2021
DOI: 10.1016/j.compeleceng.2021.107463
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical game-based secure data collection with trust and reputation management in the cognitive radio network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 9 publications
0
1
0
Order By: Relevance
“…The main challenge was the user acquirement of different channels at various times, which divided the network into various clusters. In [71], authors illustrated the study of various machine learning algorithms like Artificial Neural Network (ANN), SVM, k-nearest neighbor (KNN), random forest tree, Hoeffding tree and Naïve Bayes method for Automatic modulation recognition (AMR). Particularly, a Nonnegative Matrix Factorization (NMF) technique [72] was presented in this proposed work and the comparative results were evaluated using the mentioned traditional techniques.…”
Section: Literature Surveymentioning
confidence: 99%
“…The main challenge was the user acquirement of different channels at various times, which divided the network into various clusters. In [71], authors illustrated the study of various machine learning algorithms like Artificial Neural Network (ANN), SVM, k-nearest neighbor (KNN), random forest tree, Hoeffding tree and Naïve Bayes method for Automatic modulation recognition (AMR). Particularly, a Nonnegative Matrix Factorization (NMF) technique [72] was presented in this proposed work and the comparative results were evaluated using the mentioned traditional techniques.…”
Section: Literature Surveymentioning
confidence: 99%
“…SeRINS is used for obtaining the simulation results. "Hierarchical Multi Game-based Architecture (HMGA)" [31] is proposed for secured data management through sensing, data collection, and routing of data packets. Cognitive features were fetched from every game layer, and malicious nodes' behavior was fetched.…”
Section: Literature Reviewmentioning
confidence: 99%