Detection of the Primary User's Behavior for the Intervention of the Secondary User Using Machine Learning

被引:3
作者
Zambrano Soto, Deisy Dayana [1 ]
Salcedo Parra, Octavio Jose [1 ,2 ]
Lopez Sarmiento, Danilo Alfonso [1 ]
机构
[1] Univ Distrital Francisco Jose de Caldas, Internet Res Grp, Fac Engn, Bogota, Colombia
[2] Univ Nacl Colombia, Fac Engn, Dept Syst & Ind Engn, Bogota, Colombia
来源
FUTURE DATA AND SECURITY ENGINEERING, FDSE 2018 | 2018年 / 11251卷
关键词
Cognitive Radio; KNN; LR; Machine learning; Primary users (PU); SVM;
D O I
10.1007/978-3-030-03192-3_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The predictive analysis for the spectral decision with automatic Learning is a task that is currently challenging. Some automatic Learning techniques are shown in order to predict the presence or absence of a primary user (PU) in Cognitive Radio. Four machine learning methods are examined including the K-nearest neighbors (KNN), the support vector machines (SVM), logistic regression (LR) and decision tree (DT) classifiers. These predictive models are built based on data and their performance is compared with the purpose of selecting the best classifier that can predict spectral occupancy.
引用
收藏
页码:200 / 213
页数:14
相关论文
共 50 条
[11]   Machine Learning and Recognition of User Tasks for Malware Detection [J].
Alagrash, Yasamin ;
Mohan, Nithasha ;
Gollapalli, Sandhya Rani ;
Rrushi, Julian .
2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, :73-81
[12]   Primary User Boundary Detection in Cognitive Radio Networks: Estimated Secondary User Locations and Impact of Malicious Secondary Users [J].
Wang, Huaxia ;
Yao, Yu-Dong .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2018, 67 (05) :4577-4588
[13]   Impact of secondary user communication on security communication of primary user [J].
Sibomana, Louis ;
Hung Tran ;
Quang Anh Tran .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :4177-4190
[14]   User behaviour analysis using data analytics and machine learning to predict malicious user versus legitimate user [J].
Ranjan, Rohit ;
Kumar, Shashi Shekhar .
HIGH-CONFIDENCE COMPUTING, 2022, 2 (01)
[15]   A User?s Guide to Machine Learning for Polymeric Biomaterials [J].
Meyer, Travis A. ;
Ramirez, Cesar ;
Tamasi, Matthew J. ;
Gormley, Adam J. .
ACS POLYMERS AU, 2023, 3 (02) :141-157
[16]   Impact of the Primary User's Power Allocation on the Performance of the Secondary User in Cognitive Radio Networks [J].
Xu, Ding ;
Feng, Zhiyong ;
Zhang, Ping .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (02) :668-672
[17]   Machine learning for user modeling [J].
Webb, GI ;
Pazzani, MJ ;
Billsus, D .
USER MODELING AND USER-ADAPTED INTERACTION, 2001, 11 (1-2) :19-29
[18]   Machine Learning for User Modeling [J].
Geoffrey I. Webb ;
Michael J. Pazzani ;
Daniel Billsus .
User Modeling and User-Adapted Interaction, 2001, 11 :19-29
[19]   User Clustering for Rate Splitting using Machine Learning [J].
Pereira, Roberto ;
Deshpande, Anay Ajit ;
Vaca-Rubio, Cristian J. ;
Mestre, Xavier ;
Zanella, Andrea ;
Gregoratti, David ;
de Carvalho, Elisabeth ;
Popovski, Petar .
2022 30TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2022), 2022, :722-726
[20]   Identification of Twitter User Credibility Using Machine Learning [J].
Kurniati, Rizki ;
Widyantoro, Dwi H. .
PROCEEDINGS OF 2017 5TH INTERNATIONAL CONFERENCE ON INSTRUMENTATION, COMMUNICATIONS, INFORMATION TECHNOLOGY, AND BIOMEDICAL ENGINEERING (ICICI-BME): SCIENCE AND TECHNOLOGY FOR A BETTER LIFE, 2017, :282-286