{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:35:25Z","timestamp":1767339325492,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1650831"],"award-info":[{"award-number":["1650831"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3324921.3328790","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"61-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Wireless Network Virtualization by Leveraging Blockchain Technology and Machine Learning"],"prefix":"10.1145","author":[{"given":"Ashish","family":"Adhikari","sequence":"first","affiliation":[{"name":"Data Science and Cybersecurity Center (DSC2), EECS Department, Howard University, Washington, DC, USA"}]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[{"name":"Data Science and Cybersecurity Center (DSC2), EECS Department, Howard University, Washington, DC, USA"}]},{"given":"Min","family":"Song","sequence":"additional","affiliation":[{"name":"Dept. of Electrical &amp; Computer Engineering, Stevens Institute of Technology, Hoboken, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2756798"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2014.2352118"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"key":"e_1_3_2_1_4_1","first-page":"474","volume-title":"April 2018","author":"D. Zhang","unstructured":"D. Zhang et al., \"A contract-based resource allocation mechanism in wireless virtualized network,\" in IEEE INFOCOM 2018 Workshops , April 2018 , pp. 474 -- 479 . D. Zhang et al., \"A contract-based resource allocation mechanism in wireless virtualized network,\" in IEEE INFOCOM 2018 Workshops, April 2018, pp. 474--479."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2647970"},{"key":"e_1_3_2_1_6_1","first-page":"199","article-title":"Agent-Based dynamic distribution of the frequency spectrum based on MASCEM implementation","volume":"2016","author":"Peter Toth J. Z.","year":"2016","unstructured":"J. Z. Peter Toth , Marcel Volosin , \" Agent-Based dynamic distribution of the frequency spectrum based on MASCEM implementation ,\" in Proc. of MAC-MIME 2016 , Dec 2016 , pp. 199 -- 206 . J. Z. Peter Toth, Marcel Volosin, \"Agent-Based dynamic distribution of the frequency spectrum based on MASCEM implementation,\" in Proc. of MAC-MIME 2016, Dec 2016, pp. 199--206.","journal-title":"Proc. of MAC-MIME"},{"key":"e_1_3_2_1_7_1","first-page":"332","volume-title":"Networking and Communications (ICNC)","author":"Rawat D. B.","year":"2018","unstructured":"D. B. Rawat and A. Alshaikhi , \" Leveraging Distributed Blockchain-based Scheme for Wireless Network Virtualization with Security and QoS Constraints,\" in 2018 International Conference on Computing , Networking and Communications (ICNC) , March 2018 , pp. 332 -- 336 . D. B. Rawat and A. Alshaikhi, \"Leveraging Distributed Blockchain-based Scheme for Wireless Network Virtualization with Security and QoS Constraints,\" in 2018 International Conference on Computing, Networking and Communications (ICNC), March 2018, pp. 332--336."},{"key":"e_1_3_2_1_8_1","first-page":"98","volume-title":"Aug 2018","author":"Lu Z.","unstructured":"Z. Lu , Q. Wang , G. Qu , and Z. Liu , \" BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs,\" in 2018 17th IEEE TrustCom\/BigDataSE , Aug 2018 , pp. 98 -- 103 . Z. Lu, Q. Wang, G. Qu, and Z. Liu, \"BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs,\" in 2018 17th IEEE TrustCom\/BigDataSE, Aug 2018, pp. 98--103."},{"key":"e_1_3_2_1_9_1","first-page":"1","article-title":"Payoff optimization through wireless network virtualization for iot applications: A three layer game approach","author":"Rawat D. B.","year":"2019","unstructured":"D. B. Rawat , A. Alshaikhi , A. Alshammari , C. Bajracharya , and M. Song , \" Payoff optimization through wireless network virtualization for iot applications: A three layer game approach ,\" IEEE Internet of Things Journal , pp. 1 -- 1 , 2019 . D. B. Rawat, A. Alshaikhi, A. Alshammari, C. Bajracharya, and M. Song, \"Payoff optimization through wireless network virtualization for iot applications: A three layer game approach,\" IEEE Internet of Things Journal, pp. 1--1, 2019.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_10_1","volume-title":"A peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto , \"Bitcoin : A peer-to-peer electronic cash system , 2008 ,\" URL ( accessed on Aug. 2017): http:\/\/www.bitcoin.org\/bitcoin.pdf, 2008. S. Nakamoto, \"Bitcoin: A peer-to-peer electronic cash system, 2008,\" URL (accessed on Aug. 2017): http:\/\/www.bitcoin.org\/bitcoin.pdf, 2008."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","DOI":"10.1201\/9781420067194","volume-title":"Machine learning: an algorithmic perspective","author":"Marsland S.","year":"2011","unstructured":"S. Marsland , Machine learning: an algorithmic perspective . CRC Press , 2011 . S. Marsland, Machine learning: an algorithmic perspective. CRC Press, 2011."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2013.23"},{"key":"e_1_3_2_1_13_1","first-page":"468","article-title":"User data traffic analysis for 3G cellular networks","volume":"2013","author":"Nan E.","year":"2013","unstructured":"E. Nan , X. Chu , W. Guo , and J. Zhang , \" User data traffic analysis for 3G cellular networks ,\" in IEEE ChinaCOMM 2013 , Aug 2013 , pp. 468 -- 472 . E. Nan, X. Chu, W. Guo, and J. Zhang, \"User data traffic analysis for 3G cellular networks,\" in IEEE ChinaCOMM 2013, Aug 2013, pp. 468--472.","journal-title":"IEEE ChinaCOMM"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Miami FL USA","acronym":"WiSec '19"},"container-title":["Proceedings of the ACM Workshop on Wireless Security and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324921.3328790","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324921.3328790","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324921.3328790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:24Z","timestamp":1750193244000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324921.3328790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":13,"alternative-id":["10.1145\/3324921.3328790","10.1145\/3324921"],"URL":"https:\/\/doi.org\/10.1145\/3324921.3328790","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}