“…In [24] and with the aid of the Thompson sampling technique, an online primary user emulation attack was investigated. In [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], novel algorithms were proposed by considering the energy efficiency, spectrum maintenance, bandwidth guaranteeing, robustness, complexity, deep-learning hardware/software, probabilisticity, secure fusion strategies, specific channel models e.g. Nakagami-m fading etc.…”