This list will be updated throughout
the semester
|
|
Major Resources
|
Collaborative Spectrum Sensing
-
Ian F. Akyildiz, Brandon F. Lo, and Ravikumar Balakrishnan,
Cooperative spectrum sensing in cognitive radio networks: A survey,
Physical Communication (Elsevier) Journal, vol. 4, no. 1,
pp. 40-62, March 2011.
[PDF]
-
Zhiqiang Li, F. Richard Yu, and Minyi Huang,
A cooperative spectrum sensing consensus scheme in cognitive radios,
in IEEE INFOCOM, pp. 2546-2550, April 2009.
[PDF]
-
Jin Zhang and Qian Zhang, Stackelberg game for utility-based cooperative cognitiveradio networks, in Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing (MobiHoc), pp. 23-31, May 2009.
[PDF]
- Walid Saad, Zhu Han, Merouane Debbah, Are Hjorungnes, and Tamer Basar,
Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive
Radio Networks, IEEE INFOCOM, pp. 2114-2122, Apr 19-25, 2009.
[PDF]
|
Robust Collaborative Spectrum Sensing
-
Alexander W. Min, Kyu-Han Kim and Kan G. Shin,
Robust Cooperative Sensing via State Estimation in Cognitive Radio Networks,
in 2011 IEEE International Symposium on New Frontiers in
Dynamic Spectrum Access Networks (DySPAN), pp. 185-196, May 2011.
[PDF]
-
Omid Fatemieh, Ranveer Chandra, and Carl A. Gunter,
Secure Collaborative Sensing for Crowdsourcing Spectrum Data in White
Space Networks,
in 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum,
pp. 1-12, April 2010.
[PDF]
-
Ruiliang Chen, Jung-Min Park, and Kaigui Bian,
Robust Distributed Spectrum Sensing in Cognitive Radio Networks,
in Proc. of IEEE INFOCOM, pp. 1876-1884, April 2008.
[PDF]
|
Dynamic Spectrum Access Based on Coalitional Game Theory
- Walid Saad, Zhu Han, Merouane Debbah, Are Hjorungnes, and Tamer Basar,
Coalitional Game Theory for Communication Networks: A Tutorial, IEEE Signal Processing Magazine, Vol. 26, No. 5, Spetember 2009, PP. 77-97.
- Krzysztof R. Apt and Andreas Witzel,
A Generic Approach to Coalition Formation,
International Game Theory Review. 11 (3). 2009. pp. 347--367.
- Walid Saad, Zhu Han, Merouane Debbah, Are Hjorungnes, and Tamer Basar,
Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks, IEEE INFOCOM, pp. 2114-2122, Apr 19-25, 2009.
|
Dynamic Spectrum Access Based on Non-Cooperative
Game Theory
- Mark Felegyhazi and Jean-Pierre Hubaux,
Game Theory in Wireless
Networks: A Tutorial, Technical Report: LCA-REPORT-2006-002, EPFL.
- Krishna Jagannathan, Ishai Menache, Eytan Modiano, Gil Zussman,
Non-cooperative
Spectrum Access - The Dedicated vs. Free Spectrum Choice,
ACM MobiHoc, May 2011, Paris, France.
|
Auction and Pricing for Spectrum Management
- Dejun Yang, Xi Fang, and Guoliang Xue,
Truthful Auction
for Cooperative Communications,
ACM MobiHoc,
pp.89-98, May 2011, Paris, France.
- Jun Sun, Lizhong Zheng, and Eytan Modiano,
Wireless Channel Allocation Using An Auction Algorithm, IEEE Journal on Selected Areas in Communications, Vol. 24, No. 5, May 2006, pp. 1085-1096.
|
Dynamic Spectrum Access
- Wei Li, Xiuzhen Cheng, Yong Cui, Kai Xing, and Wendong Wang,
Spectrum Assignment and Sharing for Delay Minimization in Multi-Hop
Multi-Flow Cognitive Radio Networks, submitted to IEEE ICDCS 2012.
- Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, and Shantidev Mohanty,
Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey, Computer Networks, Vol. 50, No. 13, 15 September 2006.
[PDF]
- Apoorva Jindal and Konstantinos,
Contention-Aware Performance Analysis of Mobility-Assisted Routing,
IEEE Transactions on Mobile Computing, Vol. 8, NO. 2, pp. 145-161,
Feb. 2009. [PDF]
- Hong Xu and Baochun Li,
Efficient Resource Allocation with Flexible Channel Cooperation in OFDMA Cognitive Radio Networks, IEEE INFOCOM 2010.
[PDF]
|
Cognitive Network Security
-
T. Charles Clancy and Nathan Goergen,
Security in Cognitive Radio Networks: Threats and Mitigation,
in Conference on Cognitive Radio Oriented Wireless Networks and
Communications, May 2008.
[PDF]
-
Jack L. Burbank,
Security in Cognitive Radio Networks: The Required Evolution in Approaches to
Wireless Network Security,
in 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), May 2008.
[PDF]
-
Ruiliang Chen, Jung-Min Park, and Jeffrey H. Reed,
Defense against Primary User Emulation Attacks in
Cognitive Radio Networks,
in IEEE Journal on Selected Areas in Communications, vol 26, no. 1,
pp. 25-39, January 2008.
[PDF]
-
S. Anand, Z. Jin, and K. P. Subbalakshmi,
An Analytical Model for Primary User Emulation
Attacks in Cognitive Radio Networks,
in DySpan, 2008.
[PDF]
|
Mobile Social Networking
- Jin Teng, Boying Zhang,
Xinfeng Li, Xiaole Bai and Dong Xuan, E-Shadow:
Lubricating Social Interaction using Mobile Phones,
in Proc. of IEEE International Conference on Distributed Computing
Systems (ICDCS), June 2011. [PDF]
- N. Eagle and A.
Pentland, Social
Serendipity: Mobilizing Social Software,
in IEEE Pervasive Computing, 4 (2): 28-34, 2005. [PDF]
- Shravan Gaonkar, Jack Li,
Romit Roy Choudhury, Landon Cox, Al Schmidt, Micro-Blog:
Sharing and Querying Content through Mobile Phones and Social
Participation, in Prof. of
ACM MobiSys, June 2008. [PDF]
- Wei Wei, Fengyuan Xu, Chiu C. Tan, and Qun Li,
SybilDefender: Defend Against
Sybil Attacks in Large Social Networks,
IEEE Infocom,
Orlando, FL, March 25-30, 2012.
[PDF]
|
Mobile Marketing
- Boying Zhang, Jin Teng,
Xiaole Bai, Zhimin Yang and Dong Xuan, P3-Coupon:
A Probabilistic System for Prompt and Privacy-preserving Electronic
Coupon Distribution, in Proc.
of IEEE International Conference on Pervasive Computing and
Communications (PerCom), March 2011. [PDF]
- Xinfeng Li, Jin Teng, Boying
Zhang, Adam Champion and Dong Xuan, TurfCast:
A Service for Controlling Information Dissemination in Wireless Networks,
to appear in Proc. of IEEE International Conference on Computer
Communications (INFOCOM), March 2012. [PDF]
- A. Garyfalos and K. C.
Almeroth, Coupons:
A multilevel incentive scheme for information dissemination in mobile
networks, in IEEE Trans.
Mobile Computing vol. 7, no. 6, pp. 792–804, Jun. 2008. [PDF]
|
Mobile device Security
- Nan Xu, Fan Zhang, Yisha
Luo, Weijia Jia, Dong Xuan and Jin Teng, Stealthy
Video Capturer: A New Video-based Spyware in 3G Smartphones,
in Proc. of ACM Conference on Wireless Network Security (WiSec), March
2009. [PDF]
- William Enck, Peter Gilbert,
Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and
Anmol N. Sheth. TaintDroid:
An Information-Flow Tracking System for Realtime Privacy Monitoring on
Smartphones, in Proc. of the
9th USENIX Symposium on Operating Systems Design and Implementation
(OSDI), October, 2010. Vancouver, BC. [PDF]
- William Enck, Damien Octeau,
Patrick McDaniel, and Swarat Chaudhuri. A
Study of Android Application Security,
in Proc. of the 20th USENIX Security Symposium, August, 2011. San
Francisco, CA. [PDF
a>]
|
Mobile Health
- Jiangpeng Dai, Jin Teng,
Xiaole Bai, Zhaohui Shen and Dong Xuan, Mobile
Phone based Drunk Driving Detection,
in Proc. of International ICST Conference on Pervasive Computing
Technologies for Healthcare (Pervasive Health), March 2010. [PDF]
- Nicholas D. Lane, Tanzeem
Choudhury, Andrew Campbell, Mashfiqui Mohammod, Mu Lin, Xiaochao Yang,
Afsaneh Doryab, Hong Lu, Shahid Ali and Ethan Berke,
BeWell: A Smartphone Application to Monitor, Model and Promote Wellbeing,
in Prof. of International ICST Conference on Pervasive Computing
Technologies for Healthcare (Pervasive Health), May 2011. [PDF]
- E. Ertin, N. Stohs, S.
Kumar, A. Raij, M. al'Absi, T.Kwon, S. Mitra, Siddharth Shah, and J. W.
Jeong, AutoSense:
Unobtrusively Wearable Sensor Suite for Inferencing of Onset,
Causality, and Consequences of Stress in the Field,
in Proc. of the 9th ACM SenSys, Seattle, WA. 2011. [PDF]
|
Body Area Networks
|
Mobile Health Security -- I
- Krishna K. Venkatasubramanian and Sandeep K. S. Gupta, Physiological Value-B
ased Efficient Usable Security Solutions for Body Sensor Networks,
ACM Transactions on Sensor Networks (TOSN), Vol. 6, No. 4,
Article 31, Publication date: July 2010. [PDF]
- Krishna K. Venkatasubramanian, Ayan Banerjee, and Sandeep Kumar S. Gupta,
PSKA: Usable and Secure Key Agreement Scheme for Body Area Networks,
IEEE Transactions on Information Technology in Biomedicine,
Vol. 14, No. 1, Pages 60-68, January 2010.
[PDF]
- Shu-Di Bao, Carmen C. Y. Poon, Yuan-Ting Zhang, and Lian-Feng Shen,
Using the Timing Information of Heartbeats as an Entity Identifier to Secure
Body Sensor Network, IEEE Transactions On Information Technology in
Biomedicine, Vol. 12, No. 6, November 2008.
[PDF]
- Krishna K. Venkatasubramanian, Ayan Banerjee and Sandeep K. S. Gupta,
Plethysmogram-based secure inter-sensor communication in body area networks,
IEEE MILCOM, Pages 1-7, 2008
[PDF]
|
Mobile Health Security -- II
- Fengyuan Xu, Zhengrui Qin, Chiu C. Tan, Baosheng Wang, and Qun Li.
IMDGuard:
Securing Implantable Medical Devices with the External Wearable Guardian,
IEEE Infocom, Shanghai, China, April 10-15, 2011.
[PDF]
- Shyamnath Gollakota, Haitham Hassanieh,
Benjamin Ransford, Dina Katabi, and Kevin Fu
They Can Hear Your Heartbeats: Non-Invasive Security for Implantable Medical
Devices, ACM SIGCOMM, Toronto, ON, Canada, August 15-19, 2011.
[PDF]
- Chiu C. Tan, Haodong Wang, Sheng Zhong, and Qun Li.
IBE-Lite:
A Lightweight Identity Based Cryptography for Body Sensor Networks,
IEEE Transactions on Information Technology in BioMedicine,
13(6), pages 926-932, 2009.
[PDF]
|