Byzantine attack and defense in cognitive radio networks: A survey
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …
Advances on security threats and countermeasures for cognitive radio networks: A survey
RK Sharma, DB Rawat - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Cognitive radio (CR) is regarded as an emerging technology, which equips wireless devices
with the capability to adapt their operating parameters on the fly based on the radio …
with the capability to adapt their operating parameters on the fly based on the radio …
Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems
M Li, Y Sun, H Lu, S Maharjan… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
Crowdsensing systems collect various types of data from sensors embedded on mobile
devices owned by individuals. These individuals are commonly referred to as workers that …
devices owned by individuals. These individuals are commonly referred to as workers that …
[PDF][PDF] Key techniques for 5G wireless communications: network architecture, physical layer, and MAC layer perspectives
The fourth generation (4G) mobile communication systems are offering service worldwide
steadily. Although 4G systems could be loaded with much more services and data than …
steadily. Although 4G systems could be loaded with much more services and data than …
A secure mobile crowdsensing game with deep reinforcement learning
Mobile crowdsensing (MCS) is vulnerable to faked sensing attacks, as selfish smartphone
users sometimes provide faked sensing results to the MCS server to save their sensing costs …
users sometimes provide faked sensing results to the MCS server to save their sensing costs …
[LIBRO][B] Reinforcement learning for cyber-physical systems: with cybersecurity case studies
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was
inspired by recent developments in the fields of reinforcement learning (RL) and cyber …
inspired by recent developments in the fields of reinforcement learning (RL) and cyber …
Security threats, detection, and countermeasures for physical layer in cognitive radio networks: A survey
Cyber-security threats and issues have been exponentially increasing over the last two
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …
decades, including in cognitive radio networks. These attacks and vulnerabilities negatively …
Towards data poisoning attacks in crowd sensing systems
With the proliferation of sensor-rich mobile devices, crowd sensing has emerged as a new
paradigm of collecting information from the physical world. However, the sensory data …
paradigm of collecting information from the physical world. However, the sensory data …
Exclusive use spectrum access trading models in cognitive radio networks: A survey
Spectrum frequency is a valuable resource for wireless communication but very limited in its
availability. Due to the extensive use and ever increasing demand of spectrum bands by …
availability. Due to the extensive use and ever increasing demand of spectrum bands by …
Disguised as privacy: Data poisoning attacks against differentially private crowdsensing systems
Although crowdsensing has emerged as a popular information collection paradigm, its
security and privacy vulnerabilities have come to the forefront in recent years. However, one …
security and privacy vulnerabilities have come to the forefront in recent years. However, one …