2022
DOI: 10.3390/s22176477
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Prediction Model for Malicious Users Detection and Spectrum Sensing Based on Stacking and Deep Learning

Abstract: Cooperative network is a promising concept for achieving a high-accuracy decision of spectrum sensing in cognitive radio networks. It enables a collaborative exchange of the sensing measurements among the network users to monitor the primary spectrum occupancy. However, the presence of malicious users leads to harmful interferences in the system by transmitting incorrect local sensing observations.To overcome this security related problem and to improve the accuracy decision of spectrum sensing in cooperative … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 46 publications
0
5
0
Order By: Relevance
“…This graph illustrates the model's ability to recognize various class In Table 4 and Fig. 10, the overall classification performance of ODL-MUDSS technique with recent models are given [21]. The results indicate that the SVM model offers poor performance whereas the LR, NB, and stacking techniques attain slightly boosted outcomes.…”
Section: Resultsmentioning
confidence: 95%
“…This graph illustrates the model's ability to recognize various class In Table 4 and Fig. 10, the overall classification performance of ODL-MUDSS technique with recent models are given [21]. The results indicate that the SVM model offers poor performance whereas the LR, NB, and stacking techniques attain slightly boosted outcomes.…”
Section: Resultsmentioning
confidence: 95%
“…Additionally, they introduce a novel variant denoted as k, transforming the problem from optimizing the perturbation δ to optimizing k to circumvent the box constraints. The optimization problem is formulated by below Expressions (7) and (8).…”
Section: Carlini and Wagnermentioning
confidence: 99%
“…To detect and mitigate cyberattacks, Intrusion Detection Systems (IDSs) [4], Malware Detection Systems (MDSs) [5], and Device Identification Systems (DISs) [6] are often employed to monitor IoT network traffic and detect malicious activities [7][8][9]. ML [10,11] techniques, including Deep Learning (DL) [12,13], have shown promise in enhancing the effectiveness of these systems, by leveraging the ability of ML algorithms to learn from data and identify patterns that indicate anomalous behavior.…”
Section: Introductionmentioning
confidence: 99%
“…Several advanced technologies have been employed in the domain of deepfake detection, such as machine learning [83][84][85] and media forensics-based approaches [86]. However, it is widely acknowledged that deep learning-based models currently exhibit the most remarkable performance in discerning between fabricated and authentic digital media.…”
Section: Deep Learning Models For Deepfake Detectionmentioning
confidence: 99%