2020
DOI: 10.1109/tcomm.2020.3005708
|View full text |Cite
|
Sign up to set email alerts
|

On Ensemble Learning-Based Secure Fusion Strategy for Robust Cooperative Sensing in Full-Duplex Cognitive Radio Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(13 citation statements)
references
References 29 publications
0
13
0
Order By: Relevance
“…To defend against various malicious attacks and interference in full-duplex CRNs (FD-CRNs), an ensemble ML (EML) based robust CSS framework was proposed in [110], [111]. SUs were assumed to have the ability to sense and transmit over the same frequency band simultaneously.…”
Section: ) Ssdf and Pue Combination Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…To defend against various malicious attacks and interference in full-duplex CRNs (FD-CRNs), an ensemble ML (EML) based robust CSS framework was proposed in [110], [111]. SUs were assumed to have the ability to sense and transmit over the same frequency band simultaneously.…”
Section: ) Ssdf and Pue Combination Attacksmentioning
confidence: 99%
“…Studying the characteristics of different ML solutions and designing a combination SS solution more in line with the characteristics and requirements of the system could further improve performance. For example, the ensemble learning used in the literature [110], [111] improved the efficiency of the system by combining linear regression, neural networks, and other solutions, allowing it to combat PUE and SSDF quickly and efficiently. There is a real need for research on new protocols and frameworks for such coexistence.…”
Section: A Cross Technology Coexistencementioning
confidence: 99%
“…transmission state prediction, feedback collection) are transmitted and stored in a public manner, which can easily be misuse by the attacker, leading to poor security. Ensemble learning based detection of the presence of malicious secondary users in a cognitive network was proposed in [24]. The degradation in the performance of sensing caused by malicious users in the network was addressed in this approach.…”
Section: A Schemes For Security Attacks In Crnmentioning
confidence: 99%
“…Incorporating various techniques, such as sensing algorithms [3][4][5][6][7], access strategies, fusion rules, and user cooperation, a number of works [16,[20][21][22][23][24][25][26][27][28][29][30][31][32][33][34] have focused on the performance improvements of CRNs with CSS. From the perspective of access strategy, Lee et al [20] proposed an adaptive CSS scheme using random access.…”
Section: Introductionmentioning
confidence: 99%
“…Golvaei et al [28] proposed a soft decision algorithm to improve CSS performance for hidden PUs in fading and shadowing environments, which showed better performance than the hard decision algorithm. Yuan et al [29] and Zhang et al [30], respectively, proposed a secure fusion strategy to defend against malicious users for CSS. Taking the location impact of different SUs into account, Liu et al [31] proposed a probability-based fusion rule.…”
Section: Introductionmentioning
confidence: 99%