skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Spectrum Transformer: Wideband Spectrum Sensing using Multi-Head Self-Attention
Award ID(s):
2136202 2146421
PAR ID:
10480600
Author(s) / Creator(s):
; ; ;
Publisher / Repository:
IEEE
Date Published:
ISBN:
978-1-6654-9626-1
Page Range / eLocation ID:
101 to 105
Format(s):
Medium: X
Location:
Shanghai, China
Sponsoring Org:
National Science Foundation
More Like this
  1. The recent framework for tiered spectrum sharing in the 3.5 GHz band establishes rules in which multiple firms called Environment Sensing Capability operators (ESCs) may measure spectrum occupancy and sell these measurements to other firms to help facilitate spectrum access. Motived by this we consider a scenario in which two spectrum access firms (SAs) seeks to access a shared band of spectrum and must in turn purchase spectrum measurements from one of two ESCs. Given the measurements they purchase, the SA firms then compete on price to serve customers in a shared band of spectrum. We study how differences in the quality and price of the spectrum measurements impact the resulting market equilibrium between the SAs and find that having different qualities of measurements available to different SAs can lead to better economic welfare. 
    more » « less
  2. Security is a critical concern in shared spectrum environments. In additional to degrading service, attacks can influence the market interactions between competing service providers (SPs). This paper investigates these interactions by considering two SPs engaged in Cournot competition while utilizing both proprietary and shared spectrum, with shared spectrum available in either licensed or open-access forms. Additionally, we assume the presence of an attacker whose objective is to deny service to one or more of the shared bands for a fraction of the time, consequently reducing the overall total revenue. We analyze the optimal forms of attacks under different attacker objectives and their repercussions on the resulting market equilibrium. Utilizing these analyses, we compare the impacts of various spectrum sharing approaches (licensed and open access) and differing amounts of spectrum holdings of the two providers. 
    more » « less