{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T11:17:42Z","timestamp":1774610262382,"version":"3.50.1"},"reference-count":344,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100010798","name":"Partnership Grant between Sunway University and the University of Malaya","doi-asserted-by":"publisher","award":["CR-UM-SST-DCIS-2018-01"],"award-info":[{"award-number":["CR-UM-SST-DCIS-2018-01"]}],"id":[{"id":"10.13039\/501100010798","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010798","name":"Partnership Grant between Sunway University and the University of Malaya","doi-asserted-by":"publisher","award":["RK004-2017"],"award-info":[{"award-number":["RK004-2017"]}],"id":[{"id":"10.13039\/501100010798","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2989870","type":"journal-article","created":{"date-parts":[[2020,4,23]],"date-time":"2020-04-23T20:03:40Z","timestamp":1587672220000},"page":"78054-78108","source":"Crossref","is-referenced-by-count":92,"title":["Comprehensive Survey of Machine Learning Approaches in Cognitive Radio-Based Vehicular Ad Hoc Networks"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8685-3113","authenticated-orcid":false,"given":"Mohammad Asif","family":"Hossain","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6266-2390","authenticated-orcid":false,"given":"Rafidah Md.","family":"Noor","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3110-2782","authenticated-orcid":false,"given":"Kok-Lim Alvin","family":"Yau","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8603-8840","authenticated-orcid":false,"given":"Saaidal Razalli","family":"Azzuhri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4908-7816","authenticated-orcid":false,"given":"Muhammad Reza","family":"Z'aba","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4324-8965","authenticated-orcid":false,"given":"Ismail","family":"Ahmedy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0061"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2267735"},{"key":"ref277","author":"chao","year":"2018","journal-title":"Machine Learning to Help Optimize Traffic and Reduce Pollution"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2006.869623"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2339817"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2013.07.001"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7391019"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"key":"ref272","first-page":"865","article-title":"Traffic flow prediction with big data: A deep learning approach","volume":"16","author":"lv","year":"2015","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032910.00019"},{"key":"ref171","first-page":"1","article-title":"Artificial intelligence as an enabler for cognitive self-organizing future networks","author":"latif","year":"2017","journal-title":"arXiv 1702 02823"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2010.12.003"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2016.1162117"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2015717"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2011.2163068"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/DySPAN.2018.8610474"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2011.6117122"},{"key":"ref168","first-page":"80","article-title":"A security framework for wireless body area network based smart healthcare system","author":"khan","year":"2017","journal-title":"Proc Int Conf Young Res Informat Math Eng (ICYRIME)"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1063\/1.5034337"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2016.08.152"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEOT.2016.7755301"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2016.7566489"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891073"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2018.2811185"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4300983"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5804536"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-53147-2_2"},{"key":"ref268","first-page":"200","article-title":"Research on the application of CarSim in vehicle simulation and development","volume":"4","author":"sun","year":"2017","journal-title":"International Journal of Plant Engineering and Management"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2010.2093210"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8061514"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2310433"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6845054"},{"key":"ref288","article-title":"Adaptive traffic signal control: Deep reinforcement learning algorithm with experience replay and target network","author":"gao","year":"2017","journal-title":"arXiv 1705 02755"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)CP.1943-5487.0000789"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1002\/atr.1276"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2013.2254961"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.10.055"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-017-9600-4"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1145\/3094243.3094261"},{"key":"ref180","article-title":"Machine learning for vehicular networks","author":"ye","year":"2017","journal-title":"arXiv 1712 07143"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2016.7845408"},{"key":"ref281","first-page":"33","article-title":"Real-time image-based parking occupancy detection using deep learning","author":"acharya","year":"2018","journal-title":"Proc 5th Annu Conf Res Locate"},{"key":"ref280","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.02.009"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2012.26"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2870379"},{"key":"ref183","first-page":"2","article-title":"Using cognitive radio to deliver &#x2019;green&#x2019; communications","author":"grace","year":"2009","journal-title":"Proc 4th Int Conf Cogn Radio Oriented Wireless Netw Commun (CROWNCOM)"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.131120"},{"key":"ref189","first-page":"1","article-title":"Reinforcement learning approach for RF-powered cognitive radio network with ambient backscatter","volume":"abs 1808 0","author":"van huynh","year":"2018","journal-title":"CoRR"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.07.002"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2872013"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2274201"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.100412.00017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.1080.0305"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2011.5999761"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2043968"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2011.941892"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-015-9438-6"},{"key":"ref21","first-page":"2581","article-title":"Towards intelligent vehicular networks: A machine learning framework","volume":"1","author":"liang","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2018.8689228"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100161"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986442"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.01.001"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3234150"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1016\/j.jue.2006.04.004"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1145\/3132340.3132355"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.07.012"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005750"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1093\/mind\/LIX.236.433","article-title":"Computing machinery and intelligence","volume":"59","author":"turing","year":"1950","journal-title":"Mind New Series"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChina.2018.8641220"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2760281"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2882815"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC.2017.8227766"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7553036"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422586"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6515060"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2870166"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600071CM"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2421277"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2016.07.004"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2010.2091408"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/CSNDSP.2014.6923977"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1049\/iet-its.2009.0070"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.04.009"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/1023875.1023877"},{"key":"ref147","first-page":"544","article-title":"An overview of the DSRC\/WAVE technology","author":"(jeff) li","year":"2012","journal-title":"Proc 7th Int Conf Heterogeneous Netw Qual Rel Security Robustness"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2008.4537038"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2007.247"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.617"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2017.00071"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.wneu.2017.09.149"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1161\/CIRCULATIONAHA.115.001593"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.289"},{"key":"ref55","first-page":"1","article-title":"A literature survey of active machine learning in the context of natural language processing","author":"olsson","year":"2009"},{"key":"ref54","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7068349"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-5990-9_1"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2605674"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23071-4_14"},{"key":"ref166","article-title":"Survey on vehicular ad hoc networks and its access technologies security vulnerabilities and countermeasures","author":"bakhsh kelarestaghi","year":"2019","journal-title":"arXiv 1903 01541"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2014.6814729"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7010544"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700053"},{"key":"ref162","author":"filippi","year":"2016","journal-title":"Ready to roll Why 802 11p beats lte and 5g for v2x"},{"key":"ref161","first-page":"5","article-title":"V2X communication for ITS-from IEEE 802.11 p towards 5G","volume":"1","author":"wevers","year":"2017","journal-title":"IEEE 5G Tech Focus"},{"key":"ref160","author":"weissberger","year":"2019","journal-title":"3GPP Release 16 Update"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2921-1"},{"key":"ref3","author":"schneider","year":"2018","journal-title":"Traffic&#x2019;s Mind-Boggling Economic Toll"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2015.09.017"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"key":"ref8","author":"krzanich","year":"2016","journal-title":"Data is the New Oil in the Future of Automated Driving"},{"key":"ref159","year":"2017","journal-title":"The Cost-Benefit Analysis on Cellular Vehicle-to-Everything (C-V2X) Technology and its Evolution to 5G-V2X"},{"key":"ref7","first-page":"3837","article-title":"Survey of cognitive radio VANET","volume":"8","author":"he","year":"2014","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2015.03.005"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1561\/9781680831498"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2014.7136245"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700467"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.101912.00184"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2692240"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.09.086"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1080\/23311916.2016.1191114"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.02.036"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6211495"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4539481"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2818888"},{"key":"ref320","author":"guardian","year":"2016","journal-title":"Tesla driver dies in first fatal crash while using autopilot mode"},{"key":"ref321","author":"guardian","year":"2018","journal-title":"Self-driving Uber kills Arizona woman in first fatal crash involving pedestrian"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2418"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1142\/SMPAI"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.034"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2014.80"},{"key":"ref318","year":"2019","journal-title":"Autopilot Project of Tesla"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TAAI.2013.52"},{"key":"ref317","year":"2019","journal-title":"Self-Driving Car Project"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7391162"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.3390\/app9050909"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/11788485_8"},{"key":"ref315","article-title":"DARTS: Deceiving autonomous cars with toxic signs","author":"sitawarin","year":"2018","journal-title":"arXiv 1802 06430"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/5.4.328"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745435"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/6528457"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2017.8275614"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292449"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2471178"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2267210"},{"key":"ref319","year":"2019","journal-title":"Autonomous Vehicle by UBER"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1109\/MedHocNet.2014.6849102"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2010.11.004"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3390\/s18082674"},{"key":"ref61","first-page":"ro15.4.1","article-title":"Application of machine learning to robotics: An analysis","author":"kreuziger","year":"1992","journal-title":"Proc 2nd Int Conf Automat Robot Comput Vis"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2788014"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1109\/TSMCC.2011.2170420","article-title":"Machine learning in financial crisis prediction: A survey","volume":"42","author":"lin","year":"2012","journal-title":"IEEE Trans Syst Man Cybern C Appl Rev"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/PERVASIVE.2015.7087073"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.01.003"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/960584"},{"key":"ref65","first-page":"223","article-title":"An analysis of Bayesian classifiers","volume":"90","author":"langley","year":"1992","journal-title":"Proc AAAI"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600117"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/URUCON.2017.8171851"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2007.912927"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1080\/0305215X.2018.1525708"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2371828"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.12.019"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.06.009"},{"key":"ref69","first-page":"4","article-title":"Distance metric learning: A comprehensive survey","volume":"2","author":"yang","year":"2006","journal-title":"Michigan State Universiy"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2618874"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/436810"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.05.002"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.122211.00162"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/JEC-ECC.2017.8305794"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1039859"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32467-8_2"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2010.5494005"},{"key":"ref195","author":"tanenbaum","year":"2014","journal-title":"Computer Networks"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.02.020"},{"key":"ref95","article-title":"A survey of dimensionality reduction techniques based on random projection","author":"xie","year":"2017","journal-title":"arXiv 1706 04371"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2014.09.012"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895645"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/Med-Hoc-Net.2011.5970488"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2798920"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2013.25"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2744620"},{"key":"ref342","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2012.6249410"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1145\/3272036.3272040"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2016.2546555"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.4108\/icst.crowncom.2014.255415"},{"key":"ref341","year":"2019","journal-title":"Cognitive Radio Network Testebed"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.11.003"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6915436"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1109\/APS.2013.6711711"},{"key":"ref333","year":"2019","journal-title":"Measuring and Modelling Congestion and Pollution"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690570"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1109\/EW.2010.5483535"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15825-4_23"},{"key":"ref338","year":"2019","journal-title":"Open-Access Research Testbed for Next-Generation Wireless Networks (orbit)"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2006.04.026"},{"key":"ref337","first-page":"1","article-title":"Cognitive cars constructing a cognitive playground for VANET research testbeds","author":"marfia","year":"2011","journal-title":"Proc CogART"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2361075"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405496"},{"key":"ref81","first-page":"1397","article-title":"Regression: Concept and application","volume":"10","author":"cokluk","year":"2010","journal-title":"Educ Sci Theory Pract"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.pisc.2016.06.040"},{"key":"ref83","first-page":"203","article-title":"Support vector regression","volume":"11","author":"basak","year":"2007","journal-title":"Neural Inf Process Lett Rev"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2009.5152884"},{"key":"ref331","year":"2019","journal-title":"The M&#x00E1;laga Stereo and Laser Urban Data Set"},{"key":"ref80","article-title":"Deep learning in business analytics and operations research: Models, applications and managerial implications","author":"kraus","year":"2018","journal-title":"arXiv 1806 10897"},{"key":"ref332","year":"2019","journal-title":"A Community Resource for Archiving Wireless Data At Dartmouth"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7391111"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2611524"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.859"},{"key":"ref325","year":"2019","journal-title":"RF DATASETS FOR MACHINE LEARNING"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2018.2797022"},{"key":"ref327","year":"2019","journal-title":"Spectrum CityScape Features"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.15439\/2015F14"},{"key":"ref326","year":"2019","journal-title":"iconectiv White Spaces Database"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmp.2018.03.001"},{"key":"ref329","year":"2019","journal-title":"Daimler Urban Segmentation Dataset"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMI.2013.6743191"},{"key":"ref328","year":"2019","journal-title":"Dataset for Context-Aware Cognitive Radio Using Deep Learning"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.120211.111508"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2015.07.011"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2016.7751703"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/WDD.2012.7311263"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/CSQRWC.2011.6037280"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1201\/b19351-7"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800074"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.03.112"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"ref207","first-page":"1","article-title":"Mitigating byzantine attacks in ad hoc wireless networks","author":"awerbuch","year":"2004"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.11.006"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.102213.132056"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/CICYBS.2014.7013367"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1002\/sec.899"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22720-2_68"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46248-5_2"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2007.22"},{"key":"ref214","first-page":"181","article-title":"Survey of security issues in cognitive radio networks","volume":"12","author":"wassim","year":"2011","journal-title":"J Internet Technol"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/242304"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023741"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/GWS.2017.8300470"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-2471-9_25"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9400-5"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952524"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/ICMCIS.2015.7158697"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1420-1"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916583"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093096"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2005.1547706"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.01.020"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110418"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682689"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/WOCN.2012.6331885"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1016\/j.jtbi.2013.08.036"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P18-1203"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/122344.122377"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1007\/11871842_29"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2830661"},{"key":"ref128","first-page":"43","article-title":"Advanced temporal-difference learning for intrusion detection","volume":"48","author":"sukhanov","year":"2015","journal-title":"IFAC-PapersOnLine"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2015.7343651"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860475"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2014.0103"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2913"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0029575"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00091"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2875678"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/AINS.2017.8270417"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/TSIPN.2018.2801622"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014171"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2789466"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2017.8094172"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2015.10"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2872456"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-4100-4.ch006"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890052"},{"key":"ref135","article-title":"Semi-supervised learning: When and why it works","author":"cholaquidis","year":"2018","journal-title":"arXiv 1805 09180"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/B0-08-043076-7\/00545-3"},{"key":"ref137","first-page":"188","article-title":"A routing algorithm based on semi-supervised learning for cognitive radio sensor networks","volume":"1","author":"jin","year":"2014","journal-title":"Proc 3rd Int Conf Sensor Netw (SENSORNETS)"},{"key":"ref139","author":"andersen","year":"2012","journal-title":"How case-based reasoning can be used to predict and improve traffic flow in urban intersections"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2015.7458333"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.3390\/app8050722"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.11.007"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-3078-7"},{"key":"ref2","year":"2015","journal-title":"Road Safety Report 2015"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2016.7835924"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2010.5503970"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/2345396.2345422"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422831"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2015.04.003"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEOT.2016.7754846"},{"key":"ref244","first-page":"1633","article-title":"Learning framework for robust obstacle detection, recognition, and tracking","volume":"18","author":"nguyen","year":"2017","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8390808"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2017.8317839"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2399415"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2018.2831082"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/IVS.2005.1505076"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2011.2157145"},{"key":"ref109","first-page":"1","article-title":"Pegasus&#x2014;A policy search method for large MDPs and POMDPs","author":"ng","year":"2010","journal-title":"Proc 16th Conf Uncertainty Artif Intell"},{"key":"ref108","first-page":"809","article-title":"Policy evaluation with temporal differences: A survey and comparison","volume":"15","author":"dann","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87481-2_32"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-017-0468-y"},{"key":"ref105","author":"sutton","year":"2017","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1613\/jair.301"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0590"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1023\/A:1024274801715"},{"key":"ref111","first-page":"799","article-title":"Autonomous helicopter flight via reinforcement learning","author":"kim","year":"2004","journal-title":"Advances in neural information processing systems"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.06.018"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.2001.932842"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.3390\/app8071014"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1177\/1729881417740711"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.3390\/s17061350"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1177\/154193120504902217"},{"key":"ref252","first-page":"1","article-title":"Assisted highway lane changing with RASCLE","author":"sullivan","year":"2010","journal-title":"Proc AAAI Spring Symp Embedded Reasoning"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2018.8569568"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.3390\/s121216937"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/MTITS.2017.8005678"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/CBS.2017.8266102"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2014-49"},{"key":"ref258","first-page":"2999","article-title":"Real-time driver eye detection method using support vector machine with hu invariant moments","volume":"5","author":"zhang","year":"2008","journal-title":"Proc Int Conf Mach Learn Cybern"},{"key":"ref11","first-page":"382","article-title":"Green perspective cognitive radio-based M2M communications for smart meters","author":"duy vo","year":"2010","journal-title":"Proc Int Conf Inf Commun Technol Converg (ICTC)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481339"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.23919\/WIOPT.2017.7959912"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.904784"},{"key":"ref15","first-page":"5","article-title":"Learning in vehicular dynamic spectrum access networks: Opportunities and challenges","author":"chen","year":"2011","journal-title":"Proc Int Symp Intell Signal Process Commun Syst (ISPACS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i29\/89270"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.456"},{"key":"ref17","first-page":"174","article-title":"Achieving secure spectrum sensing in presence of malicious attacks utilizing unsupervised machine learning","author":"li","year":"2016","journal-title":"Proc IEEE Mil Commun Conf (MILCOM)"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1504\/IJES.2018.10010491"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2453967"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.09.002"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503112"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070409"},{"key":"ref113","first-page":"345","article-title":"Reinforcement learning algorithm for partially observable Markov decision problems","author":"jaakkola","year":"1995","journal-title":"Advances in neural information processing systems"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2017.80"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2043124"},{"key":"ref120","first-page":"392","article-title":"Decentralized cognitive MAC protocol based on SARSA","author":"jiang","year":"2012","journal-title":"Proc IEEE 14th Int Conf Commun Technol"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2539923"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/EAIS.2012.6232810"},{"key":"ref123","article-title":"CAD2RL: Real single-image flight without a single real image","author":"sadeghi","year":"2016","journal-title":"arXiv 1611 04201"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.09.030"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/CADIAG.2017.8075679"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1177\/0959651818758865"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/CRV.2018.00024"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.3390\/s18041195"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2014.2182.2193"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVE.2014.7297703"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09076680.pdf?arnumber=9076680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:51:37Z","timestamp":1639770697000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9076680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":344,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2989870","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}