Detection Schemes of Illegal Spectrum Access Behaviors in Multiple Authorized Users Scenario.
Hao FangTao ZhangYueming CaiLinyuan ZhangHao WuPublished in: WCSP (2020)
Keyphrases
- multiple users
- information access
- user requests
- user requirements
- easily accessible
- real world
- meta information
- novice users
- end users
- social media
- log data
- recommender systems
- access control mechanism
- mobile internet
- transparent access
- user access
- cross references
- web interface
- internet services
- user satisfaction
- user experience
- user interaction
- information sources
- collaborative filtering
- e learning
- information retrieval