Hard data fusion: With the user type estimates ˆm given in(24), a straightforward (yet effective, as shown by numericalresults) strategy of the fusion center is to directly discardall the local spectrum inferences from the detected malicioususers, and apply majority voting on the data from honestusers to decide the spectrum states. The block diagram of thisapproach is illustrated in Fig. 3. The fusion center maintains