The following publications are possibly variants of this publication:
- Myopic policy for opportunistic access in cognitive radio networks by exploiting primary user feedbacksKehao Wang, Quan Liu, Fangmin Li, Lin Chen, Xiaolin Ma. iet-com, 9(7):1017-1025, 2015. [doi]
- Secrecy Outage Analysis on Underlay Cognitive Radio System With Full-Duplex Secondary UserChao Zhang, Danyang Wang, Jia Ye, Hongjiang Lei, Jiliang Zhang 0003, Gaofeng Pan, Quanyuan Feng. access, 5:25696-25705, 2017. [doi]