{"id":"https://openalex.org/W2836287355","doi":"https://doi.org/10.1109/iccw.2018.8403775","title":"Reputation Value Ranking Based Sequential Cooperative Spectrum Sensing against Byzantine Attack","display_name":"Reputation Value Ranking Based Sequential Cooperative Spectrum Sensing against Byzantine Attack","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2836287355","doi":"https://doi.org/10.1109/iccw.2018.8403775","mag":"2836287355"},"language":"en","primary_location":{"id":"doi:10.1109/iccw.2018.8403775","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccw.2018.8403775","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100716292","display_name":"Jun Wu","orcid":"https://orcid.org/0000-0002-8918-3194"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jun Wu","raw_affiliation_strings":["National Mobile Communication Research Lab, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communication Research Lab, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022040924","display_name":"Tiecheng Song","orcid":"https://orcid.org/0000-0002-9505-0179"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tiecheng Song","raw_affiliation_strings":["National Mobile Communication Research Lab, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communication Research Lab, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100390449","display_name":"Cong Wang","orcid":"https://orcid.org/0000-0001-9746-3316"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Wang","raw_affiliation_strings":["National Mobile Communication Research Lab, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communication Research Lab, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5114626291","display_name":"Jing Hu","orcid":"https://orcid.org/0000-0001-8618-5533"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Hu","raw_affiliation_strings":["National Mobile Communication Research Lab, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"National Mobile Communication Research Lab, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100716292"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":0.7381,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.74286161,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"9","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.9617999792098999,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7544819116592407},{"id":"https://openalex.org/keywords/fusion-center","display_name":"Fusion center","score":0.7206543684005737},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6779330968856812},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.6537264585494995},{"id":"https://openalex.org/keywords/cognitive-radio","display_name":"Cognitive radio","score":0.6326230764389038},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5371447801589966},{"id":"https://openalex.org/keywords/ranking","display_name":"Ranking (information retrieval)","score":0.533366858959198},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.5313525795936584},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.5248926877975464},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5153278708457947},{"id":"https://openalex.org/keywords/sequential-probability-ratio-test","display_name":"Sequential probability ratio test","score":0.42949503660202026},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33363592624664307},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.23927661776542664},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.21317732334136963},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20331010222434998},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1643373668193817},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.114291250705719}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7544819116592407},{"id":"https://openalex.org/C2781234732","wikidata":"https://www.wikidata.org/wiki/Q943505","display_name":"Fusion center","level":4,"score":0.7206543684005737},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6779330968856812},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.6537264585494995},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.6326230764389038},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5371447801589966},{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.533366858959198},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.5313525795936584},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.5248926877975464},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5153278708457947},{"id":"https://openalex.org/C34602496","wikidata":"https://www.wikidata.org/wiki/Q2271882","display_name":"Sequential probability ratio test","level":2,"score":0.42949503660202026},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33363592624664307},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.23927661776542664},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.21317732334136963},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20331010222434998},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1643373668193817},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.114291250705719},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccw.2018.8403775","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccw.2018.8403775","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1576034712","https://openalex.org/W1966100128","https://openalex.org/W1984174790","https://openalex.org/W1998428895","https://openalex.org/W2027310126","https://openalex.org/W2032413230","https://openalex.org/W2042759912","https://openalex.org/W2083748559","https://openalex.org/W2107069798","https://openalex.org/W2118523347","https://openalex.org/W2153015273","https://openalex.org/W2344903426","https://openalex.org/W2346524409","https://openalex.org/W2555490482","https://openalex.org/W2594257361","https://openalex.org/W2785447052","https://openalex.org/W3106293402","https://openalex.org/W6747997298"],"related_works":["https://openalex.org/W2098233271","https://openalex.org/W4294642751","https://openalex.org/W1556853708","https://openalex.org/W2117233216","https://openalex.org/W4287775559","https://openalex.org/W2144291038","https://openalex.org/W3031886967","https://openalex.org/W3034819374","https://openalex.org/W2952411908","https://openalex.org/W4297533531"],"abstract_inverted_index":{"Cooperative":[0],"spectrum":[1],"sensing":[2,14,172],"(CSS)":[3],"has":[4],"emerged":[5],"as":[6,47],"a":[7,56,69,83,138],"key":[8],"solution":[9],"to":[10,109],"effectively":[11],"improve":[12],"the":[13,35,38,48,65,91,113,121,124,129,147,184,190],"accuracy":[15],"in":[16,51,55,137,170],"cognitive":[17],"radio":[18],"networks":[19],"(CRNs).":[20],"But":[21],"it":[22],"can":[23],"be":[24],"threatened":[25],"by":[26,34,132],"malicious":[27,79],"users":[28,118],"(MUs)":[29],"launching":[30],"Byzantine":[31,40,85],"attack.":[32],"Motivated":[33],"fact":[36],"that":[37,157],"existing":[39,92],"mitigation":[41],"schemes":[42],"have":[43],"strong":[44],"assumptions":[45],"such":[46],"MUs":[49],"are":[50,143,155],"minority":[52],"or":[53],"act":[54],"simplified":[57],"attack":[58,86,100,179],"strategy,":[59,180],"this":[60,98],"paper":[61],"firstly":[62],"focuses":[63],"on":[64],"issue":[66],"of":[67,105,112,123,175,178,186],"designing":[68],"general":[70],"and":[71,126],"reliable":[72],"reference":[73],"for":[74,94],"CSS.":[75],"By":[76],"analyzing":[77],"sophisticated":[78],"behaviors,":[80],"we":[81,102],"formulate":[82],"random":[84],"model,":[87,101],"which":[88],"goes":[89],"beyond":[90],"models":[93],"its":[95],"generalization.":[96],"Under":[97],"generalized":[99],"make":[103],"use":[104],"delivery-based":[106],"assessment":[107],"(DBA)":[108],"check":[110],"consistency":[111],"local":[114],"reports":[115,130,136],"from":[116],"secondary":[117],"(SUs)":[119],"regarding":[120],"presence":[122],"phenomenon":[125],"innovatively":[127],"exploit":[128],"falsified":[131],"MUs.":[133],"Then,":[134],"all":[135],"reputation":[139],"value":[140],"(RV)":[141],"order":[142],"sequentially":[144],"processed":[145],"until":[146],"sequential":[148,165],"test":[149,168],"terminates.":[150],"At":[151],"last,":[152],"numerical":[153],"results":[154],"presented":[156],"show":[158],"our":[159],"proposed":[160],"scheme":[161],"significantly":[162],"outperforms":[163],"weighted":[164],"probability":[166],"ratio":[167],"(WSPRT)":[169],"cooperative":[171],"performance":[173],"regardless":[174],"what":[176],"type":[177],"while":[181],"hugely":[182],"reduces":[183],"number":[185],"samples":[187],"required":[188],"at":[189],"fusion":[191],"center":[192],"(FC).":[193]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
