{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:22:35Z","timestamp":1761744155846,"version":"3.37.3"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2015,6,1]],"date-time":"2015-06-01T00:00:00Z","timestamp":1433116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Korean government","award":["2014R1A5A1011478"],"award-info":[{"award-number":["2014R1A5A1011478"]}]},{"name":"Singapore MOE Tier 1","award":["RG18\/13","RG33\/12"],"award-info":[{"award-number":["RG18\/13","RG33\/12"]}]},{"name":"MOE Tier 2","award":["RG18\/13","MOE2014-T2-2-015 ARC 4\/15"],"award-info":[{"award-number":["RG18\/13","MOE2014-T2-2-015 ARC 4\/15"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cogn. Commun. Netw."],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/tccn.2015.2488620","type":"journal-article","created":{"date-parts":[[2015,10,8]],"date-time":"2015-10-08T14:31:52Z","timestamp":1444314712000},"page":"200-216","source":"Crossref","is-referenced-by-count":34,"title":["Performance Analysis of Wireless Energy Harvesting Cognitive Radio Networks Under Smart Jamming Attacks"],"prefix":"10.1109","volume":"1","author":[{"given":"Dinh Thai","family":"Hoang","sequence":"first","affiliation":[]},{"given":"Dusit","family":"Niyato","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dong In","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3766-0"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1613\/jair.807","article-title":"Experiments with infinite-horizon, policy-gradient estimation","volume":"15","author":"baxter","year":"2001","journal-title":"J Artif Intell Res"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-006-9010-5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/9.905687"},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.1007\/978-93-86279-38-5","author":"borkar","year":"2008","journal-title":"Stochastic Approximation A Dynamic Systems Viewpoint"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/S1052623497331063"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2012.6406147"},{"journal-title":"Nonlinear Programming","year":"1995","author":"bertsekas","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.103113.130018"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.141108"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2408610"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1126\/science.1143254","article-title":"Wireless power transfer via strongly coupled magnetic resonances","volume":"317","author":"kurs","year":"2007","journal-title":"Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2012.2187106"},{"journal-title":"Power Out of Thin Air Ambient RF Energy Harvesting for Wireless Sensors","year":"2010","author":"ostaffe","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.091510.100629"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.112310.100630"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398375"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25280-8_5"},{"journal-title":"Electronic Warfare in the Information Age","year":"1999","author":"schleher","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080104"},{"journal-title":"Game Theory","year":"1993","author":"fudenburg","key":"ref27"},{"article-title":"Primary user emulation detection in cognitive radio networks","year":"2013","author":"pu","key":"ref3"},{"key":"ref6","first-page":"1","article-title":"An online energy allocation strategy for energy harvesting cognitive radio systems","author":"gao","year":"0","journal-title":"Proc Int Conf Wireless Commun Signal Process"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00022"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2012.071612.120304"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6590058"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.012413.121009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.24"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2012.6362711"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511609909"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/11564096_42"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110418"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120102"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45249-9_29"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2012.06.008"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s00199-005-0071-5"},{"key":"ref25","first-page":"1","article-title":"Optimal power allocation strategy against jamming attacks using the Colonel Blotto game","author":"wu","year":"2009","journal-title":"IEEE Global Telecommun Conf"}],"container-title":["IEEE Transactions on Cognitive Communications and Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687307\/7419943\/07294641.pdf?arnumber=7294641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:48:10Z","timestamp":1641988090000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7294641\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":37,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tccn.2015.2488620","relation":{},"ISSN":["2332-7731"],"issn-type":[{"type":"electronic","value":"2332-7731"}],"subject":[],"published":{"date-parts":[[2015,6]]}}}