{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T12:55:23Z","timestamp":1684155323645},"reference-count":6,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,11,9]],"date-time":"2016-11-09T00:00:00Z","timestamp":1478649600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s11432-015-0337-x","type":"journal-article","created":{"date-parts":[[2016,11,14]],"date-time":"2016-11-14T23:35:46Z","timestamp":1479166546000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing"],"prefix":"10.1007","volume":"60","author":[{"given":"Jingyu","family":"Feng","sequence":"first","affiliation":[]},{"given":"Guangyue","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yuqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Honggang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,9]]},"reference":[{"key":"337_CR1","volume-title":"Technical Report, Rep. ET Docket No. 02\u2013135","author":"Federal Communications Commission.","year":"2002","unstructured":"Federal Communications Commission. Spectrum Policy Task Force. Technical Report, Rep. ET Docket No. 02\u2013135. 2002"},{"key":"337_CR2","volume-title":"Cognitive radio: an integrated agent architecture for software defined radio","author":"J Mitola","year":"2000","unstructured":"Mitola J. Cognitive radio: an integrated agent architecture for software defined radio. Dissertation for Ph.D. Degree. Stockholm: Royal Instutute of Technology (KTH), 2000"},{"key":"337_CR3","first-page":"042318","volume":"57","author":"K Zeng","year":"2014","unstructured":"Zeng K, Peng Q H, Tang Y X. Mitigating spectrum sensing data falsification attacks in hard-decision combining cooperative spectrum sensing. Sci China Inf Sci, 2014, 57: 042318","journal-title":"Sci China Inf Sci"},{"key":"337_CR4","first-page":"1321","volume":"9","author":"J Y Feng","year":"2015","unstructured":"Feng J Y, Lu G Y, Chang H. Behave well: how to win a pop vacant band via cooperative spectrum sensing. KSII Trans Int Inf Syst, 2015, 9: 1321\u20131336","journal-title":"KSII Trans Int Inf Syst"},{"key":"337_CR5","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1016\/j.neucom.2012.08.005","volume":"101","author":"Q Q Pei","year":"2013","unstructured":"Pei Q Q, Yuan B B, Li L, et al. A sensing and etiquette reputation-based trust management for centralized cognitive radio networks. Neurocomputing, 2013, 101: 129\u2013138","journal-title":"Neurocomputing"},{"key":"337_CR6","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.phycom.2010.12.003","volume":"4","author":"I F Akyildiz","year":"2011","unstructured":"Akyildiz I F, Lo B F, Balakrishnan R. Cooperative spectrum sensing in cognitive radio networks: a survey. Phys Commun, 2011, 4: 40\u201362","journal-title":"Phys Commun"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0337-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-0337-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0337-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T23:35:16Z","timestamp":1498347316000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-0337-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,9]]},"references-count":6,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["337"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-0337-x","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,9]]},"article-number":"059101"}}