Fig. 3From: Primary user emulation and jamming attack detection in cognitive radio via sparse codingAn illustration of the proposed algorithm for (a) training stage and (b) testing stageBack to article page