Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey

H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …

Wireless network virtualization: A survey, some research issues and challenges

C Liang, FR Yu - IEEE Communications Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Since wireless network virtualization enables abstraction and sharing of infrastructure and
radio spectrum resources, the overall expenses of wireless network deployment and …

Joint computation offloading and interference management in wireless cellular networks with mobile edge computing

C Wang, FR Yu, C Liang, Q Chen… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Mobile edge computing (MEC) has attracted great interests as a promising approach to
augment computational capabilities of mobile devices. An important issue in the MEC …

Cooperative spectrum sensing in cognitive radio networks: A survey

IF Akyildiz, BF Lo, R Balakrishnan - Physical communication, 2011 - Elsevier
Spectrum sensing is a key function of cognitive radio to prevent the harmful interference with
licensed users and identify the available spectrum for improving the spectrum's utilization …

Energy-efficient resource allocation for heterogeneous cognitive radio networks with femtocells

R **e, FR Yu, H Ji, Y Li - IEEE Transactions on Wireless …, 2012 - ieeexplore.ieee.org
Both cognitive radio and femtocell have been considered as promising techniques in
wireless networks. However, most of previous works are focused on spectrum sharing and …

Byzantine attack and defense in cognitive radio networks: A survey

L Zhang, G Ding, Q Wu, Y Zou, Z Han… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
The Byzantine attack in cooperative spectrum sensing (CSS), also known as the spectrum
sensing data falsification (SSDF) attack in the literature, is one of the key adversaries to the …

A survey of security challenges in cognitive radio networks: Solutions and future research directions

A Attar, H Tang, AV Vasilakos, FR Yu… - Proceedings of the …, 2012 - ieeexplore.ieee.org
In this survey, we present a comprehensive list of major known security threats within a
cognitive radio network (CRN) framework. We classify attack techniques based on the type …

Interference alignment and its applications: A survey, research issues, and challenges

N Zhao, FR Yu, M **, Q Yan… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
The capacity of interference network is a fundamental issue that eludes the researchers for
decades. Interference alignment (IA) is an emerging interference management technique …

Privacy-aware offloading in mobile-edge computing

X He, J Liu, R **, H Dai - GLOBECOM 2017-2017 IEEE Global …, 2017 - ieeexplore.ieee.org
Recently, mobile-edge computing (MEC) emerges as a promising paradigm to enable
computation intensive and delay-sensitive applications at resource limited mobile devices …

Dynamic resource allocation for heterogeneous services in cognitive radio networks with imperfect channel sensing

R **e, FR Yu, H Ji - IEEE transactions on vehicular technology, 2011 - ieeexplore.ieee.org
Resources in cognitive radio networks (CRNs) should dynamically be allocated according to
the sensed radio environment. Although some work has been done for dynamic resource …