[1] J. A. d. Peral-Rosado, R. Raulefs, J. A. López-Salcedo and G. Seco-Granados, "Survey of Cellular Mobile Radio Localization Methods: From 1G to 5G," IEEE Communications Surveys & Tutorials, vol. 20, no. 2, pp. 1124-1148, 2018.
[2] N. H. Mahmood, R. Abreu, R. Böhnke, M. Schubert, G. Berardinelli and T. H. Jacobsen, "Uplink Grant-Free Access Solutions for URLLC services in 5G New Radio," 16th International Symposium on Wireless Communication Systems (ISWCS), pp. 607-612, 2019.
[4] N. Ye, J. Yu, A. Wang and R. Zhang, "Help from space: grant-free massive access for satellite-based IoT in the 6G era", Digit. Commun. Netw., pp. 215-224, 2022.
[5] A. Azari, P. Popovski, G. Miao and C. Stefanovic, " Grant-Free Radio Access for Short-Packet Communications over 5G Networks", GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Singapore, pp. 1-7, 2017.
[6] H. M. Gürsu, W. Kellerer and C. Stefanović, "On Throughput Maximization of Grant-Free Access with Reliability-Latency Constraints," ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China,, pp. 1-7, 2019.
[7] H. YU, Z. FEI, C. CAO, M. XIAO, D. JIA and N. YE, "Analysis of irregular repetition spatially-coupled slotted ALOHA," SCIENCE CHINA Information Sciences, vol. 62, 2019.
[8] F. Formaggio, A. Munari and F. Clazzer, "On receiver diversity for grant-free based machine type communications," Ad Hoc Networks Journal, vol. 107, 2020.
[9] S. Moon and J.-W. Lee, "Performance Study of Repetition-Based Grant-Free Schemes in the mMTC Scenario," 2019 34th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC), JeJu, Korea (South),, pp. 1-2, 2019.
[10] B. Singh, O. Tirkkonen, Z. Li and M. A. Uusitalo, "Contention-Based Access for Ultra-Reliable Low Latency Uplink Transmissions," IEEE Wireless Communications Letters, vol. 7, pp. 182-185, 2018.
[11] P. Minero and M. Franceschetti, "Throughput of Slotted ALOHA with Encoding Rate Optimization and Multipacket Reception," IEEE INFOCOM 2009, pp. 2971-2975, 2009.
[12] A. B. Mackenzie and S. B. Wicker, "Selfish users in Aloha: A game-theoretic approach," IEEE 54th Vehicular Technology Conference, vol. 3, pp. 1354 - 1357, 2001.
[13] R. T. B. Ma, V. Misra and D. Rubenstein, "An Analysis of Generalized Slotted-Aloha Protocols," IEEE/ACM Transactions on Networking, vol. 17, pp. 936-949, 2009.
[14] C.-H. Chin, J. G. Kim and D. Lee, " Stability of Slotted Aloha with Selfish Users under Delay Constraint," KSII Transactions on Internet and Information Systems, vol. 5, pp. 542-559, 2011.
[15] P. Antoniadis, S. Fdida, C. Griffin, Y. Jin and G. Kesidis, "Distributed medium access control with conditionally altruistic users," EURASIP Journal on Wireless Communications and Networking, vol. 202 , 2013.
[16] Y. Lin, "Jamming-aware Randomized Spectrum Sharing in Cognitive Radio Communication Networks," Applied Mechanics and Materials, Vols. 513-517, pp. 834-840, 2014.
[17] F.-T. Hsu and H.-J. Su, "Throughput improvement in ALOHA networks with power capture and a cheat-proof access control," in 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Istanbul, Turkey, 2010.
[18] D. Wang, C. COMANICIU and U. TURELI, "Cooperation and Fairness for Slotted Aloha," Wireless Personal Communications, p. 13–27, 2007.
[19] Y. Jin, G. Kesidis and J. W. Jang, "A Channel Aware MAC Protocol in an ALOHA Network with Selfish Users," IEEE Journal on Selected Areas in Communications, vol. 30, pp. 128-137, 2012.
[20] W. F. Fihri, H. E. Ghazi, B. A. E. Majd and Bouanani, "A Machine Learning Approach for Backoff Manipulation Attack Detection in Cognitive Radio," IEEE Access, vol. 8, pp. 227349-227359, 2020.
[21] R. T. B. Ma, V. Misra and D. Rubenstein, "Modeling and Analysis of Generalized Slotted-Aloha MAC Protocols in Cooperative, Competitive and Adversarial Environments," IEEE International Conference on Distributed Computing Systems, pp. 62-62, 2006.
[22] S. Gyawali and Y. Qian, "Misbehavior Detection using Machine Learning in Vehicular Communication Networks," IEEE International Conference on Communications (ICC), pp. 1-6, 2019.
[23] Y. Imamverdiyev and L. Sukhostat, "Anomaly detection in network traffic using extreme learning machine," IEEE 10th International Conference on Application of Information and Communication Technologies (AICT), pp. 1-4, 2016.
[24] X. Ling, Y. Le, J. Wang and Z. Ding, "Hash Access: Trustworthy Grant-Free IoT Access Enabled by Blockchain Radio Access Networks," IEEE Network, vol. 34, pp. 54-61, 2020.
[25] N. Wang, W. Li, A. Alipour-Fanid, L. Jiao, M. Dabaghchian and K. Zeng, "Pilot Contamination Attack Detection for 5G MmWave Grant-Free IoT Networks," IEEE Transactions on Information Forensics and Security, vol. 16, pp. 658-670, 2021.
[26] G. Berardinelli, N. H. Mahmood, R. Abreu, T. Jacobsen, K. Pedersen, I. Z. Kovács and P. Mogensen, "Reliability Analysis of Uplink Grant-Free Transmission Over Shared Resources," IEEE Access, vol. 6, pp. 23602-23611, 2018.
[27] J. Zhang, L. Lu, Y. Sun, Y. Chen, J. Liang, J. Liu, H. Yang, S. Xing, Y. Wu, J. Ma, I. B. F. Murias and F. J. L. Hernando, "PoC of SCMA-Based Uplink Grant-Free Transmission in UCNC for 5G," IEEE Journal on Selected Areas in Communications, vol. 35, no. 6, pp. 1353-1362, 2017.
[28] J. D. P. -N. C. a. Y. S. H. L. Deng, "On the Asymptotic Performance of Delay-Constrained Slotted ALOHA," in 27th International Conference on Computer Communication and Networks (ICCCN), Hangzhou, China, 2018.
[29] M.VASOUJOUYBARI, E. Ataie, M. Bastam, "An MLP-based Deep Learning Approach for Detecting DDoS Attacks", Journal of Electrical Engineering of Tabriz University, vol. 52, no. 3, pp. 195-204, 1401.
[30] M. Zendedel, J. Hamidzadeh, "Improving intrusion detection in the Internet of Things network using deep learning and chaotic shrimp optimization algorithm", Journal of Electrical Engineering, University of Tabriz, vol. 53, no. 2, pp. 127-138, 2023.