{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:43Z","timestamp":1750306483882,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1320906, CNS-1117462"],"award-info":[{"award-number":["CNS-1320906, CNS-1117462"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813717","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"304-315","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["SafeDSA"],"prefix":"10.1145","author":[{"given":"Xiaocong","family":"Jin","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Jingchao","family":"Sun","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Hawaii, Honolulu, HI, USA"}]},{"given":"Yanchao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"\"Cisco Visual Networking Index: Global mobile data traffic forecast update 2014--2019 white paper \" http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white_paper_c11--520862.html {Online}.  \"Cisco Visual Networking Index: Global mobile data traffic forecast update 2014--2019 white paper \" http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/white_paper_c11--520862.html {Online}."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248400"},{"key":"e_1_3_2_1_3_1","volume-title":"Washington,D.C.","author":"Kumar V.","year":"2013","unstructured":"V. Kumar , J. M. Park , T. C. Clancy , and B. Kaigui , \" PHY-layer authentication by introducing controlled inter symbol interference,\" in CNS'13 , Washington,D.C. , Oct. 2013 . V. Kumar, J. M. Park, T. C. Clancy, and B. Kaigui, \"PHY-layer authentication by introducing controlled inter symbol interference,\" in CNS'13, Washington,D.C., Oct. 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660318"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218380"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"A. Goldsmith \"Wireless communications \" pp. 172--197 2005.   A. Goldsmith \"Wireless communications \" pp. 172--197 2005.","DOI":"10.1017\/CBO9780511841224"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTMOBILE.2007.16"},{"key":"e_1_3_2_1_8_1","volume-title":"VA","author":"Xu W.","year":"2006","unstructured":"W. Xu , P. Kamat , and W. Trappe , \" TRIESTE: A trusted radio infrastructure for enforcing spectrum etiquettes,\" in IEEE Workshop on SDR Networks, Reston , VA , Sept. 2006 . W. Xu, P. Kamat, and W. Trappe, \"TRIESTE: A trusted radio infrastructure for enforcing spectrum etiquettes,\" in IEEE Workshop on SDR Networks, Reston, VA, Sept. 2006."},{"key":"e_1_3_2_1_9_1","volume-title":"Dublin","author":"Denker G.","year":"2007","unstructured":"G. Denker , E. Elenius , R. Senanayake , M. Stehr , and D. Wilkins , \" A policy engine for spectrum sharing,\" in DySPAN'07 , Dublin , Ireland , Apr. 2007 . G. Denker, E. Elenius, R. Senanayake, M. Stehr, and D. Wilkins, \"A policy engine for spectrum sharing,\" in DySPAN'07, Dublin, Ireland, Apr. 2007."},{"key":"e_1_3_2_1_10_1","volume-title":"Rio de Janeiro","author":"Liu S.","year":"2009","unstructured":"S. Liu , L. Greenstein , Y. Chen , and W. Trappe , \" ALDO: An anomaly detection framework for dynamic spectrum access networks,\" in INFOCOM'09 , Rio de Janeiro , Brazil , Apr. 2009 . S. Liu, L. Greenstein, Y. Chen, and W. Trappe, \"ALDO: An anomaly detection framework for dynamic spectrum access networks,\" in INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009."},{"key":"e_1_3_2_1_11_1","volume-title":"CA","author":"Lee K. S.","year":"2014","unstructured":"K. S. Lee , H. Wang , and H. Weatherspoon , \" PHY covert channels: Can you see the idles?,\" in NSDI'14, Berkeley , CA , Apr. 2014 . K. S. Lee, H. Wang, and H. Weatherspoon, \"PHY covert channels: Can you see the idles?,\" in NSDI'14, Berkeley, CA, Apr. 2014."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948115"},{"key":"e_1_3_2_1_13_1","volume-title":"Realizing an 802.11-based Covert Timing Channel Using Off-The-Shelf Wireless Cards,\" in GLOBECOM'13","author":"Radhakrishnan S. V.","year":"2013","unstructured":"S. V. Radhakrishnan , A. S. Uluagac , and R. Beyah , \" Realizing an 802.11-based Covert Timing Channel Using Off-The-Shelf Wireless Cards,\" in GLOBECOM'13 , Altanta, GA , Dec. 2013 . S. V. Radhakrishnan, A. S. Uluagac, and R. Beyah, \"Realizing an 802.11-based Covert Timing Channel Using Off-The-Shelf Wireless Cards,\" in GLOBECOM'13, Altanta, GA, Dec. 2013."},{"key":"e_1_3_2_1_14_1","volume-title":"Apr.","author":"Chen R.","year":"2008","unstructured":"R. Chen , J. Park , and K. Bian , \" Robust distributed spectrum sensing in cognitive radio networks,\" in INFOCOM'08 , Apr. 2008 . R. Chen, J. Park, and K. Bian, \"Robust distributed spectrum sensing in cognitive radio networks,\" in INFOCOM'08, Apr. 2008."},{"key":"e_1_3_2_1_15_1","first-page":"900","volume-title":"FL","author":"Yan Q.","year":"2012","unstructured":"Q. Yan , M. Li , T. Jiang , W. Lou , and Y. Hou , \" Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks,\" in INFOCOM'12, Orlando , FL , Mar. 2012 .%, pp. 900 -- 908 . Q. Yan, M. Li, T. Jiang, W. Lou, and Y. Hou, \"Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks,\" in INFOCOM'12, Orlando, FL, Mar. 2012.%, pp. 900--908."},{"key":"e_1_3_2_1_16_1","volume-title":"Turin","author":"Zhang R.","year":"2013","unstructured":"R. Zhang , J. Zhang , Y. Zhang , and C. Zhang , \" Secure crowdsourcing-based cooperative spectrum sensing,\" in INFOCOM'13 , Turin , Italy , Apr. 2013 . R. Zhang, J. Zhang, Y. Zhang, and C. Zhang, \"Secure crowdsourcing-based cooperative spectrum sensing,\" in INFOCOM'13, Turin, Italy, Apr. 2013."},{"key":"e_1_3_2_1_17_1","volume-title":"Location privacy preservation in collaborative spectrum sensing,\" INFOCOM'12","author":"Li S.","year":"2012","unstructured":"S. Li , H. Zhu , Z. Gao , X. Guan , K. Xing , and X. Shen , \" Location privacy preservation in collaborative spectrum sensing,\" INFOCOM'12 , Orlando, FL , Mar. 2012 . S. Li, H. Zhu, Z. Gao, X. Guan, K. Xing, and X. Shen, \"Location privacy preservation in collaborative spectrum sensing,\" INFOCOM'12, Orlando, FL, Mar. 2012."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6393525"},{"key":"e_1_3_2_1_19_1","volume-title":"Turin","author":"Gao Z.","year":"2013","unstructured":"Z. Gao , H. Zhu , Y. Liu , M. Li , and Z. Cao , \" Location privacy in database-driven cognitive radio networks: attacks and countermeasures,\" INFOCOM'13 , Turin , Italy , Apr. 2013 . Z. Gao, H. Zhu, Y. Liu, M. Li, and Z. Cao, \"Location privacy in database-driven cognitive radio networks: attacks and countermeasures,\" INFOCOM'13, Turin, Italy, Apr. 2013."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080104"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.24"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998428"},{"key":"e_1_3_2_1_23_1","volume-title":"CA","author":"Sun J.","year":"2011","unstructured":"J. Sun , D. Qu , T. Jiang , G. Zhong , and J. Guo , \" Low overhead cyclostationary signatures based on hopping subcarrier in OFDM-based dynamic spectrum access networks,\" VTC Fall'11, San Francisco , CA , Sept. 2011 . J. Sun, D. Qu, T. Jiang, G. Zhong, and J. Guo, \"Low overhead cyclostationary signatures based on hopping subcarrier in OFDM-based dynamic spectrum access networks,\" VTC Fall'11, San Francisco, CA, Sept. 2011."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2010.12.003"},{"key":"e_1_3_2_1_25_1","unstructured":"\"Orthogonal frequency-division multiplexing \" http:\/\/en.wikipedia.org\/wiki\/Orthogonal_frequency-division_multiplexing {Online}.  \"Orthogonal frequency-division multiplexing \" http:\/\/en.wikipedia.org\/wiki\/Orthogonal_frequency-division_multiplexing {Online}."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1111206"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/4234.935746"},{"volume-title":"wireless LAN medium access control (MAC) and physical layer (PHY) specifications","year":"2003","key":"e_1_3_2_1_28_1","unstructured":"\"Part 11 : wireless LAN medium access control (MAC) and physical layer (PHY) specifications ,\" June 2003 . \"Part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications,\" June 2003."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.599949"},{"key":"e_1_3_2_1_30_1","first-page":"815","volume-title":"1995 IEEE 45th","volume":"2","author":"van de Beek J.","year":"1995","unstructured":"J. van de Beek , O. Edfors , M. Sandell , S. K. Wilson , and P. O. B\u00f6rjesson , \" On channel estimation in OFDM systems,\" Vehicular Technology Conference , 1995 IEEE 45th , vol. 2 , pp. 815 -- 819 , Jul. 1995 . J. van de Beek, O. Edfors, M. Sandell, S. K. Wilson, and P. O. B\u00f6rjesson, \"On channel estimation in OFDM systems,\" Vehicular Technology Conference, 1995 IEEE 45th, vol. 2, pp. 815--819, Jul. 1995."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4557045"},{"key":"e_1_3_2_1_32_1","unstructured":"\"SHA-1 \" http:\/\/en.wikipedia.org\/wiki\/SHA-1 {Online}.  \"SHA-1 \" http:\/\/en.wikipedia.org\/wiki\/SHA-1 {Online}."},{"key":"e_1_3_2_1_33_1","volume-title":"The transport layer security (TLS) protocol,\" RFC","author":"Dierks T.","year":"2006","unstructured":"T. Dierks and E. Rescorla , \" The transport layer security (TLS) protocol,\" RFC 4346, Apr. 2006 . T. Dierks and E. Rescorla, \"The transport layer security (TLS) protocol,\" RFC 4346, Apr. 2006."},{"key":"e_1_3_2_1_34_1","first-page":"46","article-title":"OFDM for wireless multimedia communications","author":"van Nee R.","year":"2000","unstructured":"R. van Nee , and R. Prasad , \" OFDM for wireless multimedia communications ,\" Artech House, Boston , pp. 46 , 2000 . R. van Nee, and R. Prasad, \"OFDM for wireless multimedia communications,\" Artech House, Boston, pp. 46, 2000.","journal-title":"Artech House, Boston"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.650240"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2002.804034"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/4234.917097"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.969514"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/25.231882"},{"key":"e_1_3_2_1_40_1","unstructured":"\"Design considerations \" http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/wireless\/technology\/mesh\/7--3\/design\/guide\/Mesh\/Mesh_chapter_011.pdf {Online}.  \"Design considerations \" http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/wireless\/technology\/mesh\/7--3\/design\/guide\/Mesh\/Mesh_chapter_011.pdf {Online}."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/4234.852929"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813717","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:25Z","timestamp":1750225705000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813717"}},"subtitle":["Safeguard Dynamic Spectrum Access against Fake Secondary Users"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":41,"alternative-id":["10.1145\/2810103.2813717","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813717","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}