Secure and optimized unauthorized secondary user detection in dynamic spectrum access.
Xiaonan ZhangQi JiaLinke GuoPublished in: CNS (2017)
Keyphrases
- secret information
- detection method
- user interaction
- user access
- object detection
- user interface
- user experience
- dynamic environments
- end users
- false positives
- false alarms
- user authentication
- collaborative filtering
- access control
- detection algorithm
- user privacy
- automatic detection
- password authentication
- user requests
- user queries
- user satisfaction
- detection rate
- user preferences
- recommender systems