2020
DOI: 10.1007/s11276-020-02488-9
|View full text |Cite
|
Sign up to set email alerts
|

Threshold selection analysis of spectrum sensing for cognitive radio network with censoring based imperfect reporting channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 54 publications
0
3
0
Order By: Relevance
“…In [17], to detect the malicious user, K Nearest Neighbor K-NN, has been used, where without any knowledge of the malicious user, detection can be made. In [18] & [19], advanced K-NN and Dempster-Shafer (D-S) were implemented to detect malicious SUs in the PU boundary coverage. In [20], a discussion on Cognitive Radio Sensor Networks (CRNS), where some general implementation issues with CRNS has been discussed.…”
Section: Literature Surveymentioning
confidence: 99%
“…In [17], to detect the malicious user, K Nearest Neighbor K-NN, has been used, where without any knowledge of the malicious user, detection can be made. In [18] & [19], advanced K-NN and Dempster-Shafer (D-S) were implemented to detect malicious SUs in the PU boundary coverage. In [20], a discussion on Cognitive Radio Sensor Networks (CRNS), where some general implementation issues with CRNS has been discussed.…”
Section: Literature Surveymentioning
confidence: 99%
“…In [17], to detect the malicious user, K Nearest Neighbor K-NN, has been used, where without any knowledge of the malicious user, detection can be made. In [18] & [19], advanced K-NN and Dempster-Shafer (D-S) were implemented to detect malicious SUs in the PU boundary coverage. In [20], a discussion on Cognitive Radio Sensor Networks (CRNS), where some general implementation issues with CRNS has been discussed.…”
Section: Literature Surveymentioning
confidence: 99%
“…SS has two goals: first, CR users must get out of interfering negatively with PUs by moving to an open band to a reasonable level [ 13 , 14 , 15 ]. Second, to attain the essential throughput and QoS, CR users should effectively locate and utilize the spectrum gaps [ 16 , 17 , 18 ].…”
Section: Introductionmentioning
confidence: 99%