{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:43:51Z","timestamp":1761648231285,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/icinfa.2014.6932628","type":"proceedings-article","created":{"date-parts":[[2014,11,1]],"date-time":"2014-11-01T01:28:22Z","timestamp":1414805302000},"page":"71-75","source":"Crossref","is-referenced-by-count":5,"title":["Cooperative spectrum sensing against attacks in cognitive radio networks"],"prefix":"10.1109","author":[{"given":"Jianxin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yuebin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Weiguang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Xuejiao","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Peng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.070941"},{"key":"2","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MCOM.2012.6178840","article-title":"'Cooperative relay techniques for cognitive radio systems:spectrum sensing and secondary user transmissions[J]'","volume":"50","author":"zou","year":"2012","journal-title":"Communications Magazine"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061975"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/CROWNCOM.2008.4562536"},{"key":"6","doi-asserted-by":"crossref","first-page":"2135","DOI":"10.1109\/TWC.2011.041311.100626","article-title":"'Detecting primary user emulation attacks in dynamic spectrum access networks]'","volume":"10","author":"chen","year":"2011","journal-title":"Wireless Communications IEEE Transactions on"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.05775"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2005.1542627"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.640"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2008.105"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2003.1204119"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.2307\/2286090"}],"event":{"name":"2014 IEEE International Conference on Information and Automation (ICIA)","start":{"date-parts":[[2014,7,28]]},"location":"Hailar, Hulun Buir, China","end":{"date-parts":[[2014,7,30]]}},"container-title":["2014 IEEE International Conference on Information and Automation (ICIA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6919201\/6932615\/06932628.pdf?arnumber=6932628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T19:26:45Z","timestamp":1498159605000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6932628\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icinfa.2014.6932628","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}