{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T11:56:40Z","timestamp":1752667000387,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,11,14]],"date-time":"2016-11-14T00:00:00Z","timestamp":1479081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11,14]]},"DOI":"10.1145\/2994551.2994557","type":"proceedings-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T12:49:08Z","timestamp":1478263748000},"page":"96-108","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Empirical Validation of Commodity Spectrum Monitoring"],"prefix":"10.1145","author":[{"given":"Ana","family":"Nika","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, USA"}]},{"given":"Zhijing","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, USA"}]},{"given":"Yanzi","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, USA"}]},{"given":"Yibo","family":"Zhu","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, USA"}]},{"given":"Ben Y.","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, USA"}]},{"given":"Xia","family":"Zhou","sequence":"additional","affiliation":[{"name":"Dartmouth College, USA"}]},{"given":"Haitao","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,11,14]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"http:\/\/whitespaces.spectrumbridge.com\/whitespaces\/home.aspx.  http:\/\/whitespaces.spectrumbridge.com\/whitespaces\/home.aspx."},{"key":"e_1_3_2_2_2_1","unstructured":"https:\/\/www.google.com\/get\/spectrumdatabase\/.  https:\/\/www.google.com\/get\/spectrumdatabase\/."},{"key":"e_1_3_2_2_3_1","unstructured":"http:\/\/sdr.osmocom.org\/trac\/wiki\/rtl-sdr.  http:\/\/sdr.osmocom.org\/trac\/wiki\/rtl-sdr."},{"key":"e_1_3_2_2_4_1","unstructured":"https:\/\/www.tablix.org\/~avian\/blog\/archives\/2015\/03\/noise_figure_measurements_of_rtl_sdr_dongles\/.  https:\/\/www.tablix.org\/~avian\/blog\/archives\/2015\/03\/noise_figure_measurements_of_rtl_sdr_dongles\/."},{"key":"e_1_3_2_2_5_1","unstructured":"https:\/\/www.msoon.com\/LabEquipment\/PowerMonitor\/.  https:\/\/www.msoon.com\/LabEquipment\/PowerMonitor\/."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2310883"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/GIIS.2013.6684374"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592573"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848198"},{"key":"e_1_3_2_2_10_1","volume-title":"ES-2014-01","author":"Brouwers N.","year":"2014","unstructured":"N. Brouwers and K. Langendoen . Will dynamic spectrum access drain my battery? Embedded Software Report Series , ES-2014-01 , 2014 . N. Brouwers and K. Langendoen. Will dynamic spectrum access drain my battery? Embedded Software Report Series, ES-2014-01, 2014."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2675001"},{"key":"e_1_3_2_2_12_1","volume-title":"IPCCC","author":"Chen Z.","year":"2009","unstructured":"Z. Chen , T. Cooklev , C. Chen , and C. Pomalaza-Raez . Modeling primary user emulation attacks and defenses in cognitive radio networks . In IPCCC , 2009 . Z. Chen, T. Cooklev, C. Chen, and C. Pomalaza-Raez. Modeling primary user emulation attacks and defenses in cognitive radio networks. In IPCCC, 2009."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067170.1067195"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6353689"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517351.2517397"},{"key":"e_1_3_2_2_16_1","volume-title":"DySPAN","author":"Fatemieh O.","year":"2010","unstructured":"O. Fatemieh , R. Chandra , and C. Gunter . Secure collaborative sensing for crowdsourcing spectrum data in white space networks . In DySPAN , 2010 . O. Fatemieh, R. Chandra, and C. Gunter. Secure collaborative sensing for crowdsourcing spectrum data in white space networks. In DySPAN, 2010."},{"key":"e_1_3_2_2_17_1","unstructured":"FCC. Second report and order and memorandum opinion and order. FCC-08-260 2008.  FCC. Second report and order and memorandum opinion and order. FCC-08-260 2008."},{"key":"e_1_3_2_2_18_1","unstructured":"FCC. Report and order and second further notice of proposed rulemaking. FCC-15-47 2015.  FCC. Report and order and second further notice of proposed rulemaking. FCC-15-47 2015."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398807"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00975-4_10"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848169"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819936"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307658"},{"key":"e_1_3_2_2_24_1","volume-title":"NSDI","author":"Iyer A. P.","year":"2011","unstructured":"A. P. Iyer , K. Chintalapudi , V. Navda , R. Ramjee , V. N. Padmanabhan , and C. R. Murthy . SpecNet: Spectrum sensing sans fronti\u00e8res . In NSDI , 2011 . A. P. Iyer, K. Chintalapudi, V. Navda, R. Ramjee, V. N. Padmanabhan, and C. R. Murthy. SpecNet: Spectrum sensing sans fronti\u00e8res. In NSDI, 2011."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.061510.090395"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/DYSPAN.2011.5936202"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639118"},{"key":"e_1_3_2_2_28_1","volume-title":"Feb.","author":"Littman L.","year":"2014","unstructured":"L. Littman and B. Revare . New times, new methods: Upgrading spectrum enforcement. Silicon Flatirons Roundtable Series on Entrepreneurship, Innovation, and Public Policy , Feb. 2014 . L. Littman and B. Revare. New times, new methods: Upgrading spectrum enforcement. Silicon Flatirons Roundtable Series on Entrepreneurship, Innovation, and Public Policy, Feb. 2014."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426666"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1688899.1688911"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2643614.2643615"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2736277.2741635"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737095.2737119"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402976"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348580"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381693"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068827"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673866"},{"key":"e_1_3_2_2_39_1","volume-title":"NSDI","author":"Shi L.","year":"2015","unstructured":"L. Shi , P. Bahl , and D. Katabi . Beyond sensing: Multi-GHz realtime spectrum analytics . In NSDI , 2015 . L. Shi, P. Bahl, and D. Katabi. Beyond sensing: Multi-GHz realtime spectrum analytics. In NSDI, 2015."},{"key":"e_1_3_2_2_40_1","volume-title":"INFOCOM","author":"Song L.","year":"2009","unstructured":"L. Song , Y. Chen , W. Trappe , and L. Greenstein . ALDO: An anomaly detection framework for dynamic spectrum access networks . In INFOCOM , 2009 . L. Song, Y. Chen, W. Trappe, and L. Greenstein. ALDO: An anomaly detection framework for dynamic spectrum access networks. In INFOCOM, 2009."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080103"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248371.2248400"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1147685.1147733"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567028"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535793"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639114"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699353"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535786"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030626"}],"event":{"name":"SenSys '16: The 14th ACM Conference on Embedded Network Sensor Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Stanford CA USA","acronym":"SenSys '16"},"container-title":["Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2994551.2994557","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2994551.2994557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:41Z","timestamp":1750217981000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2994551.2994557"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,14]]},"references-count":49,"alternative-id":["10.1145\/2994551.2994557","10.1145\/2994551"],"URL":"https:\/\/doi.org\/10.1145\/2994551.2994557","relation":{},"subject":[],"published":{"date-parts":[[2016,11,14]]},"assertion":[{"value":"2016-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}