] Key techniques for 5G wireless communications: network architecture, physical layer, and MAC layer perspectives

Z Ma, ZQ Zhang, ZG Ding… - Science CHINA …, 2015 - personalpages.manchester.ac.uk
The fourth generation (4G) mobile communication systems are offering service worldwide
steadily. Although 4G systems could be loaded with much more services and data than …

A secure mobile crowdsensing game with deep reinforcement learning

L Xiao, Y Li, G Han, H Dai… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Mobile crowdsensing (MCS) is vulnerable to faked sensing attacks, as selfish smartphone
users sometimes provide faked sensing results to the MCS server to save their sensing costs …

[图书][B] Reinforcement learning for cyber-physical systems: with cybersecurity case studies

C Li, M Qiu - 2019 - taylorfrancis.com
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was
inspired by recent developments in the fields of reinforcement learning (RL) and cyber …

Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey

F Salahdine, N Kaabouch - Physical Communication, 2020 - Elsevier
Cyber-security threats and issues have been exponentially increasing over the last two
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …

Towards data poisoning attacks in crowd sensing systems

C Miao, Q Li, H Xiao, W Jiang, M Huai… - Proceedings of the …, 2018 - dl.acm.org
With the proliferation of sensor-rich mobile devices, crowd sensing has emerged as a new
paradigm of collecting information from the physical world. However, the sensory data …

Exclusive use spectrum access trading models in cognitive radio networks: A survey

MR Hassan, GC Karmakar… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Spectrum frequency is a valuable resource for wireless communication but very limited in its
availability. Due to the extensive use and ever increasing demand of spectrum bands by …

Disguised as privacy: Data poisoning attacks against differentially private crowdsensing systems

Z Li, Z Zheng, S Guo, B Guo, F Xiao… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Although crowdsensing has emerged as a popular information collection paradigm, its
security and privacy vulnerabilities have come to the forefront in recent years. However, one …