This list will be updated throughout the semester
 
Major Resources
Collaborative Spectrum Sensing
  • Ian F. Akyildiz, Brandon F. Lo, and Ravikumar Balakrishnan, Cooperative spectrum sensing in cognitive radio networks: A survey, Physical Communication (Elsevier) Journal, vol. 4, no. 1, pp. 40-62, March 2011. [PDF]

  • Zhiqiang Li, F. Richard Yu, and Minyi Huang, A cooperative spectrum sensing consensus scheme in cognitive radios, in IEEE INFOCOM, pp. 2546-2550, April 2009. [PDF]

  • Jin Zhang and Qian Zhang, Stackelberg game for utility-based cooperative cognitiveradio networks, in Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing (MobiHoc), pp. 23-31, May 2009. [PDF]

  • Walid Saad, Zhu Han, Merouane Debbah, Are Hjorungnes, and Tamer Basar, Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks, IEEE INFOCOM, pp. 2114-2122, Apr 19-25, 2009. [PDF]
Robust Collaborative Spectrum Sensing
  • Alexander W. Min, Kyu-Han Kim and Kan G. Shin, Robust Cooperative Sensing via State Estimation in Cognitive Radio Networks, in 2011 IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), pp. 185-196, May 2011. [PDF]

  • Omid Fatemieh, Ranveer Chandra, and Carl A. Gunter, Secure Collaborative Sensing for Crowdsourcing Spectrum Data in White Space Networks, in 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum, pp. 1-12, April 2010. [PDF]

  • Ruiliang Chen, Jung-Min Park, and Kaigui Bian, Robust Distributed Spectrum Sensing in Cognitive Radio Networks, in Proc. of IEEE INFOCOM, pp. 1876-1884, April 2008. [PDF]
Dynamic Spectrum Access Based on Coalitional Game Theory
Dynamic Spectrum Access Based on Non-Cooperative Game Theory
Auction and Pricing for Spectrum Management
Dynamic Spectrum Access
  • Wei Li, Xiuzhen Cheng, Yong Cui, Kai Xing, and Wendong Wang, Spectrum Assignment and Sharing for Delay Minimization in Multi-Hop Multi-Flow Cognitive Radio Networks, submitted to IEEE ICDCS 2012.

  • Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, and Shantidev Mohanty, Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey, Computer Networks, Vol. 50, No. 13, 15 September 2006. [PDF]

  • Apoorva Jindal and Konstantinos, Contention-Aware Performance Analysis of Mobility-Assisted Routing, IEEE Transactions on Mobile Computing, Vol. 8, NO. 2, pp. 145-161, Feb. 2009. [PDF]

  • Hong Xu and Baochun Li, Efficient Resource Allocation with Flexible Channel Cooperation in OFDMA Cognitive Radio Networks, IEEE INFOCOM 2010. [PDF]
Cognitive Network Security
  • T. Charles Clancy and Nathan Goergen, Security in Cognitive Radio Networks: Threats and Mitigation, in Conference on Cognitive Radio Oriented Wireless Networks and Communications, May 2008. [PDF]

  • Jack L. Burbank, Security in Cognitive Radio Networks: The Required Evolution in Approaches to Wireless Network Security, in 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), May 2008. [PDF]

  • Ruiliang Chen, Jung-Min Park, and Jeffrey H. Reed, Defense against Primary User Emulation Attacks in Cognitive Radio Networks, in IEEE Journal on Selected Areas in Communications, vol 26, no. 1, pp. 25-39, January 2008. [PDF]

  • S. Anand, Z. Jin, and K. P. Subbalakshmi, An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks, in DySpan, 2008. [PDF]
Mobile Social Networking
  • Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai and Dong Xuan, E-Shadow: Lubricating Social Interaction using Mobile Phones, in Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS), June 2011. [PDF]

  • N. Eagle and A. Pentland, Social Serendipity: Mobilizing Social Software, in IEEE Pervasive Computing, 4 (2): 28-34, 2005. [PDF]

  • Shravan Gaonkar, Jack Li, Romit Roy Choudhury, Landon Cox, Al Schmidt, Micro-Blog: Sharing and Querying Content through Mobile Phones and Social Participation, in Prof. of ACM MobiSys, June 2008. [PDF]

  • Wei Wei, Fengyuan Xu, Chiu C. Tan, and Qun Li, SybilDefender: Defend Against Sybil Attacks in Large Social Networks, IEEE Infocom, Orlando, FL, March 25-30, 2012. [PDF]
Mobile Marketing
  • Boying Zhang, Jin Teng, Xiaole Bai, Zhimin Yang and Dong Xuan, P3-Coupon: A Probabilistic System for Prompt and Privacy-preserving Electronic Coupon Distribution, in Proc. of IEEE International Conference on Pervasive Computing and Communications (PerCom), March 2011. [PDF]

  • Xinfeng Li, Jin Teng, Boying Zhang, Adam Champion and Dong Xuan, TurfCast: A Service for Controlling Information Dissemination in Wireless Networks, to appear in Proc. of IEEE International Conference on Computer Communications (INFOCOM), March 2012. [PDF]

  • A. Garyfalos and K. C. Almeroth, Coupons: A multilevel incentive scheme for information dissemination in mobile networks, in IEEE Trans. Mobile Computing vol. 7, no. 6, pp. 792–804, Jun. 2008. [PDF]
Mobile device Security
  • Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia, Dong Xuan and Jin Teng, Stealthy Video Capturer: A New Video-based Spyware in 3G Smartphones, in Proc. of ACM Conference on Wireless Network Security (WiSec), March 2009. [PDF]

  • William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, in Proc. of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), October, 2010. Vancouver, BC.  [PDF]

  • William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri. A Study of Android Application Security, in Proc. of the 20th USENIX Security Symposium, August, 2011. San Francisco, CA. [PDF]
Mobile Health
  • Jiangpeng Dai, Jin Teng, Xiaole Bai, Zhaohui Shen and Dong Xuan, Mobile Phone based Drunk Driving Detection, in Proc. of International ICST Conference on Pervasive Computing Technologies for Healthcare (Pervasive Health), March 2010. [PDF]

  • Nicholas D. Lane, Tanzeem Choudhury, Andrew Campbell, Mashfiqui Mohammod, Mu Lin, Xiaochao Yang, Afsaneh Doryab, Hong Lu, Shahid Ali and Ethan Berke, BeWell: A Smartphone Application to Monitor, Model and Promote Wellbeing, in Prof. of International ICST Conference on Pervasive Computing Technologies for Healthcare (Pervasive Health), May 2011. [PDF]

  • E. Ertin, N. Stohs, S. Kumar, A. Raij, M. al'Absi, T.Kwon, S. Mitra, Siddharth Shah, and J. W. Jeong, AutoSense: Unobtrusively Wearable Sensor Suite for Inferencing of Onset, Causality, and Consequences of Stress in the Field, in Proc. of the 9th ACM SenSys, Seattle, WA. 2011. [PDF]
Body Area Networks



Mobile Health Security -- I
  • Krishna K. Venkatasubramanian and Sandeep K. S. Gupta, Physiological Value-B ased Efficient Usable Security Solutions for Body Sensor Networks, ACM Transactions on Sensor Networks (TOSN), Vol. 6, No. 4, Article 31, Publication date: July 2010. [PDF]

  • Krishna K. Venkatasubramanian, Ayan Banerjee, and Sandeep Kumar S. Gupta, PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks, IEEE Transactions on Information Technology in Biomedicine, Vol. 14, No. 1, Pages 60-68, January 2010. [PDF]

  • Shu-Di Bao, Carmen C. Y. Poon, Yuan-Ting Zhang, and Lian-Feng Shen, Using the Timing Information of Heartbeats as an Entity Identifier to Secure Body Sensor Network, IEEE Transactions On Information Technology in Biomedicine, Vol. 12, No. 6, November 2008. [PDF]

  • Krishna K. Venkatasubramanian, Ayan Banerjee and Sandeep K. S. Gupta, Plethysmogram-based secure inter-sensor communication in body area networks, IEEE MILCOM, Pages 1-7, 2008 [PDF]
Mobile Health Security -- II
  • Fengyuan Xu, Zhengrui Qin, Chiu C. Tan, Baosheng Wang, and Qun Li. IMDGuard: Securing Implantable Medical Devices with the External Wearable Guardian, IEEE Infocom, Shanghai, China, April 10-15, 2011. [PDF]

  • Shyamnath Gollakota, Haitham Hassanieh, Benjamin Ransford, Dina Katabi, and Kevin Fu They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical Devices, ACM SIGCOMM, Toronto, ON, Canada, August 15-19, 2011. [PDF]

  • Chiu C. Tan, Haodong Wang, Sheng Zhong, and Qun Li. IBE-Lite: A Lightweight Identity Based Cryptography for Body Sensor Networks, IEEE Transactions on Information Technology in BioMedicine, 13(6), pages 926-932, 2009. [PDF]